Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/02/2024, 17:24

General

  • Target

    2024-02-19_19ac4565f46841411a12a6b4e51f5a14_goldeneye.exe

  • Size

    408KB

  • MD5

    19ac4565f46841411a12a6b4e51f5a14

  • SHA1

    20b7d0f0368134b00e21c69c0e5db1352fff68b2

  • SHA256

    f740bc992f87f6e6d6af3b6d88d61b92adb59e03eeb6f605f6a8b945bda63fc6

  • SHA512

    ed3e710e2f80df509c46ce8f79cfd92c8b63b1b5f3cc1b0320dda513e814392c92b450027f44a5cf3813d16f7af57576eae9bf2ff6d7fa6995f2fc83dc008f29

  • SSDEEP

    3072:CEGh0osl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEGSldOe2MUVg3vTeKcAEciTBqr3jy

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 14 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-19_19ac4565f46841411a12a6b4e51f5a14_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-19_19ac4565f46841411a12a6b4e51f5a14_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4528
    • C:\Windows\{27E750C1-57BA-41d2-A176-73A620F78C06}.exe
      C:\Windows\{27E750C1-57BA-41d2-A176-73A620F78C06}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3076
      • C:\Windows\{FFFCA928-7B7C-4e00-88BC-EB4215F24171}.exe
        C:\Windows\{FFFCA928-7B7C-4e00-88BC-EB4215F24171}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1100
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{FFFCA~1.EXE > nul
          4⤵
            PID:2016
          • C:\Windows\{7B1D3533-E70C-462e-8EEF-54AA6164B9E1}.exe
            C:\Windows\{7B1D3533-E70C-462e-8EEF-54AA6164B9E1}.exe
            4⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1776
            • C:\Windows\{383B3EF7-29F9-46ef-AB22-496BC70A865A}.exe
              C:\Windows\{383B3EF7-29F9-46ef-AB22-496BC70A865A}.exe
              5⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3732
              • C:\Windows\{B56EE234-95EA-4a1f-819A-BE0B55612840}.exe
                C:\Windows\{B56EE234-95EA-4a1f-819A-BE0B55612840}.exe
                6⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1512
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{B56EE~1.EXE > nul
                  7⤵
                    PID:2600
                  • C:\Windows\{5C9F0DB6-E598-4714-96A6-EB234E89E34C}.exe
                    C:\Windows\{5C9F0DB6-E598-4714-96A6-EB234E89E34C}.exe
                    7⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:4392
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{5C9F0~1.EXE > nul
                      8⤵
                        PID:1336
                      • C:\Windows\{D770E384-4108-43fb-A96D-F99084DAD254}.exe
                        C:\Windows\{D770E384-4108-43fb-A96D-F99084DAD254}.exe
                        8⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:4776
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{D770E~1.EXE > nul
                          9⤵
                            PID:4040
                          • C:\Windows\{C074DC76-6206-4983-992F-8A0E16ADD6ED}.exe
                            C:\Windows\{C074DC76-6206-4983-992F-8A0E16ADD6ED}.exe
                            9⤵
                            • Modifies Installed Components in the registry
                            • Executes dropped EXE
                            • Drops file in Windows directory
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:3760
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{C074D~1.EXE > nul
                              10⤵
                                PID:4660
                              • C:\Windows\{982D033A-4966-405c-A469-4FC99428B128}.exe
                                C:\Windows\{982D033A-4966-405c-A469-4FC99428B128}.exe
                                10⤵
                                • Modifies Installed Components in the registry
                                • Executes dropped EXE
                                • Drops file in Windows directory
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of WriteProcessMemory
                                PID:3972
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{982D0~1.EXE > nul
                                  11⤵
                                    PID:5108
                                  • C:\Windows\{5DDAF94F-2556-4445-8D16-5EF01477C720}.exe
                                    C:\Windows\{5DDAF94F-2556-4445-8D16-5EF01477C720}.exe
                                    11⤵
                                    • Modifies Installed Components in the registry
                                    • Executes dropped EXE
                                    • Drops file in Windows directory
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of WriteProcessMemory
                                    PID:4932
                                    • C:\Windows\{188FE642-0AE6-4365-AFB0-DA7D6214CC57}.exe
                                      C:\Windows\{188FE642-0AE6-4365-AFB0-DA7D6214CC57}.exe
                                      12⤵
                                      • Executes dropped EXE
                                      PID:116
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /c del C:\Windows\{188FE~1.EXE > nul
                                        13⤵
                                          PID:396
                                        • C:\Windows\{E58100BC-8D3F-4a48-8C13-40BB2D9963D8}.exe
                                          C:\Windows\{E58100BC-8D3F-4a48-8C13-40BB2D9963D8}.exe
                                          13⤵
                                            PID:1944
                                        • C:\Windows\SysWOW64\cmd.exe
                                          C:\Windows\system32\cmd.exe /c del C:\Windows\{5DDAF~1.EXE > nul
                                          12⤵
                                            PID:3988
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{383B3~1.EXE > nul
                                6⤵
                                  PID:4852
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /c del C:\Windows\{7B1D3~1.EXE > nul
                                5⤵
                                  PID:1064
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{27E75~1.EXE > nul
                              3⤵
                                PID:3512
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                              2⤵
                                PID:1780

