Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    04/02/2024, 03:59 UTC

General

  • Target

    2024-02-04_d8fba6b8bd61293524fbbb30b58a026a_goldeneye.exe

  • Size

    197KB

  • MD5

    d8fba6b8bd61293524fbbb30b58a026a

  • SHA1

    3089586e7b948bb9a8d6c69279d657529951fa0e

  • SHA256

    5ffdf5e37692b1b1316b8e8e112ae5b2bef04d2e4073af4aa16268be0d16f702

  • SHA512

    25097454762d3e30bd562b9f1d63886d99ede667840c5a77b572b8aac985d8122fb6b4c4014d41b9e16e656d2a6527b9603c522a9cb2242b7591d776cc125a3a

  • SSDEEP

    3072:jEGh0oLl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEGFlEeKcAEca

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 18 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-04_d8fba6b8bd61293524fbbb30b58a026a_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-04_d8fba6b8bd61293524fbbb30b58a026a_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
      2⤵
      • Deletes itself
      PID:1676
    • C:\Windows\{640CB9B4-4392-41c0-8233-955CB4A86BE9}.exe
      C:\Windows\{640CB9B4-4392-41c0-8233-955CB4A86BE9}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2996
      • C:\Windows\{C3C9C44E-02DF-4438-BFC6-5C2A6ABF96FD}.exe
        C:\Windows\{C3C9C44E-02DF-4438-BFC6-5C2A6ABF96FD}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2660
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{C3C9C~1.EXE > nul
          4⤵
            PID:2484
          • C:\Windows\{9AF93722-1B4B-4ecb-95B3-0C894E61C93E}.exe
            C:\Windows\{9AF93722-1B4B-4ecb-95B3-0C894E61C93E}.exe
            4⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1688
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c del C:\Windows\{9AF93~1.EXE > nul
              5⤵
                PID:2936
              • C:\Windows\{150EFD63-9304-4b2b-A236-75F8A4BB4A72}.exe
                C:\Windows\{150EFD63-9304-4b2b-A236-75F8A4BB4A72}.exe
                5⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2508
                • C:\Windows\{31C32CED-F8EE-43ee-9859-B288B4F7C517}.exe
                  C:\Windows\{31C32CED-F8EE-43ee-9859-B288B4F7C517}.exe
                  6⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2792
                  • C:\Windows\{87B2CB82-360B-429e-8B11-379F10D60E45}.exe
                    C:\Windows\{87B2CB82-360B-429e-8B11-379F10D60E45}.exe
                    7⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2784
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{87B2C~1.EXE > nul
                      8⤵
                        PID:2280
                      • C:\Windows\{763CEBE1-A28A-42fb-88FF-4838B176968B}.exe
                        C:\Windows\{763CEBE1-A28A-42fb-88FF-4838B176968B}.exe
                        8⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:2764
                        • C:\Windows\{5A468033-3021-4454-933D-212EC656EDE0}.exe
                          C:\Windows\{5A468033-3021-4454-933D-212EC656EDE0}.exe
                          9⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1660
                          • C:\Windows\{8CAA043B-6813-43df-8C2F-3B4DFCB515C3}.exe
                            C:\Windows\{8CAA043B-6813-43df-8C2F-3B4DFCB515C3}.exe
                            10⤵
                            • Modifies Installed Components in the registry
                            • Executes dropped EXE
                            • Drops file in Windows directory
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2336
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{8CAA0~1.EXE > nul
                              11⤵
                                PID:488
                              • C:\Windows\{016758CE-BA59-403b-BD0E-59CBE5A9551E}.exe
                                C:\Windows\{016758CE-BA59-403b-BD0E-59CBE5A9551E}.exe
                                11⤵
                                • Modifies Installed Components in the registry
                                • Executes dropped EXE
                                • Drops file in Windows directory
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1636
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{01675~1.EXE > nul
                                  12⤵
                                    PID:1016
                                  • C:\Windows\{198FA6D5-327F-47f9-A33F-697F4A19E70C}.exe
                                    C:\Windows\{198FA6D5-327F-47f9-A33F-697F4A19E70C}.exe
                                    12⤵
                                    • Executes dropped EXE
                                    PID:1204
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{5A468~1.EXE > nul
                                10⤵
                                  PID:2304
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{763CE~1.EXE > nul
                                9⤵
                                  PID:1092
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{31C32~1.EXE > nul
                              7⤵
                                PID:1876
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{150EF~1.EXE > nul
                              6⤵
                                PID:2544
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{640CB~1.EXE > nul
                          3⤵
                            PID:2868

