Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/02/2024, 17:50 UTC

General

  • Target

    2024-02-13_632e996f941eb8b629da9f7149609861_goldeneye.exe

  • Size

    216KB

  • MD5

    632e996f941eb8b629da9f7149609861

  • SHA1

    83518d294c1517ac2e51d2b86c56dbc74aa247fe

  • SHA256

    49878940f3463858d85db3d0623fad9acf32c61a002556f651ae670eb59cac5a

  • SHA512

    28fa12b26b33ccf8f17f5571051a1039cb4c81bc096f9a98b9f4d8a5f78d5feecc182938b6fec6958918890fbd26648fa2deca09b2ccb5dc4ccf1b0358660e48

  • SSDEEP

    3072:jEGh0o+l+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMUy:jEG0lEeKcAEcGy

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 12 IoCs
  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-13_632e996f941eb8b629da9f7149609861_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-13_632e996f941eb8b629da9f7149609861_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4164
    • C:\Windows\{4A4BD54D-AB67-4936-8A6D-2508642ADA4B}.exe
      C:\Windows\{4A4BD54D-AB67-4936-8A6D-2508642ADA4B}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4592
      • C:\Windows\{FA41B851-1172-46e9-982C-C2FC1ABAB655}.exe
        C:\Windows\{FA41B851-1172-46e9-982C-C2FC1ABAB655}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4316
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{FA41B~1.EXE > nul
          4⤵
            PID:2012
          • C:\Windows\{6FC93EDE-5543-41bb-AFE0-07F5A2F7701F}.exe
            C:\Windows\{6FC93EDE-5543-41bb-AFE0-07F5A2F7701F}.exe
            4⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3792
            • C:\Windows\{452382E9-CBA9-442c-BCE8-A02107B19397}.exe
              C:\Windows\{452382E9-CBA9-442c-BCE8-A02107B19397}.exe
              5⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4844
              • C:\Windows\{BCA341F7-617B-4cec-B75D-37B1403394DE}.exe
                C:\Windows\{BCA341F7-617B-4cec-B75D-37B1403394DE}.exe
                6⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:876
                • C:\Windows\{DBF37E7D-858B-40ba-8267-585E2978D0A8}.exe
                  C:\Windows\{DBF37E7D-858B-40ba-8267-585E2978D0A8}.exe
                  7⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:680
                  • C:\Windows\{FEE13521-220B-4f49-8FBB-B10F67CF29CF}.exe
                    C:\Windows\{FEE13521-220B-4f49-8FBB-B10F67CF29CF}.exe
                    8⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:744
                    • C:\Windows\{0D2DE297-474C-41b4-BBC4-BDB6342D25E7}.exe
                      C:\Windows\{0D2DE297-474C-41b4-BBC4-BDB6342D25E7}.exe
                      9⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:2784
                      • C:\Windows\{33E2134C-BDF3-41f2-8477-35C3344104AC}.exe
                        C:\Windows\{33E2134C-BDF3-41f2-8477-35C3344104AC}.exe
                        10⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:4288
                        • C:\Windows\{51F8FA12-E2D3-4b23-9EEA-9016A9414E32}.exe
                          C:\Windows\{51F8FA12-E2D3-4b23-9EEA-9016A9414E32}.exe
                          11⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:2608
                          • C:\Windows\{53C23AB1-F4D2-429f-80D0-799D1A905E22}.exe
                            C:\Windows\{53C23AB1-F4D2-429f-80D0-799D1A905E22}.exe
                            12⤵
                            • Modifies Installed Components in the registry
                            • Executes dropped EXE
                            • Drops file in Windows directory
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2692
                            • C:\Windows\{90D89337-14C6-4e8a-847A-35B691E00919}.exe
                              C:\Windows\{90D89337-14C6-4e8a-847A-35B691E00919}.exe
                              13⤵
                              • Executes dropped EXE
                              PID:536
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{53C23~1.EXE > nul
                              13⤵
                                PID:1412
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{51F8F~1.EXE > nul
                              12⤵
                                PID:1132
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{33E21~1.EXE > nul
                              11⤵
                                PID:4548
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{0D2DE~1.EXE > nul
                              10⤵
                                PID:4236
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{FEE13~1.EXE > nul
                              9⤵
                                PID:3728
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{DBF37~1.EXE > nul
                              8⤵
                                PID:3092
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{BCA34~1.EXE > nul
                              7⤵
                                PID:4692
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{45238~1.EXE > nul
                              6⤵
                                PID:1088
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{6FC93~1.EXE > nul
                              5⤵
                                PID:1584
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{4A4BD~1.EXE > nul
                            3⤵
                              PID:1932
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                            2⤵
                              PID:2708

