Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    14/02/2024, 02:27 UTC

General

  • Target

    2024-02-14_20044cb9ceb4146700223b0bac616a7d_goldeneye.exe

  • Size

    197KB

  • MD5

    20044cb9ceb4146700223b0bac616a7d

  • SHA1

    b18fd5d2373a34884c5f418652706dd6de676ced

  • SHA256

    be33315be151410b5b07c1975edede05ba2595c3c6bb7314224d8afc55bdaeed

  • SHA512

    fe390ea9988c0a917acf18b859e64b34ae4f35314533973850d2dca407213c119fbd078febbdfd917ab04e0c1aff8a7959f8189ebefd199c26b5d1696ade33fc

  • SSDEEP

    3072:jEGh0o1l+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEGrlEeKcAEca

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-14_20044cb9ceb4146700223b0bac616a7d_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-14_20044cb9ceb4146700223b0bac616a7d_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:880
    • C:\Windows\{455E712A-13D5-4701-A64C-999F474703CA}.exe
      C:\Windows\{455E712A-13D5-4701-A64C-999F474703CA}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3060
      • C:\Windows\{2D4C3AAB-2192-4b40-AFA1-B71E70C2C93D}.exe
        C:\Windows\{2D4C3AAB-2192-4b40-AFA1-B71E70C2C93D}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2700
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{2D4C3~1.EXE > nul
          4⤵
            PID:2848
          • C:\Windows\{5F16FE52-15D8-4be2-BC3F-C82C6F968B25}.exe
            C:\Windows\{5F16FE52-15D8-4be2-BC3F-C82C6F968B25}.exe
            4⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2628
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c del C:\Windows\{5F16F~1.EXE > nul
              5⤵
                PID:2284
              • C:\Windows\{01EEB8BB-7EEE-415b-AB89-A8A09A7F2C92}.exe
                C:\Windows\{01EEB8BB-7EEE-415b-AB89-A8A09A7F2C92}.exe
                5⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:3024
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{01EEB~1.EXE > nul
                  6⤵
                    PID:1840
                  • C:\Windows\{0250D8C7-7F0D-4964-A050-E2B6FB551BA1}.exe
                    C:\Windows\{0250D8C7-7F0D-4964-A050-E2B6FB551BA1}.exe
                    6⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2748
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{0250D~1.EXE > nul
                      7⤵
                        PID:320
                      • C:\Windows\{31418FE6-898F-472b-A293-D984E2A1BD58}.exe
                        C:\Windows\{31418FE6-898F-472b-A293-D984E2A1BD58}.exe
                        7⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:1084
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{31418~1.EXE > nul
                          8⤵
                            PID:2756
                          • C:\Windows\{557532BC-3298-4f35-A130-5C6AA06E2EE4}.exe
                            C:\Windows\{557532BC-3298-4f35-A130-5C6AA06E2EE4}.exe
                            8⤵
                            • Modifies Installed Components in the registry
                            • Executes dropped EXE
                            • Drops file in Windows directory
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:2764
                            • C:\Windows\{8322340B-A987-4c8b-8F4C-6BD6CFB64E64}.exe
                              C:\Windows\{8322340B-A987-4c8b-8F4C-6BD6CFB64E64}.exe
                              9⤵
                              • Modifies Installed Components in the registry
                              • Executes dropped EXE
                              • Drops file in Windows directory
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1376
                              • C:\Windows\{AEBD7081-7F71-480d-A83C-B0BE13B87877}.exe
                                C:\Windows\{AEBD7081-7F71-480d-A83C-B0BE13B87877}.exe
                                10⤵
                                • Modifies Installed Components in the registry
                                • Executes dropped EXE
                                • Drops file in Windows directory
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2280
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{AEBD7~1.EXE > nul
                                  11⤵
                                    PID:1168
                                  • C:\Windows\{2A97EB76-47D3-4fe6-B672-03E4DD9C200C}.exe
                                    C:\Windows\{2A97EB76-47D3-4fe6-B672-03E4DD9C200C}.exe
                                    11⤵
                                    • Modifies Installed Components in the registry
                                    • Executes dropped EXE
                                    • Drops file in Windows directory
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:692
                                    • C:\Windows\{6D68BFDE-9F91-4b9a-BE05-8D57AD2C3D72}.exe
                                      C:\Windows\{6D68BFDE-9F91-4b9a-BE05-8D57AD2C3D72}.exe
                                      12⤵
                                      • Executes dropped EXE
                                      PID:2904
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /c del C:\Windows\{2A97E~1.EXE > nul
                                      12⤵
                                        PID:2276
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /c del C:\Windows\{83223~1.EXE > nul
                                    10⤵
                                      PID:1064
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /c del C:\Windows\{55753~1.EXE > nul
                                    9⤵
                                      PID:2564
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{455E7~1.EXE > nul
                          3⤵
                            PID:2732
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:2176

