Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    18/02/2024, 17:43

General

  • Target

    2024-02-18_60963c9fe998a92198f04daae00c2d77_goldeneye.exe

  • Size

    344KB

  • MD5

    60963c9fe998a92198f04daae00c2d77

  • SHA1

    39b2ae023e5ea9c54b1332a581e6cd996d3b37fc

  • SHA256

    0c9057675ac72e3033f51acaf4317fe6c4417f38e7c68d75e0f266a053815639

  • SHA512

    bc2bd2f2107efcdc7ee8435241f1a98de69b8385ea4327e137e3547c73d6271f2ecc881f2e9736f3c2eb3f967de45d661c00fb5383f7cd12d4934e9c3220738c

  • SSDEEP

    3072:mEGh0omlEOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGL:mEG8lqOe2MUVg3v2IneKcAEcA

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-18_60963c9fe998a92198f04daae00c2d77_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-18_60963c9fe998a92198f04daae00c2d77_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Windows\{5BEBB92D-5B8D-48af-BC02-9F0A9EEF73B1}.exe
      C:\Windows\{5BEBB92D-5B8D-48af-BC02-9F0A9EEF73B1}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2952
      • C:\Windows\{1C34F267-C6AD-4623-87CF-D740C7A1D3A0}.exe
        C:\Windows\{1C34F267-C6AD-4623-87CF-D740C7A1D3A0}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2632
        • C:\Windows\{31DFE9F6-6FBE-409e-97A9-97AA94A5005A}.exe
          C:\Windows\{31DFE9F6-6FBE-409e-97A9-97AA94A5005A}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2768
          • C:\Windows\{BDEC96E4-63B6-4ea6-BF40-98BD15E7CD78}.exe
            C:\Windows\{BDEC96E4-63B6-4ea6-BF40-98BD15E7CD78}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2876
            • C:\Windows\{DDB01856-6C0A-4003-A1AF-BD1C4661CBD8}.exe
              C:\Windows\{DDB01856-6C0A-4003-A1AF-BD1C4661CBD8}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2968
              • C:\Windows\{A6EB20AD-361D-4ebd-8C46-7EE930431647}.exe
                C:\Windows\{A6EB20AD-361D-4ebd-8C46-7EE930431647}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2712
                • C:\Windows\{7378FE5A-3005-4340-ACE0-B42949952003}.exe
                  C:\Windows\{7378FE5A-3005-4340-ACE0-B42949952003}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2532
                  • C:\Windows\{E0F2B5BE-9862-4803-A326-846FA0F65698}.exe
                    C:\Windows\{E0F2B5BE-9862-4803-A326-846FA0F65698}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2972
                    • C:\Windows\{45501AE5-F07C-4b3d-BF4C-0DB26BAD27D0}.exe
                      C:\Windows\{45501AE5-F07C-4b3d-BF4C-0DB26BAD27D0}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2076
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c del C:\Windows\{45501~1.EXE > nul
                        11⤵
                          PID:680
                        • C:\Windows\{62EDEEAE-24BF-4a82-83A6-BEDE8A9EEB7C}.exe
                          C:\Windows\{62EDEEAE-24BF-4a82-83A6-BEDE8A9EEB7C}.exe
                          11⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2844
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{62EDE~1.EXE > nul
                            12⤵
                              PID:2056
                            • C:\Windows\{FFA0D19F-FAF5-4774-AE22-7077285E7D9A}.exe
                              C:\Windows\{FFA0D19F-FAF5-4774-AE22-7077285E7D9A}.exe
                              12⤵
                              • Executes dropped EXE
                              PID:584
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{E0F2B~1.EXE > nul
                          10⤵
                            PID:2316
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{7378F~1.EXE > nul
                          9⤵
                            PID:1644
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{A6EB2~1.EXE > nul
                          8⤵
                            PID:2684
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{DDB01~1.EXE > nul
                          7⤵
                            PID:1876
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{BDEC9~1.EXE > nul
                          6⤵
                            PID:892
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{31DFE~1.EXE > nul
                          5⤵
                            PID:2996
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{1C34F~1.EXE > nul
                          4⤵
                            PID:2752
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{5BEBB~1.EXE > nul
                          3⤵
                            PID:2732
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:3064

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\{1C34F267-C6AD-4623-87CF-D740C7A1D3A0}.exe

                        Filesize

                        344KB

                        MD5

                        ee46cd813e525a2dc62207867e49a9ff

                        SHA1

                        6d4a3a499dd28a8d678651c3933bee8038324140

                        SHA256

                        8f14de4cdc6a39b041ce53c39535fdbe8087778e4a213c9ae786e887069720fb

                        SHA512

                        d2da7f354fc0a32d39286873c8bd046f9c7ad941352dd7c7931b22821ca68649c750d2b8bd407ea4a602183893c906a72a336b69de08dfb622ed7368e470738c

                      • C:\Windows\{31DFE9F6-6FBE-409e-97A9-97AA94A5005A}.exe

                        Filesize

                        344KB

                        MD5

                        d06cc2f637f73de9c588ae4c79e56308

                        SHA1

                        bfae570278b33ba659eb0464fb505c4435514bc4

                        SHA256

                        612db2ca087c56ec666f75ee705b341086b5d3ad5ac9b79345df840dc76253cd

                        SHA512

                        8f07150fe0da1d1727a371b289c2353b8e139c8ded11f29e166cddf418b920627ad1780490e34b09b0fa6efcbbde9fbe09679c7cb3cfed93b641f70008ab7b59

