Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    18/02/2024, 17:30

General

  • Target

    2024-02-18_2f0e633f67331e013a375568b2b31e16_goldeneye.exe

  • Size

    408KB

  • MD5

    2f0e633f67331e013a375568b2b31e16

  • SHA1

    14a99464cddc6d9308fdac009efafae19bd35d7f

  • SHA256

    0d7edd2bef6578e24fe679046060bc1aa116bb0089f574ee99c160c162cf81f0

  • SHA512

    580f356c0b47bcf66d2a0a172962c20a67fa1dd521ec47e7b7129bdb9454aaa96fec75a245d9fe9a1ae4fd25da20e8f541309532378c32f8e2f2c14163775f82

  • SSDEEP

    3072:CEGh0orl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBft:CEG5ldOe2MUVg3vTeKcAEciTBqr3jy9

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 12 IoCs
  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-18_2f0e633f67331e013a375568b2b31e16_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-18_2f0e633f67331e013a375568b2b31e16_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Windows\{7F718F93-14DE-4260-859C-5B31A66A7020}.exe
      C:\Windows\{7F718F93-14DE-4260-859C-5B31A66A7020}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2096
      • C:\Windows\{8E3CA581-9671-48fe-880E-582162C43702}.exe
        C:\Windows\{8E3CA581-9671-48fe-880E-582162C43702}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2816
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{8E3CA~1.EXE > nul
          4⤵
            PID:2720
          • C:\Windows\{A1353F98-1393-4dfd-A65B-83436B5EAC1C}.exe
            C:\Windows\{A1353F98-1393-4dfd-A65B-83436B5EAC1C}.exe
            4⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2896
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c del C:\Windows\{A1353~1.EXE > nul
              5⤵
                PID:1568
              • C:\Windows\{B179818C-4A39-4ccd-80DF-498E0D0438A8}.exe
                C:\Windows\{B179818C-4A39-4ccd-80DF-498E0D0438A8}.exe
                5⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1900
                • C:\Windows\{F1682937-283E-460b-AED0-74B8D1E7CAD1}.exe
                  C:\Windows\{F1682937-283E-460b-AED0-74B8D1E7CAD1}.exe
                  6⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2644
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{F1682~1.EXE > nul
                    7⤵
                      PID:288
                    • C:\Windows\{B6B0642D-A942-4947-BECE-949441766EBB}.exe
                      C:\Windows\{B6B0642D-A942-4947-BECE-949441766EBB}.exe
                      7⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:1068
                      • C:\Windows\{0BCF61A0-4E23-44ec-8899-7CACA9CB2AE5}.exe
                        C:\Windows\{0BCF61A0-4E23-44ec-8899-7CACA9CB2AE5}.exe
                        8⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:1260
                        • C:\Windows\{7524FA6E-9BE9-41f6-B26A-8ACA57CB1202}.exe
                          C:\Windows\{7524FA6E-9BE9-41f6-B26A-8ACA57CB1202}.exe
                          9⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2340
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{7524F~1.EXE > nul
                            10⤵
                              PID:1516
                            • C:\Windows\{9384CB79-815A-405c-86C4-85766BAC656D}.exe
                              C:\Windows\{9384CB79-815A-405c-86C4-85766BAC656D}.exe
                              10⤵
                              • Modifies Installed Components in the registry
                              • Executes dropped EXE
                              • Drops file in Windows directory
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2476
                              • C:\Windows\{A21BBF68-150D-4355-8F74-8B7C8CAB0341}.exe
                                C:\Windows\{A21BBF68-150D-4355-8F74-8B7C8CAB0341}.exe
                                11⤵
                                • Modifies Installed Components in the registry
                                • Executes dropped EXE
                                • Drops file in Windows directory
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1220
                                • C:\Windows\{0C2772DF-F970-46a0-9DFB-763CD20E5E66}.exe
                                  C:\Windows\{0C2772DF-F970-46a0-9DFB-763CD20E5E66}.exe
                                  12⤵
                                  • Modifies Installed Components in the registry
                                  • Executes dropped EXE
                                  • Drops file in Windows directory
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2124
                                  • C:\Windows\{924985C6-899B-4e27-9232-5CF7F164CC1E}.exe
                                    C:\Windows\{924985C6-899B-4e27-9232-5CF7F164CC1E}.exe
                                    13⤵
                                    • Executes dropped EXE
                                    PID:1496
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /c del C:\Windows\{0C277~1.EXE > nul
                                    13⤵
                                      PID:2424
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /c del C:\Windows\{A21BB~1.EXE > nul
                                    12⤵
                                      PID:1368
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /c del C:\Windows\{9384C~1.EXE > nul
                                    11⤵
                                      PID:2948
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{0BCF6~1.EXE > nul
                                  9⤵
                                    PID:1572
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{B6B06~1.EXE > nul
                                  8⤵
                                    PID:1984
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{B1798~1.EXE > nul
                                6⤵
                                  PID:3012
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{7F718~1.EXE > nul
                            3⤵
                              PID:2844
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                            2⤵
                            • Deletes itself
                            PID:2664