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\{01EEB8BB-7EEE-415b-AB89-A8A09A7F2C92}.exe

                        Filesize

                        197KB

                        MD5

                        f868982f53f46fd0424f33cef6e1260b

                        SHA1

                        b12c08ddfd6f34556494a06e388e53ac45e3333a

                        SHA256

                        5dbe70c0969bdc26fad039e544bfe248c24d5a712e4cd0e8a1e10bf55bf82796

                        SHA512

                        3aabcdd52776d648cb64d4e2fdafe1afbce496b7b31f488251f429811016e7633d11c5b34320c7b3f669f03a69edc36246d82d17ce412d2c98f3b601171c36a8

                      • C:\Windows\{0250D8C7-7F0D-4964-A050-E2B6FB551BA1}.exe

                        Filesize

                        197KB

                        MD5

                        92584691db6609c1935c31b02b074001

                        SHA1

                        c25308b20f852ec0d206d884106d631b543efa3d

                        SHA256

                        205122f16284543eca5e0211dc031864377d9dad36b27b7119279a63e5f7455e

                        SHA512

                        73a29af3ed512e7821301c2ed2706b6a258fd8c187c7ab5415d0f58552fcad9ef70d694852d8d6b7c7db5b5dae41f21fce87ad8351f216cc4ff0bb12a088b5dd

                      • C:\Windows\{2A97EB76-47D3-4fe6-B672-03E4DD9C200C}.exe

                        Filesize

                        197KB

                        MD5

                        7f76857f68da33d31d88f31478a667c5

                        SHA1

                        f9f5b427aec9bf6d29b218fae6682d58ad81c20f

                        SHA256

                        fc36528a5f24bab2415b289c313f2a1cf7a756f8c7d8892195d196598a99a045

                        SHA512

                        7c6c50cb66e333021a37218c4955b9da633f5cdfbbd238455b365f773cf414a325a82a402fa77ebdb874b867cd72712681a3bd0734106886b45cd3764e86c7f2

                      • C:\Windows\{2D4C3AAB-2192-4b40-AFA1-B71E70C2C93D}.exe

                        Filesize

                        197KB

                        MD5

                        2c3b57ccce57b7f092664943ca86ad3d

                        SHA1

                        59af693e898d48c7ce83095514d8ae3fbfcb4767

                        SHA256

                        cdf64049d44a02ce20eb9ad1eee01b710e5e7aad072cb4d315691e531448774e

                        SHA512

                        b90d437fc58f1385e26888aa70f37e9122947f65f2a0362d4bbb26aef6af16441af19588517d911cf46912da9fb82c461d78507bfb71a731146a58047fd6a415

                      • C:\Windows\{31418FE6-898F-472b-A293-D984E2A1BD58}.exe

                        Filesize

                        197KB

                        MD5

                        a3932de16d1e3889319fc2d51fa5d6ef

                        SHA1

                        4410629c38804e2a956bb88a67f843f95f320c6a

                        SHA256

                        0b0fe7f6b84de1f1f46f40195f48faf15fd63f7d4d7461c05c0959f0b0a96b52

                        SHA512

                        712a86583db2a06f79791b0c1ec12ba0cb5d4b9d63f67d413a5c407baeef57edbff7c16d0807cfdd079eead70ac882eb39a55a64a930f5a357b34478f8afbe17

