Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    155s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/01/2024, 00:33 UTC

General

  • Target

    2024-01-26_66df83b4656869eefb369c65fabebc92_goldeneye.exe

  • Size

    372KB

  • MD5

    66df83b4656869eefb369c65fabebc92

  • SHA1

    c48f2936456db8e002839828bfbfcf321378a409

  • SHA256

    a60e41b03d814e431bf72b084bf0369775272ba0687086016b20856212fc91d4

  • SHA512

    5570cac2367d35143a3caab225e76c04a91b4f974b07c3cd248401f03d22cd10b75770c7b8eb33980d7ba46b8ae70196a648715e921d455f1976aeaee04f06d3

  • SSDEEP

    3072:CEGh0ommlJOiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBE:CEG5l/Oe2MUVg3vTeKcAEciTBqr3

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-01-26_66df83b4656869eefb369c65fabebc92_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-01-26_66df83b4656869eefb369c65fabebc92_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4648
    • C:\Windows\{5BC6B50F-261E-4ce6-9BA3-7193D5A7CCC0}.exe
      C:\Windows\{5BC6B50F-261E-4ce6-9BA3-7193D5A7CCC0}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1068
      • C:\Windows\{39A255E0-6052-422a-A9C4-22522840458D}.exe
        C:\Windows\{39A255E0-6052-422a-A9C4-22522840458D}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4248
        • C:\Windows\{798F5A8B-E292-4bfc-8885-E512AA821F05}.exe
          C:\Windows\{798F5A8B-E292-4bfc-8885-E512AA821F05}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2636
          • C:\Windows\{7C168ACD-3A82-4bc2-B051-BB07D52C92D7}.exe
            C:\Windows\{7C168ACD-3A82-4bc2-B051-BB07D52C92D7}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4960
            • C:\Windows\{8260C0C9-C0C7-4ca7-8442-B95187799896}.exe
              C:\Windows\{8260C0C9-C0C7-4ca7-8442-B95187799896}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4676
              • C:\Windows\{6124B61D-1157-4e88-A184-23EF13D340FA}.exe
                C:\Windows\{6124B61D-1157-4e88-A184-23EF13D340FA}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2140
                • C:\Windows\{44D6FE23-8EED-4fce-95E4-98D17CA9625B}.exe
                  C:\Windows\{44D6FE23-8EED-4fce-95E4-98D17CA9625B}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1512
                  • C:\Windows\{DAA78C05-16E1-4448-BCE5-B234F6A17025}.exe
                    C:\Windows\{DAA78C05-16E1-4448-BCE5-B234F6A17025}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:4228
                    • C:\Windows\{2DAB7A87-204E-4de4-87F1-197374D41EA5}.exe
                      C:\Windows\{2DAB7A87-204E-4de4-87F1-197374D41EA5}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:4144
                      • C:\Windows\{699DDEFC-A165-4fd5-AED6-82FF888F43E8}.exe
                        C:\Windows\{699DDEFC-A165-4fd5-AED6-82FF888F43E8}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:3596
                        • C:\Windows\{69C73602-07BA-4375-B818-CE086149CAF8}.exe
                          C:\Windows\{69C73602-07BA-4375-B818-CE086149CAF8}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:3384
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{699DD~1.EXE > nul
                          12⤵
                            PID:4892
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{2DAB7~1.EXE > nul
                          11⤵
                            PID:3164
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{DAA78~1.EXE > nul
                          10⤵
                            PID:4428
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{44D6F~1.EXE > nul
                          9⤵
                            PID:4480
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{6124B~1.EXE > nul
                          8⤵
                            PID:1328
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{8260C~1.EXE > nul
                          7⤵
                            PID:3320
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{7C168~1.EXE > nul
                          6⤵
                            PID:3520
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{798F5~1.EXE > nul
                          5⤵
                            PID:5116
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{39A25~1.EXE > nul
                          4⤵
                            PID:1476
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{5BC6B~1.EXE > nul
                          3⤵
                            PID:3908
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                            PID:1732