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\{016758CE-BA59-403b-BD0E-59CBE5A9551E}.exe

                        Filesize

                        45KB

                        MD5

                        8a7e03a2b153861ea3a24f36ecd5adc2

                        SHA1

                        fe279bc119d7264c347535ad6fe151cced522b1a

                        SHA256

                        19d662e92d005ede17195efcbaf7e352c27e29682ff0481e47181f00f27616aa

                        SHA512

                        020f9c622d306a3d7b0a60da53514b67aaf7a76589f05e6a356569af97a5ce0d172048906842e1f11e1b3ee6751dd93c7b76b5fc70b89d93878a81b65c3aee75

                      • C:\Windows\{016758CE-BA59-403b-BD0E-59CBE5A9551E}.exe

                        Filesize

                        197KB

                        MD5

                        b00d375d294a54bd3382485a00c6da07

                        SHA1

                        f850f20088e7304c70f2739f0cfd8d261595ea6a

                        SHA256

                        7e00b98c327134a572ea63fdbf53726267ca89ac10b8b2e7884e73b25f4a5d27

                        SHA512

                        317c2a8093b4983301dabb5e4a1f26aeb48ca337ad4b3b54b240dd4bab8ac99393a41994cd7f0ba818ff2766695f904aac0f5fcc039d1a99716c8ed3e423da00

                      • C:\Windows\{150EFD63-9304-4b2b-A236-75F8A4BB4A72}.exe

                        Filesize

                        42KB

                        MD5

                        13835fc2b6586124701a7e25c805b05a

                        SHA1

                        a23139abd5a4232b531edf8a453bc929d0718347

                        SHA256

                        a0adb2977a539f4896f4454767a012d4aa1dba360506a55656b0d6162c88067d

                        SHA512

                        dc7ef1a2c94dbd47ceb68809fbba07d3f6eee6a93b91f4155b2e610242379e06aa0a7bd0b5221f5a1d457a4263b1e00dc002ea258ddf585077280e0978c7e4fe

                      • C:\Windows\{150EFD63-9304-4b2b-A236-75F8A4BB4A72}.exe

                        Filesize

                        197KB

                        MD5

                        5f2bf9f0b54acf77d333d9cdd870a234

                        SHA1

                        2604431728094948f47e04510d34e2810777344b

                        SHA256

                        d90b72339d0e91d40d72ad7b5c1386d6bda2b703cd984b482aace9e9e71533ce

                        SHA512

                        945f67904f6932eb521efa4832eaaeb67af29e5812b94ae80cecf236ef90072ad010ec26260a38f67ff7d0c348b4bbf5e73ee4f8b3cf05166f41eacb79a2353e

                      • C:\Windows\{198FA6D5-327F-47f9-A33F-697F4A19E70C}.exe

                        Filesize

                        197KB

                        MD5

                        206bbb2b31fd3773dffbc03bc383803b

                        SHA1

                        3d8764cdf62b8859eaa3dcf7b438e20c2a51a9a1

                        SHA256

                        f613b4cdbf36a4388ae7ce8b22daa1353f6dc7434b6da7f54e834f5e8f5ba61e

                        SHA512

                        f4d7fd6c99ea143d8f9fa8c204809572e1ea0cd73ad4fc5d03e2e073ff41835680a7d8359e62fd4e289aa9e2a2ead44ce46153f1f0f8adba80eeb9e34ee5d96d

