Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
62s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 06:01
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-11_7865d41c4b524454773eafecbf07bc45_goldeneye.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-11_7865d41c4b524454773eafecbf07bc45_goldeneye.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-11_7865d41c4b524454773eafecbf07bc45_goldeneye.exe
-
Size
408KB
-
MD5
7865d41c4b524454773eafecbf07bc45
-
SHA1
4105ddbb317ee2c5ecac583185df3fe17e47f41c
-
SHA256
ad0bd98641fbf53bdf6680bccad43973f58133439457c06d20287c49988664b5
-
SHA512
0d21c304ea511f5865be664713ce8fc74b78f41266a4448d793041fc73f66f5e0dc89871fb3b793552c79d825cbc6131ff5ea03f81b6ac421622fde177e49191
-
SSDEEP
3072:CEGh0o1l3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEG/ldOe2MUVg3vTeKcAEciTBqr3jy
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{062ECE3B-395B-472a-903B-E3BC765432DF} {427D85F2-CF49-4c2f-B05F-20FC48A8BC6E}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E84CA04D-5DB9-45be-AE0F-CDD64FDAADAC} {062ECE3B-395B-472a-903B-E3BC765432DF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7B918265-BC5F-49d6-859B-64D4EF962B31} {7A86FFF9-121E-4ae5-8EA8-66AF25039E5A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7B918265-BC5F-49d6-859B-64D4EF962B31}\stubpath = "C:\\Windows\\{7B918265-BC5F-49d6-859B-64D4EF962B31}.exe" {7A86FFF9-121E-4ae5-8EA8-66AF25039E5A}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{427D85F2-CF49-4c2f-B05F-20FC48A8BC6E}\stubpath = "C:\\Windows\\{427D85F2-CF49-4c2f-B05F-20FC48A8BC6E}.exe" {7B918265-BC5F-49d6-859B-64D4EF962B31}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{062ECE3B-395B-472a-903B-E3BC765432DF}\stubpath = "C:\\Windows\\{062ECE3B-395B-472a-903B-E3BC765432DF}.exe" {427D85F2-CF49-4c2f-B05F-20FC48A8BC6E}.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{E84CA04D-5DB9-45be-AE0F-CDD64FDAADAC}\stubpath = "C:\\Windows\\{E84CA04D-5DB9-45be-AE0F-CDD64FDAADAC}.exe" {062ECE3B-395B-472a-903B-E3BC765432DF}.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7A86FFF9-121E-4ae5-8EA8-66AF25039E5A} 2024-01-11_7865d41c4b524454773eafecbf07bc45_goldeneye.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7A86FFF9-121E-4ae5-8EA8-66AF25039E5A}\stubpath = "C:\\Windows\\{7A86FFF9-121E-4ae5-8EA8-66AF25039E5A}.exe" 2024-01-11_7865d41c4b524454773eafecbf07bc45_goldeneye.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{427D85F2-CF49-4c2f-B05F-20FC48A8BC6E} {7B918265-BC5F-49d6-859B-64D4EF962B31}.exe -
Executes dropped EXE 5 IoCs