                        Network

                        • flag-us
                          DNS
                          104.219.191.52.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          104.219.191.52.in-addr.arpa
                          IN PTR
                          Response
                        • flag-us
                          DNS
                          194.178.17.96.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          194.178.17.96.in-addr.arpa
                          IN PTR
                          Response
                          194.178.17.96.in-addr.arpa
                          IN PTR
                          a96-17-178-194deploystaticakamaitechnologiescom
                        • flag-us
                          DNS
                          86.23.85.13.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          86.23.85.13.in-addr.arpa
                          IN PTR
                          Response
                        • flag-us
                          DNS
                          198.187.3.20.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          198.187.3.20.in-addr.arpa
                          IN PTR
                          Response
                        • flag-us
                          DNS
                          140.71.91.104.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          140.71.91.104.in-addr.arpa
                          IN PTR
                          Response
                          140.71.91.104.in-addr.arpa
                          IN PTR
                          a104-91-71-140deploystaticakamaitechnologiescom
                        • flag-us
                          DNS
                          72.32.126.40.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          72.32.126.40.in-addr.arpa
                          IN PTR
                          Response
                        • flag-us
                          DNS
                          95.221.229.192.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          95.221.229.192.in-addr.arpa
                          IN PTR
                          Response
                        • flag-us
                          DNS
                          183.142.211.20.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          183.142.211.20.in-addr.arpa
                          IN PTR
                          Response
                        • flag-us
                          DNS
                          183.142.211.20.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          183.142.211.20.in-addr.arpa
                          IN PTR
                        • flag-us
                          DNS
                          209.205.72.20.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          209.205.72.20.in-addr.arpa
                          IN PTR
                          Response
                        • flag-us
                          DNS
                          79.121.231.20.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          79.121.231.20.in-addr.arpa
                          IN PTR
                          Response
                        • flag-us
                          DNS
                          114.110.16.96.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          114.110.16.96.in-addr.arpa
                          IN PTR
                          Response
                          114.110.16.96.in-addr.arpa
                          IN PTR
                          a96-16-110-114deploystaticakamaitechnologiescom
                        • flag-us
                          DNS
                          21.236.111.52.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          21.236.111.52.in-addr.arpa
                          IN PTR
                          Response
                        • flag-us
                          DNS
                          173.178.17.96.in-addr.arpa
                          Remote address:
                          8.8.8.8:53
                          Request
                          173.178.17.96.in-addr.arpa
                          IN PTR
                          Response
                          173.178.17.96.in-addr.arpa
                          IN PTR
                          a96-17-178-173deploystaticakamaitechnologiescom
                        No results found
                        • 8.8.8.8:53
                          104.219.191.52.in-addr.arpa
                          dns
                          73 B
                          147 B
                          1
                          1

                          DNS Request

                          104.219.191.52.in-addr.arpa

                        • 8.8.8.8:53
                          194.178.17.96.in-addr.arpa
                          dns
                          72 B
                          137 B
                          1
                          1

                          DNS Request

                          194.178.17.96.in-addr.arpa

                        • 8.8.8.8:53
                          86.23.85.13.in-addr.arpa
                          dns
                          70 B
                          144 B
                          1
                          1

                          DNS Request

                          86.23.85.13.in-addr.arpa

                        • 8.8.8.8:53
                          198.187.3.20.in-addr.arpa
                          dns
                          71 B
                          157 B
                          1
                          1

                          DNS Request

                          198.187.3.20.in-addr.arpa

                        • 8.8.8.8:53
                          140.71.91.104.in-addr.arpa
                          dns
                          72 B
                          137 B
                          1
                          1

                          DNS Request

                          140.71.91.104.in-addr.arpa

                        • 8.8.8.8:53
                          72.32.126.40.in-addr.arpa
                          dns
                          71 B
                          157 B
                          1
                          1

                          DNS Request

                          72.32.126.40.in-addr.arpa

                        • 8.8.8.8:53
                          95.221.229.192.in-addr.arpa
                          dns
                          73 B
                          144 B
                          1
                          1

                          DNS Request

                          95.221.229.192.in-addr.arpa

                        • 8.8.8.8:53
                          183.142.211.20.in-addr.arpa
                          dns
                          146 B
                          159 B
                          2
                          1

                          DNS Request

                          183.142.211.20.in-addr.arpa

                          DNS Request

                          183.142.211.20.in-addr.arpa

                        • 8.8.8.8:53
                          209.205.72.20.in-addr.arpa
                          dns
                          72 B
                          158 B
                          1
                          1