                          Network

                          • flag-us
                            DNS
                            190.178.17.96.in-addr.arpa
                            Remote address:
                            8.8.8.8:53
                            Request
                            190.178.17.96.in-addr.arpa
                            IN PTR
                            Response
                            190.178.17.96.in-addr.arpa
                            IN PTR
                            a96-17-178-190deploystaticakamaitechnologiescom
                          • flag-us
                            DNS
                            154.239.44.20.in-addr.arpa
                            Remote address:
                            8.8.8.8:53
                            Request
                            154.239.44.20.in-addr.arpa
                            IN PTR
                            Response
                          • flag-us
                            DNS
                            140.32.126.40.in-addr.arpa
                            Remote address:
                            8.8.8.8:53
                            Request
                            140.32.126.40.in-addr.arpa
                            IN PTR
                            Response
                          • flag-us
                            DNS
                            95.221.229.192.in-addr.arpa
                            Remote address:
                            8.8.8.8:53
                            Request
                            95.221.229.192.in-addr.arpa
                            IN PTR
                            Response
                          • flag-us
                            DNS
                            241.150.49.20.in-addr.arpa
                            Remote address:
                            8.8.8.8:53
                            Request
                            241.150.49.20.in-addr.arpa
                            IN PTR
                            Response
                          • flag-us
                            DNS
                            86.23.85.13.in-addr.arpa
                            Remote address:
                            8.8.8.8:53
                            Request
                            86.23.85.13.in-addr.arpa
                            IN PTR
                            Response
                          • flag-us
                            DNS
                            56.126.166.20.in-addr.arpa
                            Remote address:
                            8.8.8.8:53
                            Request
                            56.126.166.20.in-addr.arpa
                            IN PTR
                            Response
                          • flag-us
                            DNS
                            18.134.221.88.in-addr.arpa
                            Remote address:
                            8.8.8.8:53
                            Request
                            18.134.221.88.in-addr.arpa
                            IN PTR
                            Response
                            18.134.221.88.in-addr.arpa
                            IN PTR
                            a88-221-134-18deploystaticakamaitechnologiescom
                          • flag-us
                            DNS
                            187.178.17.96.in-addr.arpa
                            Remote address:
                            8.8.8.8:53
                            Request
                            187.178.17.96.in-addr.arpa
                            IN PTR
                            Response
                            187.178.17.96.in-addr.arpa
                            IN PTR
                            a96-17-178-187deploystaticakamaitechnologiescom
                          • flag-us
                            DNS
                            43.229.111.52.in-addr.arpa
                            Remote address:
                            8.8.8.8:53
                            Request
                            43.229.111.52.in-addr.arpa
                            IN PTR
                            Response
                          • flag-us
                            DNS
                            181.178.17.96.in-addr.arpa
                            Remote address:
                            8.8.8.8:53
                            Request
                            181.178.17.96.in-addr.arpa
                            IN PTR
                            Response
                            181.178.17.96.in-addr.arpa
                            IN PTR
                            a96-17-178-181deploystaticakamaitechnologiescom
                          No results found
                          • 8.8.8.8:53
                            190.178.17.96.in-addr.arpa
                            dns
                            72 B
                            137 B
                            1
                            1

                            DNS Request

                            190.178.17.96.in-addr.arpa

                          • 8.8.8.8:53
                            154.239.44.20.in-addr.arpa
                            dns
                            72 B
                            158 B
                            1
                            1

                            DNS Request

                            154.239.44.20.in-addr.arpa

                          • 8.8.8.8:53
                            140.32.126.40.in-addr.arpa
                            dns
                            72 B
                            158 B
                            1
                            1

                            DNS Request

                            140.32.126.40.in-addr.arpa

                          • 8.8.8.8:53
                            95.221.229.192.in-addr.arpa
                            dns
                            73 B
                            144 B
                            1
                            1

                            DNS Request

                            95.221.229.192.in-addr.arpa

                          • 8.8.8.8:53
                            241.150.49.20.in-addr.arpa
                            dns
                            72 B
                            158 B
                            1
                            1

                            DNS Request

                            241.150.49.20.in-addr.arpa

                          • 8.8.8.8:53
                            86.23.85.13.in-addr.arpa
                            dns
                            70 B
                            144 B
                            1
                            1

                            DNS Request

                            86.23.85.13.in-addr.arpa

                          • 8.8.8.8:53
                            56.126.166.20.in-addr.arpa
                            dns
                            72 B
                            158 B
                            1
                            1