pid Process 1496 {7A86FFF9-121E-4ae5-8EA8-66AF25039E5A}.exe 4936 {7B918265-BC5F-49d6-859B-64D4EF962B31}.exe 3604 {427D85F2-CF49-4c2f-B05F-20FC48A8BC6E}.exe 2952 {062ECE3B-395B-472a-903B-E3BC765432DF}.exe 1540 {E84CA04D-5DB9-45be-AE0F-CDD64FDAADAC}.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\{427D85F2-CF49-4c2f-B05F-20FC48A8BC6E}.exe {7B918265-BC5F-49d6-859B-64D4EF962B31}.exe File created C:\Windows\{062ECE3B-395B-472a-903B-E3BC765432DF}.exe {427D85F2-CF49-4c2f-B05F-20FC48A8BC6E}.exe File created C:\Windows\{E84CA04D-5DB9-45be-AE0F-CDD64FDAADAC}.exe {062ECE3B-395B-472a-903B-E3BC765432DF}.exe File created C:\Windows\{7A86FFF9-121E-4ae5-8EA8-66AF25039E5A}.exe 2024-01-11_7865d41c4b524454773eafecbf07bc45_goldeneye.exe File created C:\Windows\{7B918265-BC5F-49d6-859B-64D4EF962B31}.exe {7A86FFF9-121E-4ae5-8EA8-66AF25039E5A}.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3784 2024-01-11_7865d41c4b524454773eafecbf07bc45_goldeneye.exe Token: SeIncBasePriorityPrivilege 1496 {7A86FFF9-121E-4ae5-8EA8-66AF25039E5A}.exe Token: SeIncBasePriorityPrivilege 4936 {7B918265-BC5F-49d6-859B-64D4EF962B31}.exe Token: SeIncBasePriorityPrivilege 3604 {427D85F2-CF49-4c2f-B05F-20FC48A8BC6E}.exe Token: SeIncBasePriorityPrivilege 2952 {062ECE3B-395B-472a-903B-E3BC765432DF}.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3784 wrote to memory of 1496 3784 2024-01-11_7865d41c4b524454773eafecbf07bc45_goldeneye.exe 98 PID 3784 wrote to memory of 1496 3784 2024-01-11_7865d41c4b524454773eafecbf07bc45_goldeneye.exe 98 PID 3784 wrote to memory of 1496 3784 2024-01-11_7865d41c4b524454773eafecbf07bc45_goldeneye.exe 98 PID 3784 wrote to memory of 1636 3784 2024-01-11_7865d41c4b524454773eafecbf07bc45_goldeneye.exe 99 PID 3784 wrote to memory of 1636 3784 2024-01-11_7865d41c4b524454773eafecbf07bc45_goldeneye.exe 99 PID 3784 wrote to memory of 1636 3784 2024-01-11_7865d41c4b524454773eafecbf07bc45_goldeneye.exe 99 PID 1496 wrote to memory of 4936 1496 {7A86FFF9-121E-4ae5-8EA8-66AF25039E5A}.exe 101 PID 1496 wrote to memory of 4936 1496 {7A86FFF9-121E-4ae5-8EA8-66AF25039E5A}.exe 101 PID 1496 wrote to memory of 4936 1496 {7A86FFF9-121E-4ae5-8EA8-66AF25039E5A}.exe 101 PID 1496 wrote to memory of 1820 1496 {7A86FFF9-121E-4ae5-8EA8-66AF25039E5A}.exe 100 PID 1496 wrote to memory of 1820 1496 {7A86FFF9-121E-4ae5-8EA8-66AF25039E5A}.exe 100 PID 1496 wrote to memory of 1820 1496 {7A86FFF9-121E-4ae5-8EA8-66AF25039E5A}.exe 100 PID 4936 wrote to memory of 3604 4936 {7B918265-BC5F-49d6-859B-64D4EF962B31}.exe 105 PID 4936 wrote to memory of 3604 4936 {7B918265-BC5F-49d6-859B-64D4EF962B31}.exe 105 PID 4936 wrote to memory of 3604 4936 {7B918265-BC5F-49d6-859B-64D4EF962B31}.exe 105 PID 4936 wrote to memory of 404 4936 {7B918265-BC5F-49d6-859B-64D4EF962B31}.exe 104 PID 4936 wrote to memory of 404 4936 {7B918265-BC5F-49d6-859B-64D4EF962B31}.exe 104 PID 4936 wrote to memory of 404 4936 {7B918265-BC5F-49d6-859B-64D4EF962B31}.exe 104 PID 3604 wrote to memory of 2952 3604 {427D85F2-CF49-4c2f-B05F-20FC48A8BC6E}.exe 107 PID 3604 wrote to memory of 2952 3604 {427D85F2-CF49-4c2f-B05F-20FC48A8BC6E}.exe 107 PID 3604 wrote to memory of 2952 3604 {427D85F2-CF49-4c2f-B05F-20FC48A8BC6E}.exe 107 PID 3604 wrote to memory of 544 3604 {427D85F2-CF49-4c2f-B05F-20FC48A8BC6E}.exe 106 PID 3604 wrote to memory of 544 3604 {427D85F2-CF49-4c2f-B05F-20FC48A8BC6E}.exe 106 PID 3604 wrote to memory of 544 3604 {427D85F2-CF49-4c2f-B05F-20FC48A8BC6E}.exe 106 PID 2952 wrote to memory of 1540 2952 {062ECE3B-395B-472a-903B-E3BC765432DF}.exe 109 PID 2952 wrote to memory of 1540 2952 {062ECE3B-395B-472a-903B-E3BC765432DF}.exe 109 PID 2952 wrote to memory of 1540 2952 {062ECE3B-395B-472a-903B-E3BC765432DF}.exe 109 PID 2952 wrote to memory of 4612 2952 {062ECE3B-395B-472a-903B-E3BC765432DF}.exe 108 PID 2952 wrote to memory of 4612 2952 {062ECE3B-395B-472a-903B-E3BC765432DF}.exe 108 PID 2952 wrote to memory of 4612 2952 {062ECE3B-395B-472a-903B-E3BC765432DF}.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-11_7865d41c4b524454773eafecbf07bc45_goldeneye.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-11_7865d41c4b524454773eafecbf07bc45_goldeneye.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\{7A86FFF9-121E-4ae5-8EA8-66AF25039E5A}.exeC:\Windows\{7A86FFF9-121E-4ae5-8EA8-66AF25039E5A}.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7A86F~1.EXE > nul3⤵PID:1820
-
-
C:\Windows\{7B918265-BC5F-49d6-859B-64D4EF962B31}.exeC:\Windows\{7B918265-BC5F-49d6-859B-64D4EF962B31}.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{7B918~1.EXE > nul4⤵PID:404
-
-
C:\Windows\{427D85F2-CF49-4c2f-B05F-20FC48A8BC6E}.exeC:\Windows\{427D85F2-CF49-4c2f-B05F-20FC48A8BC6E}.exe4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{427D8~1.EXE > nul5⤵PID:544
-
-
C:\Windows\{062ECE3B-395B-472a-903B-E3BC765432DF}.exeC:\Windows\{062ECE3B-395B-472a-903B-E3BC765432DF}.exe5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{062EC~1.EXE > nul6⤵PID:4612
-
-
C:\Windows\{E84CA04D-5DB9-45be-AE0F-CDD64FDAADAC}.exeC:\Windows\{E84CA04D-5DB9-45be-AE0F-CDD64FDAADAC}.exe6⤵
- Executes dropped EXE
PID:1540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{E84CA~1.EXE > nul7⤵PID:456
-
-
C:\Windows\{585EA477-2702-4ec8-8CCB-C73AEFE78910}.exeC:\Windows\{585EA477-2702-4ec8-8CCB-C73AEFE78910}.exe7⤵PID:3056
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{585EA~1.EXE > nul8⤵PID:968
-
-
C:\Windows\{3722C96F-1A79-4a06-901B-03936F5605D8}.exeC:\Windows\{3722C96F-1A79-4a06-901B-03936F5605D8}.exe8⤵PID:3024
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{3722C~1.EXE > nul9⤵PID:4332
-
-
C:\Windows\{B686343E-08D6-42b8-9AFB-5B0D2643F923}.exeC:\Windows\{B686343E-08D6-42b8-9AFB-5B0D2643F923}.exe9⤵PID:8
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{B6863~1.EXE > nul10⤵PID:64
-
-
C:\Windows\{8588C0E3-8CC5-4408-865C-F8823AD4C8D6}.exeC:\Windows\{8588C0E3-8CC5-4408-865C-F8823AD4C8D6}.exe10⤵PID:3004
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{8588C~1.EXE > nul11⤵PID:3208
-
-
C:\Windows\{90730AA7-2C3D-466d-8E44-D4BF8C851720}.exeC:\Windows\{90730AA7-2C3D-466d-8E44-D4BF8C851720}.exe11⤵PID:4724
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\{90730~1.EXE > nul12⤵PID:3324
-
-
C:\Windows\{3A830CBE-5110-4a14-BB5E-5133B1167186}.exeC:\Windows\{3A830CBE-5110-4a14-BB5E-5133B1167186}.exe12⤵PID:556
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul2⤵PID:1636
-