                          DNS Request

                          209.205.72.20.in-addr.arpa

                        • 8.8.8.8:53
                          79.121.231.20.in-addr.arpa
                          dns
                          72 B
                          158 B
                          1
                          1

                          DNS Request

                          79.121.231.20.in-addr.arpa

                        • 8.8.8.8:53
                          114.110.16.96.in-addr.arpa
                          dns
                          72 B
                          137 B
                          1
                          1

                          DNS Request

                          114.110.16.96.in-addr.arpa

                        • 8.8.8.8:53
                          21.236.111.52.in-addr.arpa
                          dns
                          72 B
                          158 B
                          1
                          1

                          DNS Request

                          21.236.111.52.in-addr.arpa

                        • 8.8.8.8:53
                          173.178.17.96.in-addr.arpa
                          dns
                          72 B
                          137 B
                          1
                          1

                          DNS Request

                          173.178.17.96.in-addr.arpa

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Windows\{2DAB7A87-204E-4de4-87F1-197374D41EA5}.exe

                          Filesize

                          372KB

                          MD5

                          0ce898710ba14bfec1eb58c415f40a45

                          SHA1

                          cbb003ffcfd0247f8832eb5f085c63227a2bba5d

                          SHA256

                          44ca6375bf24f1a7f9f8dc5a6993ed51239658ad7c135bf5f3a788a8b6d1f7ef

                          SHA512

                          5f42bdb2ffc09bbdf9a3e8842730965eead65f8923b6d014cef5366409822183811d6ec1f837ebd5a5ee9dfcddd8400ca8efe9f2ef33e3e8fdca8e20427e7551

                        • C:\Windows\{39A255E0-6052-422a-A9C4-22522840458D}.exe

                          Filesize

                          372KB

                          MD5

                          b2b5be56df6d34317731565a5d78a68d

                          SHA1

                          c2bfb1c1e26c9fb0b556091a47950fe5aae539a5

                          SHA256

                          3a96543d8bd9ace265655c6809373da6627eb53361d44dd398d6f71cbb1fa66d

                          SHA512

                          ee6b08237174137b72c43cf12ad9601a5b2f04a4850bf9cead3f2ee8833e1cbf3924e82e12bdc1c8937202027fe79887477330dbf2fe4f789565dbb9c4aae17d

                        • C:\Windows\{44D6FE23-8EED-4fce-95E4-98D17CA9625B}.exe

                          Filesize

                          372KB

                          MD5

                          eba808fc2cde011da5b997d85e11a2cc

                          SHA1

                          416c9dedb78818ac609999c0e17563ad51f6c6ad

                          SHA256

                          f3b76294c07b3e5e24951fe559bbbcc6416e9ea860b00ad50ca71975195366a4

                          SHA512

                          e593d9a88d881489da17a2d11cc260c314f9c201a3f6b6f28f8264b939edf385e608b30d3648ee5e6a7f8fc1ed07c600b47158cd4ac7643f0e2cbe3beb8be482

                        • C:\Windows\{5BC6B50F-261E-4ce6-9BA3-7193D5A7CCC0}.exe

                          Filesize

                          372KB

                          MD5

                          d6f431c3ed3c15b53bba69840795ed2b

                          SHA1

                          e36e2887549159c75cb64f8cd0ee7fd97612921b

                          SHA256

                          1b644de365ad39766411e9e7d9c28ee2f30cd66dab8f115a0ed84c253fef23a0

                          SHA512

                          5ad9bc4006b82e748bca9a30ca66724d96cff02714b48f1688a40ac89718466352a1b53a0f1940301ee0b2d3e95d264706f6c3a98881c22a25448ceb277b7689

                        • C:\Windows\{6124B61D-1157-4e88-A184-23EF13D340FA}.exe

                          Filesize

                          372KB

                          MD5

                          2c397c294e5e4a2bbcd2ea785a373868

                          SHA1

                          15adadb97a92072065ded96940726d1ea336a4bc

                          SHA256

                          983062767d1caa37c5fd0336fea73eae9ef27e67945b73e4b9b23c3ef8697b95

                          SHA512

                          7d96a2ae3b392d01781346641edc9a222e2f7f7dd582fa37406987d76305b109fee33eaf15419f28367ebe129ab7b6eaf14dd972ed48529394edc196cec623be

