Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21/02/2024, 17:59

General

  • Target

    2024-02-21_e53d2d2a4804ae2092fd3686771f0c08_goldeneye.exe

  • Size

    204KB

  • MD5

    e53d2d2a4804ae2092fd3686771f0c08

  • SHA1

    df0e4c29e78df05f35c8261b5d27b4ad60d7810f

  • SHA256

    89722c35fbe99a1c82470d4612ede6fcf6a70264712088ca151ae53650e7c895

  • SHA512

    6a4d4bea85c095cf8213837612066701447d246fd442cab1d402767634b3ccd931b1906ce38887dad959d5c2b543053c258bcfb8e971d94491e2f5629f8c361a

  • SSDEEP

    1536:1EGh0osl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3Hgdo:1EGh0osl1OPOe2MUVg3Ve+rXfMUy

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 12 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-21_e53d2d2a4804ae2092fd3686771f0c08_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-21_e53d2d2a4804ae2092fd3686771f0c08_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Windows\{0DD4165D-DB94-4196-B600-66CAB0DE2A2E}.exe
      C:\Windows\{0DD4165D-DB94-4196-B600-66CAB0DE2A2E}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1316
      • C:\Windows\{67827535-D720-4401-81FC-6C9CF6D26DE5}.exe
        C:\Windows\{67827535-D720-4401-81FC-6C9CF6D26DE5}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2992
        • C:\Windows\{8B89A39A-00FB-4138-85F7-1CAD67E204B5}.exe
          C:\Windows\{8B89A39A-00FB-4138-85F7-1CAD67E204B5}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2104
          • C:\Windows\{DEB0486E-BFDA-40d9-8017-A02B7B09B15B}.exe
            C:\Windows\{DEB0486E-BFDA-40d9-8017-A02B7B09B15B}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2708
            • C:\Windows\{FEDD868F-55DD-4acd-B947-41493EE2249F}.exe
              C:\Windows\{FEDD868F-55DD-4acd-B947-41493EE2249F}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2696
              • C:\Windows\{A984B742-5BFF-47e6-AE15-1E8D620B0547}.exe
                C:\Windows\{A984B742-5BFF-47e6-AE15-1E8D620B0547}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1084
                • C:\Windows\{F4D66496-E843-4043-A4E6-68E8F4BC057E}.exe
                  C:\Windows\{F4D66496-E843-4043-A4E6-68E8F4BC057E}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1628
                  • C:\Windows\{19D782ED-547B-4225-B754-AE037896695E}.exe
                    C:\Windows\{19D782ED-547B-4225-B754-AE037896695E}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1700
                    • C:\Windows\{91FAF075-41D0-4050-ABBF-7585E690A7B3}.exe
                      C:\Windows\{91FAF075-41D0-4050-ABBF-7585E690A7B3}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1660
                      • C:\Windows\{034AC4F8-C72B-4aae-9E7A-3CC9D12EBEF4}.exe
                        C:\Windows\{034AC4F8-C72B-4aae-9E7A-3CC9D12EBEF4}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2792
                        • C:\Windows\{79DB4DA1-5A39-4888-B880-281904FC51C9}.exe
                          C:\Windows\{79DB4DA1-5A39-4888-B880-281904FC51C9}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:1468
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{034AC~1.EXE > nul
                          12⤵
                            PID:996
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{91FAF~1.EXE > nul
                          11⤵
                            PID:2852
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{19D78~1.EXE > nul
                          10⤵
                            PID:2296
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{F4D66~1.EXE > nul
                          9⤵
                            PID:1764
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{A984B~1.EXE > nul
                          8⤵
                            PID:796
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{FEDD8~1.EXE > nul
                          7⤵
                            PID:2196
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{DEB04~1.EXE > nul
                          6⤵
                            PID:740
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{8B89A~1.EXE > nul
                          5⤵
                            PID:584
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{67827~1.EXE > nul
                          4⤵
                            PID:2904
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{0DD41~1.EXE > nul
                          3⤵
                            PID:2656
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:2572