                            DNS Request

                            56.126.166.20.in-addr.arpa

                          • 8.8.8.8:53
                            18.134.221.88.in-addr.arpa
                            dns
                            72 B
                            137 B
                            1
                            1

                            DNS Request

                            18.134.221.88.in-addr.arpa

                          • 8.8.8.8:53
                            187.178.17.96.in-addr.arpa
                            dns
                            72 B
                            137 B
                            1
                            1

                            DNS Request

                            187.178.17.96.in-addr.arpa

                          • 8.8.8.8:53
                            43.229.111.52.in-addr.arpa
                            dns
                            72 B
                            158 B
                            1
                            1

                            DNS Request

                            43.229.111.52.in-addr.arpa

                          • 8.8.8.8:53
                            181.178.17.96.in-addr.arpa
                            dns
                            72 B
                            137 B
                            1
                            1

                            DNS Request

                            181.178.17.96.in-addr.arpa

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Windows\{0D2DE297-474C-41b4-BBC4-BDB6342D25E7}.exe

                            Filesize

                            216KB

                            MD5

                            a003f9d8e6557d6ff72b9b1ee3c2d0cc

                            SHA1

                            16c46de5eebf9f3c873a092b3a8492096f49bf0e

                            SHA256

                            c87ea1fa0e7a605bdb8ba3bcce0a9bdc64b701a46bad613bfa0982e1cc1f516b

                            SHA512

                            2a76f6265fc10d97ddfcd6bb011c3cc02d93c074fb6dd97d03dcc48af58ad4d789823467399a2bb1e61f127dfa10a22e86326bbe538c502782434dcc34a88308

                          • C:\Windows\{33E2134C-BDF3-41f2-8477-35C3344104AC}.exe

                            Filesize

                            216KB

                            MD5

                            8e9e82bdd97302c7cbcdef5955d88c3f

                            SHA1

                            91f0c5871faf375e14f8f7a7c8251c5c2b929bae

                            SHA256

                            40827ac9daacc0976d74c3acb11b5f04c392944bc5fe877a0e308fd2127852d9

                            SHA512

                            6fb6d6aacecb3f6b11415000264bc7f5baf140d2b988f3cd5ea4c293424071acd0707124e6348bae3aabd3f5e90d76a864f90f34e352edf7c24ac2945600e2b8

                          • C:\Windows\{452382E9-CBA9-442c-BCE8-A02107B19397}.exe

                            Filesize

                            216KB

                            MD5

                            c274d3e3b433e33bc265760b30463bfc

                            SHA1

                            4dd02414201a73d8a071550a42a6e612ab8cd2cb

                            SHA256

                            73e66283167b6f291cdae3aee274a30bb4239e31da4a2981287d27d6ee159972

                            SHA512

                            0e662fc5004687e75ed2d63bcc4c1d009f09d785a532db89eba5444bfb1e1f74285deffb09ecbefa485fededc1fc4b8602c12973ee0a1963bd9f5582f15c3659

                          • C:\Windows\{4A4BD54D-AB67-4936-8A6D-2508642ADA4B}.exe

                            Filesize

                            216KB

                            MD5

                            d09336b705c630ecde318d31c7b001f8

                            SHA1

                            3777d1ee73287568b9914d6931b2477e40718b41

                            SHA256

                            0e572fc36f927806edcf22ded3ebd7ea362ebbba254e405ddd589a8d00d55788

                            SHA512

                            5ee766f5307c8c9d07956375ead0706c87719da099cffa414f1ebc18b871c70bbab9fcfca487e91832b35771f2cd26af2103692536c9747157bc74c4004557d3

                          • C:\Windows\{51F8FA12-E2D3-4b23-9EEA-9016A9414E32}.exe

                            Filesize

                            216KB

                            MD5

                            bc257436f61fcd3532225190d04b5c2f

                            SHA1

                            881ee3cd7ce3269ea0b892ecb6482741bbe1a75b

                            SHA256

                            3a7ebbb3da3b26e87b9dee3be3a86459fbdaac89065d956e91f6269b8bff043f

                            SHA512

                            384c53b1647d9af09373b578559bc62317d71d5e33583a6f3e3c8ab729f859e694814d22bd99b72b0e143d7e8229d0e9b66cf60c851fdcc07d0d16d0fed5f0eb

