Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    19/02/2024, 03:52

General

  • Target

    2024-02-19_afd63adf694035162ec7f01823e4c55e_goldeneye.exe

  • Size

    408KB

  • MD5

    afd63adf694035162ec7f01823e4c55e

  • SHA1

    dc6a2ebd4463295ede6c5147ea1c2037de4bb581

  • SHA256

    fb9c0a6ebe76f413d154e446e1ddaab8730f5d0cf354f45759934cfe25c03096

  • SHA512

    173bd0f96f615413063b835cdb7a6feb492d538257baee1f54f3d76596f54d7d382d6d5cc6040a54f073bc841437db11ee1a4867a57f25ca57d2def36170884a

  • SSDEEP

    3072:CEGh0o6l3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEGgldOe2MUVg3vTeKcAEciTBqr3jy

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-19_afd63adf694035162ec7f01823e4c55e_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-19_afd63adf694035162ec7f01823e4c55e_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Windows\{18EDBF9D-40DE-4535-BEEF-C0224D399359}.exe
      C:\Windows\{18EDBF9D-40DE-4535-BEEF-C0224D399359}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2252
      • C:\Windows\{17AE5A0D-F9B1-4a54-948C-2C4CC4CD0114}.exe
        C:\Windows\{17AE5A0D-F9B1-4a54-948C-2C4CC4CD0114}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2628
        • C:\Windows\{8CDB5F48-DADD-4048-A1D3-2A685F8FF8D9}.exe
          C:\Windows\{8CDB5F48-DADD-4048-A1D3-2A685F8FF8D9}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2748
          • C:\Windows\{1EF0E2DB-1335-4ca0-8E47-0A832D78B66C}.exe
            C:\Windows\{1EF0E2DB-1335-4ca0-8E47-0A832D78B66C}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2212
            • C:\Windows\{1D75ADEC-95B4-4e64-94E0-01B9EF06DF7F}.exe
              C:\Windows\{1D75ADEC-95B4-4e64-94E0-01B9EF06DF7F}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1768
              • C:\Windows\{9C7CE231-5D7F-4f89-86AF-D42B9A1E7F35}.exe
                C:\Windows\{9C7CE231-5D7F-4f89-86AF-D42B9A1E7F35}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1588
                • C:\Windows\{33E47A83-3B02-4987-B0F0-61D89C91F530}.exe
                  C:\Windows\{33E47A83-3B02-4987-B0F0-61D89C91F530}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2716
                  • C:\Windows\{EB5B197F-CD53-4dc5-B366-8A0F5CF0008F}.exe
                    C:\Windows\{EB5B197F-CD53-4dc5-B366-8A0F5CF0008F}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1784
                    • C:\Windows\{336D752C-D12E-44b8-A8D2-5547C6471E2C}.exe
                      C:\Windows\{336D752C-D12E-44b8-A8D2-5547C6471E2C}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2052
                      • C:\Windows\{D7FAE617-43E5-455d-B73F-4251B820491F}.exe
                        C:\Windows\{D7FAE617-43E5-455d-B73F-4251B820491F}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:268
                        • C:\Windows\{564CDA6E-912C-481a-8264-D8F272C7B163}.exe
                          C:\Windows\{564CDA6E-912C-481a-8264-D8F272C7B163}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:1168
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{D7FAE~1.EXE > nul
                          12⤵
                            PID:528
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{336D7~1.EXE > nul
                          11⤵
                            PID:1248
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{EB5B1~1.EXE > nul
                          10⤵
                            PID:2804
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{33E47~1.EXE > nul
                          9⤵
                            PID:2796
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{9C7CE~1.EXE > nul
                          8⤵
                            PID:2820
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{1D75A~1.EXE > nul
                          7⤵
                            PID:1652
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{1EF0E~1.EXE > nul
                          6⤵
                            PID:808
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{8CDB5~1.EXE > nul
                          5⤵
                            PID:1956
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{17AE5~1.EXE > nul
                          4⤵
                            PID:2608
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{18EDB~1.EXE > nul
                          3⤵
                            PID:2148
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:2380

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\{17AE5A0D-F9B1-4a54-948C-2C4CC4CD0114}.exe

                        Filesize

                        408KB

                        MD5

                        b351c023a2bf6b0a93825525fda15fcd

                        SHA1

                        9da73ebf3a0eb478adda6b63a5a342fc76c804cb

                        SHA256

                        3207072a0c905286d999ec75a64e238adb29975e403ea30073920fd98e8a183b

                        SHA512

                        e26408460bad9bc8d54729f9a8a94d5321c138fa15ed9b66eb04de626488b3aba47d7dfcc56da0c80d257fec091c07171680e199797ff34776d77e736a7a440c

                      • C:\Windows\{18EDBF9D-40DE-4535-BEEF-C0224D399359}.exe

                        Filesize

                        408KB

                        MD5

                        e3d2be247558dac34f17d3453007c50c

                        SHA1

                        ebb91cc982b3e42b2d1e00fdf6107235b5994883

                        SHA256

                        90c867a6e3883bd2dc24de351a9355973428a169edcc47c750fca223563445a0

                        SHA512

                        9331beb09beb3692db7b820e987eb6fdb4fc3311b95d72cc69409b688ea1a17fbbbf784bd0e3c7eac79125537a78e5c1a65a39fe59a7e73e8d6292e02c34f686