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\{034AC4F8-C72B-4aae-9E7A-3CC9D12EBEF4}.exe

                        Filesize

                        204KB

                        MD5

                        a07667cf8968a169caa763561aa03b9a

                        SHA1

                        7a70d9a6ee22272bf010576ad949903151e89e99

                        SHA256

                        0e5b4c5a50e0ae6ac8affb7ca221ca8990998e129228e253d9cbaff53b1f6442

                        SHA512

                        c6edbb539bf0a63a805acaa3fcfe1dac81a911dfecd01e2e27cdd5dea2a328e8a0b1a7eb87ba81bf49840db01b6fc3e14da90893b8ee23542748c1f7e5a4270e

                      • C:\Windows\{0DD4165D-DB94-4196-B600-66CAB0DE2A2E}.exe

                        Filesize

                        204KB

                        MD5

                        c19f7d89fe4dd629a762c7daf0cdd796

                        SHA1

                        3d438c706bb93ace8f8968a7dbc6daa6fb9dff06

                        SHA256

                        132ef0304859f94d5855751e7bb65f1c349b49d524f0cfcf09dc594f1e0ecf1a

                        SHA512

                        d94578fb02d90f9faa84f747bb3b0c8f8e47dee04105443c6916329c3beeaddf79b83c800fb9fd5b0b3faeb6938d74876029cce9fe6ed4953f51a1e79c89435e

                      • C:\Windows\{19D782ED-547B-4225-B754-AE037896695E}.exe

                        Filesize

                        204KB

                        MD5

                        2fdca2eb934f61269f8f6230984635bf

                        SHA1

                        37f71e3c217adec1aa859984d21c3c77af98ccd1

                        SHA256

                        a9d479004586dbaa3211e24bbdd9a1f74140c366cf2659d1067ddeebb51b588c

                        SHA512

                        5db87f85ff84ccd62f8113ed4ac79a292858f1a1c0cae8496a65e92fdff545506b7488dc06834e1d22d5bdfba9e0244ff1ccdd4967546ce823dbd3e410567933

                      • C:\Windows\{67827535-D720-4401-81FC-6C9CF6D26DE5}.exe

                        Filesize

                        204KB

                        MD5

                        5631886cdcc7eadbc69f8fe421dec461

                        SHA1

                        bf0dba9e2b234b16ea9d7fc980621691a9b916c7

                        SHA256

                        67f1695a1dae9f818af32160970b38a51c8a4d10f6ec464edfee80527b2c4f35

                        SHA512

                        990a79478f0f8a00c83705af67689fcf0f4160f6d9aad0d6e3f61a6ea39491e2d7f31d64cea6f950ddbdb02219eab9485bcefa6bb402a75f0d186d2b082e1307

                      • C:\Windows\{79DB4DA1-5A39-4888-B880-281904FC51C9}.exe

                        Filesize

                        204KB

                        MD5

                        589726f1edcdeb04ccf951a7c945be88

                        SHA1

                        f9417216ea3705c04757fa1cc438778c10a8e3a8

                        SHA256

                        a7a0a4a57683096d2538b8de09613dd3207b174a051829f4073890dd57523a14

                        SHA512

                        ec3b23aff0611736528603d894dc1f77586ed7da7a088efa7348368adb0d078ee28df39e71b932606fd062230cce4c63935f8364efab96a689a18db491bb2bcb

                      • C:\Windows\{8B89A39A-00FB-4138-85F7-1CAD67E204B5}.exe

                        Filesize

                        204KB

                        MD5

                        912f1d339743ea6d7264125911dcde5d

                        SHA1

                        97ff4eec1c61492cecfd33809000f0a03d635bf0

                        SHA256

                        49c46f0223efd7a28fcc02c300e157837eb80d9221ada12bfcd20bec0cd323cc

                        SHA512

                        e9fbfcb2a3a72fdc2b4ca97ec6ff551c7b59a04c8392d3945d37b9e1376365ad39b1134dea445ba90028ee0341e3c2bfdeba2e8889df6ae6befcd063e6023b80

