Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    13/02/2024, 17:50

General

  • Target

    2024-02-13_632e996f941eb8b629da9f7149609861_goldeneye.exe

  • Size

    216KB

  • MD5

    632e996f941eb8b629da9f7149609861

  • SHA1

    83518d294c1517ac2e51d2b86c56dbc74aa247fe

  • SHA256

    49878940f3463858d85db3d0623fad9acf32c61a002556f651ae670eb59cac5a

  • SHA512

    28fa12b26b33ccf8f17f5571051a1039cb4c81bc096f9a98b9f4d8a5f78d5feecc182938b6fec6958918890fbd26648fa2deca09b2ccb5dc4ccf1b0358660e48

  • SSDEEP

    3072:jEGh0o+l+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMUy:jEG0lEeKcAEcGy

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-13_632e996f941eb8b629da9f7149609861_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-13_632e996f941eb8b629da9f7149609861_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2124
    • C:\Windows\{2B45E30C-2F19-4c62-951A-1789826DB373}.exe
      C:\Windows\{2B45E30C-2F19-4c62-951A-1789826DB373}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1528
      • C:\Windows\{FB5851AA-3FBE-4910-A526-414F853F0AD2}.exe
        C:\Windows\{FB5851AA-3FBE-4910-A526-414F853F0AD2}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2672
        • C:\Windows\{D4E8C8F2-660F-4ceb-B1C8-4CC66E814037}.exe
          C:\Windows\{D4E8C8F2-660F-4ceb-B1C8-4CC66E814037}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3008
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{D4E8C~1.EXE > nul
            5⤵
              PID:3040
            • C:\Windows\{0CBCA138-F200-4b0c-9E69-CAF5386BF72F}.exe
              C:\Windows\{0CBCA138-F200-4b0c-9E69-CAF5386BF72F}.exe
              5⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2512
              • C:\Windows\{9DC01EEE-087A-4562-B05C-C1B07DC33224}.exe
                C:\Windows\{9DC01EEE-087A-4562-B05C-C1B07DC33224}.exe
                6⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1484
                • C:\Windows\{FDB2C01D-07B4-4bb4-906E-8A8C6B248DE2}.exe
                  C:\Windows\{FDB2C01D-07B4-4bb4-906E-8A8C6B248DE2}.exe
                  7⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1296
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{FDB2C~1.EXE > nul
                    8⤵
                      PID:2796
                    • C:\Windows\{571B162C-995E-4fe6-A2B8-C79AEAFB4255}.exe
                      C:\Windows\{571B162C-995E-4fe6-A2B8-C79AEAFB4255}.exe
                      8⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:2712
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c del C:\Windows\{571B1~1.EXE > nul
                        9⤵
                          PID:1592
                        • C:\Windows\{3E88D08F-FDB3-43c0-9F7E-884AEFF746B4}.exe
                          C:\Windows\{3E88D08F-FDB3-43c0-9F7E-884AEFF746B4}.exe
                          9⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2932
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{3E88D~1.EXE > nul
                            10⤵
                              PID:2068
                            • C:\Windows\{DAA90338-4B18-4805-ABAF-92E632206068}.exe
                              C:\Windows\{DAA90338-4B18-4805-ABAF-92E632206068}.exe
                              10⤵
                              • Modifies Installed Components in the registry
                              • Executes dropped EXE
                              • Drops file in Windows directory
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2180
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{DAA90~1.EXE > nul
                                11⤵
                                  PID:680
                                • C:\Windows\{DBDEA754-BF6F-4e17-B764-BFF397FAE1F9}.exe
                                  C:\Windows\{DBDEA754-BF6F-4e17-B764-BFF397FAE1F9}.exe
                                  11⤵
                                  • Modifies Installed Components in the registry
                                  • Executes dropped EXE
                                  • Drops file in Windows directory
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2808
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /c del C:\Windows\{DBDEA~1.EXE > nul
                                    12⤵
                                      PID:836
                                    • C:\Windows\{B7511879-8508-433d-B269-FFCFDE527FED}.exe
                                      C:\Windows\{B7511879-8508-433d-B269-FFCFDE527FED}.exe
                                      12⤵
                                      • Executes dropped EXE
                                      PID:1468
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{9DC01~1.EXE > nul
                            7⤵
                              PID:2748
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{0CBCA~1.EXE > nul
                            6⤵
                              PID:1892
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{FB585~1.EXE > nul
                          4⤵
                            PID:1696
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{2B45E~1.EXE > nul
                          3⤵
                            PID:2720
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:2404