                      • C:\Windows\{31C32CED-F8EE-43ee-9859-B288B4F7C517}.exe

                        Filesize

                        197KB

                        MD5

                        1294c8837e58f1ecf63f953d36cf80d6

                        SHA1

                        cf2dfe11cfd3107124b2674ba1a41b3487226527

                        SHA256

                        46dc8535e507b95ae9f56b9fff0c17bad88ccd7a1acbc1409a010157c3632486

                        SHA512

                        94439bab09d6d50668a105212b4ff1600769d3c1bffb06e940720dc2d096b2041f29976e3535fa2d49c04b5ae0ce8d0afcdd5e47a48168c62d4b578e13d9264a

                      • C:\Windows\{5A468033-3021-4454-933D-212EC656EDE0}.exe

                        Filesize

                        197KB

                        MD5

                        1593bc64670c0b0f8d16350f0c6e887c

                        SHA1

                        f4b17b5f043f26fac54712ef4a6bf4a71bae8f94

                        SHA256

                        37e05587a43869f8ecae1247d9db939cb399df5b9a3b451bf739641dcb7a84a5

                        SHA512

                        86aaefbeb9e09280fa27c935f073160ed6c9b8c318f5deaae3f58fc1ea6e3eabe35f958c8702304b1aa642cfc18b28d02feb887f86a158f5d5876429245beac7

                      • C:\Windows\{5A468033-3021-4454-933D-212EC656EDE0}.exe

                        Filesize

                        92KB

                        MD5

                        2c3fe51adaf736b839bf1ea85ed766c4

                        SHA1

                        65f7e9bf5e9abfb2f63c9f2439a1f99338f4ff99

                        SHA256

                        f02027586495638415f2738c5d18c9bc5386163c5f6a1848aba06d3e063eae0f

                        SHA512

                        0b7386838c64338c299abc27da0de88f4cd2dd45afd4ceb5cd42341ebac52434f2e120bd6840491188655edb640da14317a81870bc5c2068384e84f60ce0fd4f

                      • C:\Windows\{640CB9B4-4392-41c0-8233-955CB4A86BE9}.exe

                        Filesize

                        157KB

                        MD5

                        3b4ac05a562c2e4ae3bd8a6293379dfb

                        SHA1

                        c199cf2ea70d1fb23f37985565d24c1803f9a364

                        SHA256

                        5f74d1e51cf05122775591a547743e3abb07e5b9b13e6917185afa6bd54e1421

                        SHA512

                        834ee50693d3c722708aaf8c8d3e92632798ca576bd0fc6245b4b42c8058c85d3e7f4012382ac05d6eced21bd1fc261faaa17fe27ed69f33915b8b616e6f2acf

                      • C:\Windows\{640CB9B4-4392-41c0-8233-955CB4A86BE9}.exe

                        Filesize

                        197KB

                        MD5

                        637ef4471f01d114d8e4a8fde957e326

                        SHA1

                        f8331b5105158e33aeed75fba96fb7e110e251d2

                        SHA256

                        93b052f2dd78e49f72ae2c69fd21ca956ebd2c0e3eccc790e5ee54eb6cdd62c3

                        SHA512

                        bd35b1d72256d796ca2f782bb33f501307ba5d8baf43fb654a25363a612c19b0523f2fc5ca3ce788270df1f9811de5d7e4e2a555b0edb67be321beabedd0e0d8

                      • C:\Windows\{763CEBE1-A28A-42fb-88FF-4838B176968B}.exe

                        Filesize

                        197KB

                        MD5

                        9e2a603d2376300ab3d787c5b393b05c

                        SHA1

                        d5ac29e6c93f1b995e73d90dd78bd25bfae34dde

                        SHA256

                        5d9dc29f7ff57ef42fd68cbfd8ebd7715cbf2c25e1944215b0a678c0f7119177

                        SHA512

                        574303f60454a2746ed4476ef4f919893e8b303a05512a9da7f606d47e78d6bf0e76aaa820d60bf29d1c16019f0fa3ec4dbd8002df62d8c30fe0c8aa64a12c62