                      • C:\Windows\{8B89A39A-00FB-4138-85F7-1CAD67E204B5}.exe

                        Filesize

                        69KB

                        MD5

                        34154e47cc9742e73c93867f5df112d3

                        SHA1

                        a54d3691734037cc1208bf0b4bb9746093677bba

                        SHA256

                        07a117ff3a562b02d75a58156edf08e2701c350502dbfeb684dd36197a4ee220

                        SHA512

                        e6c9a4c14fb3840ff3d5f20b946a614103b2b78745d87439fd93efe0ea16bcf75a94dcd2b3a3bfbe9ef3b90b00ac212ae7368b5445fc3a3b05dc9d8658140b51

                      • C:\Windows\{91FAF075-41D0-4050-ABBF-7585E690A7B3}.exe

                        Filesize

                        204KB

                        MD5

                        d608ad0161fead71863e4b02905d6997

                        SHA1

                        a0cc8f0d15aa9128049c215ce83f2b9ffee83fae

                        SHA256

                        1559614628a9be7d23592233cbf396b6e3eec6e031bb062e75a8eedfac79b5e5

                        SHA512

                        9107bac428a67510bd09a1869ecb0652b60176485ba03b2394c7981650bcf5da078eca99b873ece685355e4fa0de6d0b894ef29389474565428f2badcf64b260

                      • C:\Windows\{A984B742-5BFF-47e6-AE15-1E8D620B0547}.exe

                        Filesize

                        204KB

                        MD5

                        5d32a4a3aef8f1b2d0af72b3cb66162b

                        SHA1

                        665620e403108467b0a7af2389eeed91830a29f4

                        SHA256

                        cd4b6ed401bd21144eea55dba35002ebb3c0f7cb59a7700ad18b32969a0c942f

                        SHA512

                        24f805cb80381d54dd0bee5322538e0f4faa60bc1647b2ebbdcbdfa7c8437f50e604ccf8ae7606e010341220d13b1006fa212166ea50170f0902711a2e85da64

                      • C:\Windows\{DEB0486E-BFDA-40d9-8017-A02B7B09B15B}.exe

                        Filesize

                        204KB

                        MD5

                        e2218deb2c5ffe67b1c8435f3881cd49

                        SHA1

                        5226e2a57be53ca24ab575a04edc419245e573fb

                        SHA256

                        c3f28fc2ea20f0e501e316a07047584a4ee6136f68eb49ad5ab55815e015e53b

                        SHA512

                        9cf4eb823b6f8a5e4536a248edb690c5167fe4aa1c037557d6221ba00a28289e9188da0caf6e348cea6adeab6f706c12118c9fbc7b94e5217e62471f9f21e561

                      • C:\Windows\{F4D66496-E843-4043-A4E6-68E8F4BC057E}.exe

                        Filesize

                        204KB

                        MD5

                        9df8d5049bdc324bca64d76d8ee46cb8

                        SHA1

                        a52d61a7a4b9c30f273c7d16f4f62eeec3ed6117

                        SHA256

                        b70b090e9158ded54f72b59a5a005d984e1001d21bc685d3cde04dfbaa2e1369

                        SHA512

                        e5c5719a3d32a38c7916214e6f5859231190dfb7856e79272483304c34d71c7c901d3e391a5ba5415eeb0a88683dd3f2450f2950451fc208ee07b6feab0d4fd9

                      • C:\Windows\{FEDD868F-55DD-4acd-B947-41493EE2249F}.exe

                        Filesize

                        204KB

                        MD5

                        b51cdfee388de29069dec65463d8f4a9

                        SHA1

                        729060c835e0f8e158a6aec01e80c702171a6b56

                        SHA256

                        c004faf4f9b312fb08b52d1a3af15bf491c37c23620fb35441dabf2e3a1a4e13

                        SHA512

                        d4cc588579f9c16f6d0c5a9221a7be5eaacc0cbaf471df977f1aa3aef0982a4ea90ba6302aca0e47f12d88dbf5ea38b2aff3aad1064702eaf3d1d4be6291ebf2