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\{0CBCA138-F200-4b0c-9E69-CAF5386BF72F}.exe

                        Filesize

                        216KB

                        MD5

                        fbd862adf56055061543a1cb7b9fe4d4

                        SHA1

                        13a2a6369f6ee9635676bf6083e213eee9e00633

                        SHA256

                        5ba1d765e89552aabf35f26c488c740fe7f76555af38e492e1a4af9592e49236

                        SHA512

                        922e311e1424ba425fb9d6130817db455223b298cdea372def22b1ab6edd14096a77d20c70fc196ef1caa7db1cfca4c7f04e6c5c05e7a6836c81e12b2d37939d

                      • C:\Windows\{2B45E30C-2F19-4c62-951A-1789826DB373}.exe

                        Filesize

                        216KB

                        MD5

                        6602bea7743fed3c62baa81af8ad6614

                        SHA1

                        66dc606babbb6bc914ab512f25698ee0be98644d

                        SHA256

                        7e702c50faff2eacdf51570375da1ede965fece9a4be73d499d2265ef559510b

                        SHA512

                        d4247261524ad63d83a5133c21ca30db8bfdc9590a703665ea49edf9aeca5dc480df8e645d278d2067230fcc0155fce85cd01553227b0e9a41eca2b887b5c624

                      • C:\Windows\{3E88D08F-FDB3-43c0-9F7E-884AEFF746B4}.exe

                        Filesize

                        216KB

                        MD5

                        cc400636a35d73f769f53f75ee6d1d22

                        SHA1

                        608a57b136bdaec685528c9af9294e2191e19d6c

                        SHA256

                        fe49a4a6dfd336f72ac73d5faaf65f3ccedfc5d142db2db51f56f63212066a89

                        SHA512

                        31144cc244c7defae85550b69f5385f25387de942905c080e19d8cb0d64da89639778ab9081d6338c7e6d8100b9faf6af0a3c7490407ffc16ec9ff7bd34d31b5

                      • C:\Windows\{571B162C-995E-4fe6-A2B8-C79AEAFB4255}.exe

                        Filesize

                        216KB

                        MD5

                        e43884634c383925032a850f5596e622

                        SHA1

                        892e9c3e872b70dd66985af20f4454395134b1a7

                        SHA256

                        e8e03e9aa63d31c522386a725eddd3511dd7755a2c152e72f2dedf00c8420ceb

                        SHA512

                        485f3eb35bc9f662df9c10ff35c8b071172c37cde71d3b302e2ce8bd661fdd96275ca41aba154ac7c00314e97a9fbccdf78fc065a8b4015eb83aec2b48042c92

                      • C:\Windows\{9DC01EEE-087A-4562-B05C-C1B07DC33224}.exe

                        Filesize

                        216KB

                        MD5

                        5d951bd64c2f348e684b14d89cda5cf6

                        SHA1

                        4c0b74a266c9f58b53e502ca7d4d3a2c0e5083de

                        SHA256

                        ed81feb566dcb6f47f1803c875e6c2305040882cfcc16a455b6f109668e82ff1

                        SHA512

                        635719b7acd16a9b0ea2cf76f4f739df3aea09b117575321387403b91db4feb85b16e78b66010f5278595eaa35ff29ba1ad5d2acd15fba4384e6ac6358133aca