                      • C:\Windows\{45501AE5-F07C-4b3d-BF4C-0DB26BAD27D0}.exe

                        Filesize

                        344KB

                        MD5

                        a42a81b93051285bfb67ab802fe3577e

                        SHA1

                        d9e8c6dc6440a278e59f3f1cba438e268a17fe2d

                        SHA256

                        6f4908ffb90cfde9c7dfc8fd32466a91e93ff2b57a3111cb67c28a7b3f74ace1

                        SHA512

                        0ec4a0e3b52c1474e275e5870ae8d081527358643d2051b501b7117b17d4fbf9bdca5869754a9ad84c1d5725d0b29abd511f1189bbc3c9f24931423ece45b14c

                      • C:\Windows\{5BEBB92D-5B8D-48af-BC02-9F0A9EEF73B1}.exe

                        Filesize

                        344KB

                        MD5

                        d5c2c64f0a05d03d6cedd85a3750fe88

                        SHA1

                        3d6103600e60780b748e3d93ae7a0c14f50c9dbd

                        SHA256

                        8917935d311ba3f4fe2f512cd44eb190c92cb45054c817f30f31927e57454be5

                        SHA512

                        3e3987c9528ca7ef2858425e4a504208a1007b1f0a418bba0af2df8ccd56a524ebedac2e6f06c3fbb3de755b3244aeb3f13e9b6a35000cd54b60d42ed7d9ebdd

                      • C:\Windows\{62EDEEAE-24BF-4a82-83A6-BEDE8A9EEB7C}.exe

                        Filesize

                        344KB

                        MD5

                        6983e0d268c7ce43c1039ca2bbc4682f

                        SHA1

                        71c336d30d0843db804235509bd35cb8dd15d83e

                        SHA256

                        9cd798129258913d1893ff0ae680b9d753429f55a2e5819a46f56c6d5584eac1

                        SHA512

                        9f8868fe03159f2ae40bc4865db144fc9454fb65004055fd416b811b45d411be06f41ccc82e498a243ec83b2e12ebfbb9451cbdb7e21e74998a634de0c88b6db

                      • C:\Windows\{7378FE5A-3005-4340-ACE0-B42949952003}.exe

                        Filesize

                        344KB

                        MD5

                        2301d87bd0cd8a9acb22a4bc14d06446

                        SHA1

                        00b67747494e375e990bada36f1c163cd40a5ca0

                        SHA256

                        f7d4f2f72d5c40573af66538b42df00c10981840af41984058884de07b665575

                        SHA512

                        505143adedbfc7af149b5fccb74f6a20e9d4a7c5b72d231da32ef5a722b906ff5c3b166726c67de8a0b55021e4ba41289089a7583c9303089900ebeeb2345146

                      • C:\Windows\{A6EB20AD-361D-4ebd-8C46-7EE930431647}.exe

                        Filesize

                        344KB

                        MD5

                        316f50bd4452e6f02847c9cb97f0fcec

                        SHA1

                        91aaf38024bae1999efe4254d10986168163c49b

                        SHA256

                        1af251869203f487edc7f3a5592fd7ba6cec968216fa5ec88489289baf3a1185

                        SHA512

                        505d9a33e7af195af6ddbbaa180ba8666a991dec96b56a7a494369989128b83d5a6fd999843665b66fb833e9e53e64851bbd3212e758edbd2f9e33b0a0fa659f

                      • C:\Windows\{BDEC96E4-63B6-4ea6-BF40-98BD15E7CD78}.exe

                        Filesize

                        344KB

                        MD5

                        eef2995c8e9a1049af25fa7ecea95854

                        SHA1

                        70e2b4cd6af2a02087e01744697733ddbf93f734

                        SHA256

                        15826af1b39880385c21f57050449433d47855a0fa017e99d711dc132c8cae7b

                        SHA512

                        51bec705d1ba849949e37235260e2b6162320dab5eecd915273b9ee938fafb6ae14f10e909ccebd832a8071c92a9732111963f5f9282fb5281a731203c39c1a1

                      • C:\Windows\{DDB01856-6C0A-4003-A1AF-BD1C4661CBD8}.exe

                        Filesize

                        344KB

                        MD5

                        a1ac1dddf8ab1c304a23ec4f99d706c3

                        SHA1

                        5001c091281f0f00789d1a6ab8407618a03d04d4

                        SHA256

                        86210c6cc1170b5f25f7a3a5972eb6e9929bc53a045a0d8b322cc9e9b15e857d

                        SHA512

                        8b4ff00a6a1f48a7b3533502794b73281089d406cb96ca1b4487a60098dc3fd156542526935aa4783ec6c55e80611c6ea65249c6256e81119c792b98c04d6067

                      • C:\Windows\{E0F2B5BE-9862-4803-A326-846FA0F65698}.exe

                        Filesize

                        344KB

                        MD5

                        be86709e62f1880ed7286eb906343ab1

                        SHA1

                        bb4e6d178b1a7a2b2fa5853c2be4288e506ee4eb

                        SHA256

                        04e7439a569b268154d6bd69d0e28750226196f322799f2d18aff19ed27a2730

                        SHA512

                        f28736147d92c6b7741b7fa8381b64750e152d3d911a6e45f9fc2d9a164c87b8781845b79ca21a6e99450e31d5d45bd64dfc1b964c936b40aa1a226af835163f

                      • C:\Windows\{FFA0D19F-FAF5-4774-AE22-7077285E7D9A}.exe

                        Filesize

                        344KB

                        MD5

                        928f173e0fdfd6a7981e5fd19a0388ff

                        SHA1

                        683dc0a5ed8fc7d0f0e23e36b5126a7e9cb46d4e

                        SHA256

                        912dc79db94148f7f1efc2a6a7a84598d6dab07be55e9f8d901ac79c919a45ce

                        SHA512

                        ad530df10a8faaaf322248f0a85420a6cbd38dd9196023ab1192107e35395a28fdbd935c112eb7de95d7e2fe42c73234397834248c491347e37398336db165fc