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Windows\{0BCF61A0-4E23-44ec-8899-7CACA9CB2AE5}.exe

                          Filesize

                          408KB

                          MD5

                          a772122d040f5a9e7163758048753cba

                          SHA1

                          387aabdbc4a0329cc09b4e775a283e55a26aa822

                          SHA256

                          04f577c2295616244e9c22107e104f4ac0a6585aa19b27652031d615c6f1ed73

                          SHA512

                          3f9cdbd8982cff08501e51c692e71d0288eef50803645ece81034b87d7bb362a7b23ed9e73b29e9b6c76942bfd8ea8a8f1f0cc940aa9279434fb9f8dfbdc4dba

                        • C:\Windows\{0C2772DF-F970-46a0-9DFB-763CD20E5E66}.exe

                          Filesize

                          408KB

                          MD5

                          654e59dc575f9c8bf04a2b851ffbbd09

                          SHA1

                          1a2941e880a6231a3d8dac532c9f352ea0a6cfbe

                          SHA256

                          94f256f9f782f01a1d347b17e1b0770bd71f0f13ec785ecf4bf1606b331183e6

                          SHA512

                          ed4861d571113433ca91af30f5d08e0ce2a786b730a75d037accefc28dc0b8f93bb05de027058b50b2604bc3b27764da53d32c1754f1505b4d7ae1fc18caae1b

                        • C:\Windows\{7524FA6E-9BE9-41f6-B26A-8ACA57CB1202}.exe

                          Filesize

                          408KB

                          MD5

                          6a863effca9c97d7609a4d23473106ae

                          SHA1

                          dc15c9a0cfc9ada78c080ba677a840a560ab9462

                          SHA256

                          75cf77240c74be1f08d2952d6fd56c7dcd411c6857cea14a2abb00d90a30b14b

                          SHA512

                          dc9a3f4307118c97969ff1770e25a4d5b34d280093a979c03840fd544b20597585db465aacf22df18ccb7e1e6936a8c195972e15142fb8eb5f9ed85de9b4b3b9

                        • C:\Windows\{7F718F93-14DE-4260-859C-5B31A66A7020}.exe

                          Filesize

                          408KB

                          MD5

                          1a91c32050d9a59ba70a75a07b812e01

                          SHA1

                          a5d868f46435d80b1512c77df8197ec134a7e1a3

                          SHA256

                          f0daec3fd195bd080b60607fc8da6dd12f675df37287587b67c9c1ec5cb6b3e6

                          SHA512

                          9f7e43a092d9362577d108a36711bf083e1ce6825499bb634e210265ac33f546628ce1af9c6996317f008d44526ae78abd0088283f5f98e05b87f9a08b3cf4c5

                        • C:\Windows\{8E3CA581-9671-48fe-880E-582162C43702}.exe

                          Filesize

                          408KB

                          MD5

                          ecbb175403e4ce09c14c1f46968f5f56

                          SHA1

                          766961b94285f05ae38f1a0c728346d6a1b7f2ed

                          SHA256

                          438068bd6715a31f33735881976d44b3a53d57f47ccbf787d28fc17c404281a3

                          SHA512

                          069ab95e00adfaeaf4cdce764ab15d7d4b15a818566770b8b9716b12b4342a014dc26d21d79fea69e7a8f686e2e551544504192729ad544b0e81a875cdf16663