                      • C:\Windows\{B7511879-8508-433d-B269-FFCFDE527FED}.exe

                        Filesize

                        216KB

                        MD5

                        0b6951671425b9044540088506c12725

                        SHA1

                        18ee25d49292af06f769eaf02ac46650677aecfe

                        SHA256

                        6f057a10b20dce2678563f2ab870ec291993f39af12b32995c4a1996c014489e

                        SHA512

                        b2103788a0dd76cb84d4f42a43c5cc9265eb07b63ec312b5ec9575fc57fd98e735a0e6e312ab1300b54e36109cb998be8562dcc4dfc5ae6e34539bf0279fd93d

                      • C:\Windows\{D4E8C8F2-660F-4ceb-B1C8-4CC66E814037}.exe

                        Filesize

                        216KB

                        MD5

                        46a8f4a9b947c34251b81c7e7bb74293

                        SHA1

                        fbd61444769c4da60753a3be4cc875d60279e3f1

                        SHA256

                        bb74416db0630e2ab2e7d3504ed20d159e1c85e8344ee62fe99d4c71b6bbb93e

                        SHA512

                        be761c828c06ee279830e35b1e93889f6cf7126f7616a799ec88eeaba1ff2fb4a58cb3620ddedd5a36d607932459d5ed761f1113f9fd11dd7d484706c167a395

                      • C:\Windows\{DAA90338-4B18-4805-ABAF-92E632206068}.exe

                        Filesize

                        216KB

                        MD5

                        339e31cce2e8321668d92a434846bce6

                        SHA1

                        e1b133cb9453b60087878c320d0fd5945f18e1ae

                        SHA256

                        b189e563f190b878cc863ae1dab3b0578402109bb1fe0a084638bb9c16471e54

                        SHA512

                        01d5d8588a7f34bcf95221269589a6ab0ce756c92aedf0dd44101a0a828a0f2dd21f08e3a856d189f6084b7567d3ef8e027d5173df7e1e3076c60f6592e7b657

                      • C:\Windows\{DBDEA754-BF6F-4e17-B764-BFF397FAE1F9}.exe

                        Filesize

                        216KB

                        MD5

                        e3b264275c96bd5be4cbe5acfa2cc71b

                        SHA1

                        8f4cbb56abd796493a0a6ec59291078fab68a33f

                        SHA256

                        a82ecfc39e3b13875f527a157e4454db93ce08f78c4494ff99ed808dd98da8de

                        SHA512

                        b6850fe32f951a9c5d7ad049a3065e776e9866ee644311cb7dc0521e962956f2d370a3d7fc5c00f4a5661d49d3eca04751d10c3adc2c32f1dbb60232f79c95bc

                      • C:\Windows\{FB5851AA-3FBE-4910-A526-414F853F0AD2}.exe

                        Filesize

                        216KB

                        MD5

                        dc89b4a689f47572802409d30c4bd45a

                        SHA1

                        acdd7a306cb6976a14129d8f182cdff55ff0e09c

                        SHA256

                        c9f4b30dbf448c57bc21f36ee204f899781fc23b5d184db23c78b2cc1e26bb63

                        SHA512

                        38b6d19794244e814aa752f0f4b9b4d4587949e69d76d885502773a4776c8c4b3699a197b43745de8f878d729636341b595c1da3a75db55cc73861ae3fcb682d

                      • C:\Windows\{FDB2C01D-07B4-4bb4-906E-8A8C6B248DE2}.exe

                        Filesize

                        216KB

                        MD5

                        6b7cb88502113e49dc7c6b030f067636

                        SHA1

                        bcea1d7cfd8dbe496fff39e1bf1e0981f7cc8a5a

                        SHA256

                        4ea53971e346b2c141258424842ce013ab8d647c7bbd37c2fdd0f0a9a96ce96a

                        SHA512

                        1b1ed08d5ac12bf50a61b422d02f31624919d126789ea73894aa3d96ae37ba5fb6b2b81e73458b0c48d2eef66642dab8855c2a8c34260f934b683955deaa6e72