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Windows\{188FE642-0AE6-4365-AFB0-DA7D6214CC57}.exe

                              Filesize

                              408KB

                              MD5

                              251419bc0e7de82bf6a2a13880e91a98

                              SHA1

                              11c7dea0d132a864dea8864d6c764c92927c7bec

                              SHA256

                              79b96e63d126c242b0c17ea704c76e83b49ad48707c4d84157af474134fa474a

                              SHA512

                              79be17eb9397ba9e380ffce9041ed601ea13721f782e4e32eb6416e512f7120bc07290b906fa65b54eb4a2316da001e93055f80062e58e9cb8c13c8f18f1c03d

                            • C:\Windows\{27E750C1-57BA-41d2-A176-73A620F78C06}.exe

                              Filesize

                              408KB

                              MD5

                              97568a41d6fa5721ec9c2ddd61e5e5bd

                              SHA1

                              4fe4f82a2e728fa366bc228fe1532ad1f8c434c7

                              SHA256

                              8db84b4b4d45fc9240ad51804a328fc537939a8c59e779ec53723c6d8a2bb1b4

                              SHA512

                              eb27ed00243713d09006adebbd9e2167ddbcff3894f67047a4a26bfe6c13732a310581d3c19f3397fa82d5745285cbe1d360fb25c2b718d351bfbacea49b879f

                            • C:\Windows\{383B3EF7-29F9-46ef-AB22-496BC70A865A}.exe

                              Filesize

                              408KB

                              MD5

                              16dbaff4f22ed650e6a16e1afd281b4d

                              SHA1

                              dad5fd95d3a0041e3f3b3343c233671d88b5feae

                              SHA256

                              159708b10464724a2ee63fb8cf7c268e98bfca203d2d3eee93af6c198765b924

                              SHA512

                              8efefb81468ef614deac7b0690367d1c79e583ba37e94f8e6841a81887a7616c99ec5400bdc2a0839b74b627f9be94c69eda8f47bd416d9bbf136194ed0b6626

                            • C:\Windows\{5C9F0DB6-E598-4714-96A6-EB234E89E34C}.exe

                              Filesize

                              264KB

                              MD5

                              952ab3c00444af6ad75facb0f4f0b822

                              SHA1

                              db8693598afaa8e1bda1ba2afe73c7a635f5fa93

                              SHA256

                              394ee774af6a1c2f7ba9eaf2e144f02a0e1b87f5da404e4681e59efdf745e142

                              SHA512

                              ad58f914f04d15f304728da4c52154d154475a00af553dd15fece0cb04741c50c471ea8f9f713dbc38f3d65655f36d8decb2ac0ba393db6391ece57c652bb45d

                            • C:\Windows\{5C9F0DB6-E598-4714-96A6-EB234E89E34C}.exe

                              Filesize

                              408KB

                              MD5

                              7c1b6fd2f993148fd5acee15adff1300

                              SHA1

                              849002d661ce71c021ed49adfe291c3dabd3ab02

                              SHA256

                              4ca1dd3f3eb0612fdfabf24835fa9534f1801c85c2982872a6b925465119eb85

                              SHA512

                              55414206758ed478a37da53a9062180e3a16cf8e9c8281ffc189e20c9b6ffc1f17596a6698bbe33374e824ad32fc57cec1c8021dec8e2abee2313621f43a26e8

                            • C:\Windows\{5DDAF94F-2556-4445-8D16-5EF01477C720}.exe

                              Filesize

                              408KB

                              MD5

                              eb75696f79bb5a9e00c593f144046dbc

                              SHA1

                              8c1879302077a287480896abb614054230181f40

                              SHA256

                              18f2f781a03d9bb41b8719578ff37cdc438a7e772bbf36d68e3e7590f07e9638

                              SHA512

                              bf7fed46b576c1b2fa47b50255f4f2be8df1ed3fb47c4dc96cf1b1484558ed427b9db5a4fea90455c2837df6ba5dd351b1db8d3a85f64694820b4a8176227565

                            • C:\Windows\{7B1D3533-E70C-462e-8EEF-54AA6164B9E1}.exe

                              Filesize

                              408KB

                              MD5

                              c358c3ebab187aca54620d75f6e21271

                              SHA1

                              640ea0a4e604e7963e0b96bcb75de7dcd144bcf7

                              SHA256

                              032404ee71bf942ba9fd81324282c8e0470519192eb5f0e4ef7263f5d44ebb2d

                              SHA512

                              91b75b040762330544da7d032c49f866d752dd6af61179881c2a7f9a82550ea2d8d8f52aa07a30ad5c504b818dfffb04ee3679079935eac96533aa579ae09b57