                      • C:\Windows\{455E712A-13D5-4701-A64C-999F474703CA}.exe

                        Filesize

                        197KB

                        MD5

                        8675d09dbdefb0d48caa373500b726ce

                        SHA1

                        a45c153f06d900b510de4446c5a30669523cb605

                        SHA256

                        591f29c62a80293c877b6725011a6ef929b6bf6af1ff6416c9d69a11c8e4b008

                        SHA512

                        248d7a3925af3ca57fc9016a53e8d28bf951dfb205c6d3a8fca75555bb948bffeee84e1920fa42852913cdf44e98476cedfa691235868bedd465385fdbe6b6f5

                      • C:\Windows\{557532BC-3298-4f35-A130-5C6AA06E2EE4}.exe

                        Filesize

                        197KB

                        MD5

                        8f4f1a1e084393699e46760068d579de

                        SHA1

                        ab7d4e973b64371a35a9c50e784a210e03b3e6ed

                        SHA256

                        fad80d6f9d7e3d2be3248f1f92e4f30fd6eb33d0ec0b400c8c8758517c35a970

                        SHA512

                        fd1d528d86c15377e4fa361cdab07c37476d4a112bf0734b2d131033b2d013d14b29588b5a4180f81635885b648d76c578761157d7e5cdd1312ba4d8c245c95b

                      • C:\Windows\{5F16FE52-15D8-4be2-BC3F-C82C6F968B25}.exe

                        Filesize

                        197KB

                        MD5

                        7a1bba56413feb45f178cbcd706bb998

                        SHA1

                        d322232d73c873ef77d6534b6e4642d1c1b2a3fe

                        SHA256

                        5d1e0fa88c673e05da0090eb685e0dc5d674d20f184f6d237ef4611817eae6a6

                        SHA512

                        6e6790c9339582437626e10d27d477b48d6c2d16b26a5f2d42792e8aa204bdb34db4e5c629da2413acba087f4e05db76692c59ad6b11b93f05917634a6e95aab

                      • C:\Windows\{6D68BFDE-9F91-4b9a-BE05-8D57AD2C3D72}.exe

                        Filesize

                        197KB

                        MD5

                        681143c64b5c69de882d90b2232598f5

                        SHA1

                        13deccbcfcc64464cbe4892716348cbc965009be

                        SHA256

                        343b2bfae4c9b95e509a38c2551464338f6b33d9557125c4c9ff3cf131dd1584

                        SHA512

                        c3d49fcedcb4ef700dd917f8adc06ed120a4349f82b22401ed312439dc35e90e4252c60c4e6656fff5cc4d598d11f683f5b8716ec89c97b0dd464e1ab2f46531

                      • C:\Windows\{8322340B-A987-4c8b-8F4C-6BD6CFB64E64}.exe

                        Filesize

                        197KB

                        MD5

                        54e3dead7cd6978a80fcdd02a425e50d

                        SHA1

                        5d5882239cc71406f49ea91dc2acfa0be89398b1

                        SHA256

                        bd09b2dd9bf43f53be70aa0fc90839c062d032ed61edfec76c23a6001e2a3c53

                        SHA512

                        d7cbc956442d3722f9a6ef45553f97e518dc19dfaa9d0cf60f4896b511adf66ead50893c0d9be1420c670f830c994ec3f6a2937d3346b8138632c401bb445ade

                      • C:\Windows\{AEBD7081-7F71-480d-A83C-B0BE13B87877}.exe

                        Filesize

                        197KB

                        MD5

                        3d9e285e5a9f6583f31970907ff07001

                        SHA1

                        4829ed81566b85d7bcd33aa815654229c5107c0f

                        SHA256

                        93b06f3ecca722ca8ba2959865b4383aac43698cb9f4fcb8a927cb2d355ff1ec

                        SHA512

                        4587dc2a6d029ab89767fe1d0ee76165c0ab8e48b713137e615ac08156d14433e9f01878b754e81ccc64fc771bf8bcf228aee30493b9716d28233c90fc5dc65d

                      We care about your privacy.

                      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.