                      • C:\Windows\{1D75ADEC-95B4-4e64-94E0-01B9EF06DF7F}.exe

                        Filesize

                        408KB

                        MD5

                        2b32003bdbb0b5cb87e8995483826590

                        SHA1

                        0e84b1f23869f6ccf9ebef96b0904e6b958a60b6

                        SHA256

                        82bd9f0f7c19e85621e49a4dd25b5a808397be6e4835c06a0240d594a0446c4d

                        SHA512

                        dc8d19265a8646b81adff67dc702997dfc2e6da0fde906273dfe394e245e40475e74069fcff35835aba9f8867e723a19c514d8e3e3773d55a94b912962cf1040

                      • C:\Windows\{1EF0E2DB-1335-4ca0-8E47-0A832D78B66C}.exe

                        Filesize

                        408KB

                        MD5

                        489d719e8316f4af9a5b16583f663be3

                        SHA1

                        2b47a1d740407c68fc906d8dd11f9f1e2ede476d

                        SHA256

                        cbe2dd2ef56c5cef1c887f15e1e5c8ef75368b1217410642d4e7241c2f1540e4

                        SHA512

                        34162132cf91ff2c140d3671c5af2d0d89bdc557194ecb482e09f95bd957f417bc89bb9dcbeebd041fbc292d04807d2b35941c66dc49d2e353639b5e9e0792dd

                      • C:\Windows\{336D752C-D12E-44b8-A8D2-5547C6471E2C}.exe

                        Filesize

                        408KB

                        MD5

                        c19f7e4781fc6cab21dfb437ceeba793

                        SHA1

                        cfed218b14140fc111238c4ed27349e4fdb58728

                        SHA256

                        b9c7e1752b759bf61f64f8b0d98c4d8858138dc8a7391cbb44a6c4567ae02a59

                        SHA512

                        ebb842995ead8daab1f6e2cb611e9c8f6721644c8dca4753608eeaf4e68f81935695e0b04341b2b9c82e4816c620a460a05b43e043b3eef1c88619156d6cd9d7

                      • C:\Windows\{33E47A83-3B02-4987-B0F0-61D89C91F530}.exe

                        Filesize

                        408KB

                        MD5

                        f33ba169c3b5035def2cd7bde4d5c990

                        SHA1

                        ebd3796360abaf4640c432c22b8073d4dd2c0d33

                        SHA256

                        787a2def884be53384d2e191fda6620d1390c5b6e6af42eba66cf13e73623219

                        SHA512

                        d15a772725aa7e98df3ec5bebe674a8606648114dd735513de5173e6386360550877b25ac4049a4a4745c1dd7dbadb9e74ba65d9b65a60c42f17bed8a2652e61

                      • C:\Windows\{564CDA6E-912C-481a-8264-D8F272C7B163}.exe

                        Filesize

                        408KB

                        MD5

                        0559592bb319a7c75b30ddfe399f9ee2

                        SHA1

                        7020d70c87100b71f1842388e83e9baaa99be0a5

                        SHA256

                        deb8c5b96d53535f712b289fb932dfd0956e6004d735dee14d2cdf3ff42060e8

                        SHA512

                        0010f56b7577788b465e98c0624b47be4098c26e1509e2bc2e190ab7b3881c4ccc9d2f8d21d87bc80d059808ca9df9c80725c3f75cef3f9886d9f98792245f7f

                      • C:\Windows\{8CDB5F48-DADD-4048-A1D3-2A685F8FF8D9}.exe

                        Filesize

                        408KB

                        MD5

                        6ecbc995c2b87533106d90be91f1d24a

                        SHA1

                        80a3649020ed6807adf20cbe51b743c5157dcafe

                        SHA256

                        da08da651914662d377146dff57886bd05ba8443742150c85266a03185b2f95f

                        SHA512

                        f1e3f065768fcbd9650aad8e942fd3859093a2088f94f02739d806365726b36a58ed77297731d5a09ae243104d16a4e19cf9c32c53692cde8c222421b8876a92

                      • C:\Windows\{9C7CE231-5D7F-4f89-86AF-D42B9A1E7F35}.exe

                        Filesize

                        408KB

                        MD5

                        7a4ccf980b4300dcc510ef1c8a2e89b0

                        SHA1

                        1fff5801ad771b55ffcceb76cac5f36e6431c168

                        SHA256

                        7ded961a32202c329ebd3453b4872970eae019f4d2e2be58482618037798c776

                        SHA512

                        85cfaf486a5f64fcb7591dc46945babc75d01d066263d628fec1727c2447f830ef16282b44f74ee17d8dc94067036d59121c5bfd7e2951a0697db5a5a4ac16bd

                      • C:\Windows\{D7FAE617-43E5-455d-B73F-4251B820491F}.exe

                        Filesize

                        408KB

                        MD5

                        27959b386f19372b3f86b9f01aec8f18

                        SHA1

                        545c74fba6ae6645fc8016bee8f0b710c1774f1e

                        SHA256

                        68901ee39b4db86517b6a1bfb3dbf56c3b2c78cfd5419d69246ca9429f616f47

                        SHA512

                        19ef1bb2a5b243023c25e61859a0e58863702ac6650cf02480deb335d9e374f29ac55c59603cf4bca2419ef01a380186bee22fe8621aa222d89df78ad7be3be0

                      • C:\Windows\{EB5B197F-CD53-4dc5-B366-8A0F5CF0008F}.exe

                        Filesize

                        408KB

                        MD5

                        6df0ee006794004852b613d48f42b219

                        SHA1

                        f68f069c1d8361c8cd48197f31c8fa858918b36f

                        SHA256

                        e6794b1c6f1c6606531bdde206b466cd1b8bedc2b24afac98f4b698541e6bd9e

                        SHA512

                        520b1bb60bd966028155ec3fd1eebef18830c4544f5fdb093867ada19981ca9d8f71c54f73dbb617792cb943c3e97dc149531fd12bc2bad8d772e3f18a7228ae