                      • C:\Windows\{87B2CB82-360B-429e-8B11-379F10D60E45}.exe

                        Filesize

                        197KB

                        MD5

                        8d22287112f8aa13fa94cce952eb26e5

                        SHA1

                        ba09ba5d280fa232b5921f507ad89ca1adca8b8b

                        SHA256

                        33301f006ccbbdbf4bdf14b1c3cb33107ad0e9d75c642c97f0d094214235000c

                        SHA512

                        a440733df24c872543c1ac727d4e6a4d706c448e3b6dfa68960401d1dc40b33244b0c65fdf43501c9b13ace7e805459f4222e31cb9136804bb6fce6f65f1269d

                      • C:\Windows\{8CAA043B-6813-43df-8C2F-3B4DFCB515C3}.exe

                        Filesize

                        65KB

                        MD5

                        a44dbbc4222b38860b8e1283fc0977bd

                        SHA1

                        05c34c0d7422bc8762f3c1dfe3b5438aa88ce0d9

                        SHA256

                        542f9e36a05a77539e56e7ca4a682ac73200be58393531d22b2d5d8c28a9b0c3

                        SHA512

                        9c937983fc681196dd39be854dbedf559f0e741acc9648419d692a12e6d7926ac7091dfd4259f10b65f92160a50941ebcf2035a0d1bbfe503dbf30fa786ff5b2

                      • C:\Windows\{8CAA043B-6813-43df-8C2F-3B4DFCB515C3}.exe

                        Filesize

                        60KB

                        MD5

                        7bf709001d3c13549f79561eed30aa00

                        SHA1

                        bae9828e2832804e4fa3b7b946c58425646ee8e8

                        SHA256

                        67f9184634d727c820ded31cc1676cc2b80544c7e98e4e45129a7337ce41503e

                        SHA512

                        42752351b46036cc4d35a9a1dc4e99e8ce8092c6d660b6dc253f7532d9607679b2d4e1a38a0fd2db0c7d2ac4bd7ac9473c73983ee7c831d91de2afd180b009d3

                      • C:\Windows\{9AF93722-1B4B-4ecb-95B3-0C894E61C93E}.exe

                        Filesize

                        52KB

                        MD5

                        b896d58033c86f3726a77848608cd415

                        SHA1

                        9229195fe3b86d921544ed172d82f59c5bc4348e

                        SHA256

                        93060d9079814843de19f09f095e0950b2da63d5f0ae40f276bb81e5fc07ed37

                        SHA512

                        811d20b2218435e10811d7fbe9ab9f213a9eea44372717dcd09228aea9d84e73481f3136199a2f352ee6d4fb7954fd7bc2e4ad18a68ab809885830762c27b3f3

                      • C:\Windows\{9AF93722-1B4B-4ecb-95B3-0C894E61C93E}.exe

                        Filesize

                        23KB

                        MD5

                        1b2f83915f0c5e4c2705ce2166492953

                        SHA1

                        260ea004042179236104a10bae2e5189a0cc3287

                        SHA256

                        4cfd64b8cfdcba273f8527ccebb96b7c905d5c6f761facf4272a253fa2165442

                        SHA512

                        f782fa53c83a6dff8ebf69036c7619f87906cad83d3e9751f1be9bfcb9976b7644ddae1dba577d553421624759010239a14e509adaee3de67662152ba01dd732

                      • C:\Windows\{C3C9C44E-02DF-4438-BFC6-5C2A6ABF96FD}.exe

                        Filesize

                        114KB

                        MD5

                        41d7d27d82e64b91fa7c6c13a19f8dfc

                        SHA1

                        87b34d1b0396e0603b40dbb1a50ae9fe052406a3

                        SHA256

                        6a85fa81db4a87a009ab92a16fc0a1be2b83f35bba471c920cce2eafdafac4b5

                        SHA512

                        b7ae19fcc71a65e21ee4d2db70783c0ed174c870d2acf7ebb3d225ca5f2a3d54d697ca43ec3608317b80641c73bfa79c0e83d3cfecee45dc4ec67f656e467b9b

                      We care about your privacy.

                      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.