                        • C:\Windows\{699DDEFC-A165-4fd5-AED6-82FF888F43E8}.exe

                          Filesize

                          372KB

                          MD5

                          f242e4fc839f0baa897d3c797b8fe32d

                          SHA1

                          c0e18f518ef4d7ab14fcb975cd7f0886aaecab4b

                          SHA256

                          73df5be888419529fa97a80d3c9756074f2fe5670a02bbd4d2d3f5919ec94aa4

                          SHA512

                          b7b3a09cf5993c9f368f050a0e7c6a44415a9c34c4d056b02c387e46e285a373962eabadf972600a6506db60d2f455164eeb38b8ba65951b8e9acd3f0c3b4cb6

                        • C:\Windows\{69C73602-07BA-4375-B818-CE086149CAF8}.exe

                          Filesize

                          372KB

                          MD5

                          761332db0c7cffdfd87a657d97d0043b

                          SHA1

                          707dda524ee321544c67f52d746e18fc4d0bd901

                          SHA256

                          6149c4feb34dbc802d76d288b1995f39831d979224d3f2bc1c5b78f0d76d49d2

                          SHA512

                          0b858be199c81aa9b5bb00fe35400f555a88b4e199d10f6f6241bd0a643d8d69fe399900f3728e0a6a892ca57edb38edad75155c972c16b0d12eeda9a8949950

                        • C:\Windows\{798F5A8B-E292-4bfc-8885-E512AA821F05}.exe

                          Filesize

                          372KB

                          MD5

                          94adaecb43fdb08b395a568c9d5396e7

                          SHA1

                          b73f40ccb9a0670919f79ca54d3e3d6c2d905ab9

                          SHA256

                          02ad9bcfb1015fb7ee3101b49902a53cc88c1a65e4f016623915a9b474df18ad

                          SHA512

                          f836761cad65b1c5dd15c9b41f2c6d2ff6e9da4bc665001c8223dd535207d3b9cf5118a224b8cbe9a793f503161cac62ff17e0648822690c64b7e00608061f7d

                        • C:\Windows\{7C168ACD-3A82-4bc2-B051-BB07D52C92D7}.exe

                          Filesize

                          372KB

                          MD5

                          92c1c05491f57d2660fa9973d05377ed

                          SHA1

                          918be27dfb3166cc42c9cc4d2ad744112467d34a

                          SHA256

                          035a8aa3167586e8a882c5286ed92c0fd64540c976972f8099c175868527bb95

                          SHA512

                          54857fb836c9ceff22bdee77cb3a69ea90cfe894a9b1ed71e5b1edb2532174695a58d30f1a617a5667c3fd836f982c57be5ccd4d278ac42cdbab9090131d791e

                        • C:\Windows\{8260C0C9-C0C7-4ca7-8442-B95187799896}.exe

                          Filesize

                          372KB

                          MD5

                          6c3b41cd9cc4a4852e58686ef9863ffb

                          SHA1

                          d2bcd7a708da08a1be74ece04cd9e08515c89459

                          SHA256

                          cabab38056b8ab9db5c14f166eca734955d3daac09b5f1eb67f5a60c8760c28c

                          SHA512

                          497348e46d4cd2347f8690d5485942b466c667da4b87b45bad89d70b85596c89d8003a908d270438ef5408af3a15b04ab5d147cb4be33382574c604f113c6292

                        • C:\Windows\{DAA78C05-16E1-4448-BCE5-B234F6A17025}.exe

                          Filesize

                          372KB

                          MD5

                          c37963bee46dd9108102650ce167c8c6

                          SHA1

                          d05c0ba4aa701cabf8cdb0447176e56f40d4ad47

                          SHA256

                          b9455f1c963c56e830d29a2e1386ad332b9f18767d2451304c2bdcf8e0520dc2

                          SHA512

                          d6ba681fb3055c4ea37b01bd32d2edff7f68a8a558b66e714c48ca8379f66fec3ed32e6a98d9ee6da5d2d854f2ef581a26ef817a4b80754a83f6f3d33f522187

                        We care about your privacy.

                        This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.