                          • C:\Windows\{53C23AB1-F4D2-429f-80D0-799D1A905E22}.exe

                            Filesize

                            216KB

                            MD5

                            73ca33bf80eb0e64902e220446742ae8

                            SHA1

                            06701533d9f2f33e8da913e2b1b85d56ef521a48

                            SHA256

                            30d712b9ddc16aca47077c7723f089a4f87be5764a3d25c4cd48d659ff33f0ca

                            SHA512

                            55cf23f4529b66580155e3fc11213464c3248f5ab07c9f33c330e861cdc8672786a0d5d5df7c15f3071dae26ca8d23781d008d4b0b30493e5b9dadf906472a47

                          • C:\Windows\{6FC93EDE-5543-41bb-AFE0-07F5A2F7701F}.exe

                            Filesize

                            216KB

                            MD5

                            687ca8d644ae08ec18e5ddfe194ea2ad

                            SHA1

                            4e3de6682d2df59153494828c96c34ca4cad4e40

                            SHA256

                            c684091ed667abc3ff1e26128dcd03c74a4480f675ca34b1c479bd8023dc5a0f

                            SHA512

                            f57b8c4ee467854fd1afa767223af58da424c9083d14c74291c837edc1fbd71cfc86e3004d6b94611e753bbecff8c792d3aade5979ac06f1cd01c6771eb27ddc

                          • C:\Windows\{90D89337-14C6-4e8a-847A-35B691E00919}.exe

                            Filesize

                            216KB

                            MD5

                            13ba5440cec0e5404c463264c5976a7d

                            SHA1

                            dcd2f232c7a328b9d1605260e96d04ced8efd31b

                            SHA256

                            9032f629024c286952a5f938eefca369a922247c9223d62e0ebacb687ff63de0

                            SHA512

                            2b49551651ac460a8037e56a1d371293fb1737a557d94d64d8fca3e5dacbcaf8040198a80cb826cd110bc1cec06021675a6bc0b000eae7b674eae070724179b5

                          • C:\Windows\{BCA341F7-617B-4cec-B75D-37B1403394DE}.exe

                            Filesize

                            216KB

                            MD5

                            18d64b7f046658ada87e33962314560d

                            SHA1

                            05941e127bb57ab793199931dca1097099ecf143

                            SHA256

                            e3d3d9c024ee7f69553e75e4dcde0f1e642decd77da30c9b5717b5e951ef79a3

                            SHA512

                            e0bed7895ca6590903fb4ec2dfc95a3df02127a7f5b4a48c507155f6fc92d2c519a885746c5bad4906dce7c23375a02867d4faa09075cddf840ebebc7ac6f242

                          • C:\Windows\{DBF37E7D-858B-40ba-8267-585E2978D0A8}.exe

                            Filesize

                            216KB

                            MD5

                            eff5fbec87f47e410c9f0f07fd1b0bfc

                            SHA1

                            9b379759550feaad20b43e780f6887b2a74f7614

                            SHA256

                            899e52e993050c3218fab76238254a2787f122fe0148092ee6d447724adab894

                            SHA512

                            81b4dc7957929d361bfdd3c7293e202ad5015cd32353fe05d568c0665d24a549bea453966fa6a6089ed95009340b51353b6162bc28ee7eaa4727d87cb14d9554

                          • C:\Windows\{FA41B851-1172-46e9-982C-C2FC1ABAB655}.exe

                            Filesize

                            216KB

                            MD5

                            db3c339729a6f4eaabe9a64ed256ad40

                            SHA1

                            32804246244dc3f4a946b19a1dcf6da2b9a3f4c8

                            SHA256

                            c0a57abdcc44c8dd8a25be9395e6ada50b0227b940e7d98cffd6c982f0b23a05

                            SHA512

                            5a2c6af356389ae198d08fdf65d13f21cbf926c6c3d9bb2183fd057135d02c54816fa06900e6358bdc46373cc28a785bbc3fe78b0c9dc9ba02d9a6b208b8c185

                          • C:\Windows\{FEE13521-220B-4f49-8FBB-B10F67CF29CF}.exe

                            Filesize

                            216KB

                            MD5

                            af066f6c5156c03633e8a81b1970a153

                            SHA1

                            aef9e1109a6c3fbe860ca46fd37037396fb69df7

                            SHA256

                            97e5f4a1b89f77d763de40ae356b116c99bd5136e02767e6a3f7c8c161e5bdbc

                            SHA512

                            f7ca75df46eac861cc10d9bca8135c437cd14067fa2ce5b204528b8b9e8db99509895267b16f2113b5a71792e47b56990e49b9925f0dc18fc8ac91560dd7e697

                          We care about your privacy.

                          This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.