                        • C:\Windows\{924985C6-899B-4e27-9232-5CF7F164CC1E}.exe

                          Filesize

                          408KB

                          MD5

                          3598fe8bf3c1f62d3bb304f7c3564565

                          SHA1

                          d50b0b315258246c22b2c9e66e175191eae5c0a3

                          SHA256

                          3efcef4aaf5afff88361c0395538cc34695e9a5d052c00bd0198f25a38f82905

                          SHA512

                          aedb87ceb1da1aea16f40d44f4b80bc51aad78b323f1d0edef6aae75441f7c66a0485dd18b01505b4f662582038c67b80e0426b20579202199483d1c529d848d

                        • C:\Windows\{9384CB79-815A-405c-86C4-85766BAC656D}.exe

                          Filesize

                          408KB

                          MD5

                          560de02efc680141e59f445c926f8e01

                          SHA1

                          8d3bd719c4b5aa2785469ce2f782c76c259e7dca

                          SHA256

                          8f418b0b46b51d85631e6e05fe5f1af80f52b8580c36732b4c5572e09b6391e9

                          SHA512

                          f17297c0f99354312495d3a5ef846f8153cb5fa1ff632c3c590783dd510d2aa2e3bf0bbb7fd7c6e8a422ee7bee97f9723ffb6fedbac70b8794d138b153596fcf

                        • C:\Windows\{A1353F98-1393-4dfd-A65B-83436B5EAC1C}.exe

                          Filesize

                          408KB

                          MD5

                          00e0a8a2f8dee1d347363ef48f1d4424

                          SHA1

                          cd821e638657e800557569e5c6cf9acc1f020331

                          SHA256

                          ea6014684df1f97c08060b364fda0d5b12cc46f5db9ed757b25b188922b09303

                          SHA512

                          e1dd6b1f2a06e816b974f8390532ca872d5331f9937b3b069d6066de98f5016047d2f3656351a8144e490503e020a6dca00ea6801465edfccd3f924cd01688d8

                        • C:\Windows\{A21BBF68-150D-4355-8F74-8B7C8CAB0341}.exe

                          Filesize

                          408KB

                          MD5

                          a58964e81cb02b70e13842bcbe28307f

                          SHA1

                          a7c75c77c1735e48ebd7ec33e8a9ae87258503bb

                          SHA256

                          a3deebef2881c3c834e44e26be1af45837119014fa8dd75ea3581f3b38969eec

                          SHA512

                          28b664b2456bf0eae2eb1424c5aa0155d5dbd0eafe9b46751d612265418f98c7e481b56c0e5718f08cd7ece54894ee698a28228b05bcba0a6304f5876e843f07

                        • C:\Windows\{B179818C-4A39-4ccd-80DF-498E0D0438A8}.exe

                          Filesize

                          408KB

                          MD5

                          1770bcdeaa4b179ec9b5f8fa267daea6

                          SHA1

                          53dcfd9da959ab0be53cec0709df0c6a853c81d8

                          SHA256

                          fa227dc8415885fc353a5a7632abc820c2d138c8dc424934458439435a8da065

                          SHA512

                          ce1551ccaed17f41d6b6693e2a4cbe7b3b1563375348d4c01f470d4dd4f38325b2425ba4a21b4a6d7206f0e46b34382360426f3c57f2c8e32c8462eb9a6a4d51

                        • C:\Windows\{B6B0642D-A942-4947-BECE-949441766EBB}.exe

                          Filesize

                          408KB

                          MD5

                          5e282ae188b0a3ca946dc8087f2414b4

                          SHA1

                          e60373b0a282c65dcc1f0dc5079213d516fedb0c

                          SHA256

                          78e3a634f4274db5eb353347273d20a29799f526e78418939bbefdab8585b7a5

                          SHA512

                          33c38d559795e15cbca720ec6609557ea24e195becef49c5394ba2b624932851429a0e54e54c9fea7ba16e2943a72d17e4d6d16df9f771ead99f87240ddb0d0b

                        • C:\Windows\{F1682937-283E-460b-AED0-74B8D1E7CAD1}.exe

                          Filesize

                          408KB

                          MD5

                          ecd71d7eb55ff5ca155768df22805b5d

                          SHA1

                          a5b8b0c3ad47388c25f1c82025fed6fdd9838fc5

                          SHA256

                          aa98c0c90ba79c5832212178d7aa87829e72ff54950737218aa94dbe8c9ab81b

                          SHA512

                          d4791fe0704ff64e08c6d6794678b98b484f068dc4fbf840885c6950ab29a176693edb429fe49bea169ea6d1c8b85fe98bc273b3d3cc5df233dd30c6b884cfa5