                            • C:\Windows\{982D033A-4966-405c-A469-4FC99428B128}.exe

                              Filesize

                              408KB

                              MD5

                              518d225ca22ac71e754ecbe2dee350e0

                              SHA1

                              7b9ef847f81e4424b0381cfa09477021878211cf

                              SHA256

                              2ef17f8fc041ff68e045baedef9c3122d5ea720923fb0102c44b16844cd66381

                              SHA512

                              750ce9409c295d9f582101168653861f697a447f5df35aadca4144ba578e740d3bb0383913d5441ca0f466ec5fb620cd699b397f141318b8200cd37b834e73e3

                            • C:\Windows\{B56EE234-95EA-4a1f-819A-BE0B55612840}.exe

                              Filesize

                              408KB

                              MD5

                              bf9d58d269955757d3947a86cceb16f0

                              SHA1

                              37bbc45d9ddd41f890b7f33f15427acf4e3a2011

                              SHA256

                              ee731c423a19fea8c2323dc30d9c52f6e069f14d6d4d0fd67f4b47d7bbde4d32

                              SHA512

                              e14ddd705656ed1e9fcd7fcd057854358836367bbbe2ba31568783ea527cc0971e2f3789f2284e1729aafdbb1b1f71824cebfe9da43a8e91935b41b255cd6de0

                            • C:\Windows\{C074DC76-6206-4983-992F-8A0E16ADD6ED}.exe

                              Filesize

                              403KB

                              MD5

                              640273ffe6e047d2c10fc878354d8ae9

                              SHA1

                              c09d7e5a484ad6dbe920878f47a673cc04781204

                              SHA256

                              c9155381a8568abc01d32d454bf7438dc724eda529296354f921f99f8099f098

                              SHA512

                              9216b4a826de5755a5c443c7b422d7702921e1325c0edc6a77eee2a8e1c9361e2c641452ba1ea613d1c180f76afd8d55954a4d438b69215bec339e0b2f8deff8

                            • C:\Windows\{C074DC76-6206-4983-992F-8A0E16ADD6ED}.exe

                              Filesize

                              326KB

                              MD5

                              a60004ffcea1b28c292be774dcebe4b0

                              SHA1

                              2ad013eaa21704eaf808f27635e245fc9bc9a803

                              SHA256

                              7b6e7dc372dae047ca5946af8ce42edd47c9ef84eaad119582e0e4c4c7128ec4

                              SHA512

                              1fd4f1c2792f724b9b275bf3b320d6c88c207c87064ed587567e6c7f4e4232a8af48387f8cc4b987d31da52400242dcb2b6642f2a8a3c494aa56d41c7df823bd

                            • C:\Windows\{D770E384-4108-43fb-A96D-F99084DAD254}.exe

                              Filesize

                              408KB

                              MD5

                              cbd07f8ce34f20348e138ab4b08d5978

                              SHA1

                              9ea8762d8ff50978b6635f013957bbc682d520ca

                              SHA256

                              6a51065ce17c00fe18111d2840050f5da3968004f1290971f3839e72eca644ee

                              SHA512

                              6ae9c85b004f6eafce1c1a092fd6f7ac751608347492c930c59ee4c1025a9cfde8dd21e18c2288f163f6ab18c711a7465f115583a47762fdc0ec1c6496b41bfe

                            • C:\Windows\{E58100BC-8D3F-4a48-8C13-40BB2D9963D8}.exe

                              Filesize

                              408KB

                              MD5

                              cab60e2faeb8cef5a507d4350d391799

                              SHA1

                              6e666d93d89a15925ddcff5686840f2ad8684f53

                              SHA256

                              a4027eaf2234025b8572a2e43d7d4376b4b92d4f648e4b586e45a5829293f555

                              SHA512

                              146965bde9675093cb54e20bb325fe082be9f7005d28d77696d25cac8f08e2d7b90d861e82b836ba954a40ca2241fb30d0cb1f9374d919b16d2fdf8f98ea34bf

                            • C:\Windows\{FFFCA928-7B7C-4e00-88BC-EB4215F24171}.exe

                              Filesize

                              408KB

                              MD5

                              7782cf5e03d322c0dff0b9fe450bb04e

                              SHA1

                              9020c9ebb7bc132e5732ee3b89c77b06b0b08f07

                              SHA256

                              1f6f7163e9497f47f5661233f0bc31efd4a3bb1a68093f29ee2aefc36e4dc3a6

                              SHA512

                              df5dfeb0ec55bde61a156d9fd38cecb87e18c3233bb81bf3bfcb7bf13efe1afaa9d88d66cba03cfb0c7ddbf7a749ca374056fe2c8510b1dbdcfebc0ba1109e06