Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    22/02/2024, 09:26

General

  • Target

    2024-02-22_08e1c33f3759e7fbed092ce590c0ac49_goldeneye.exe

  • Size

    180KB

  • MD5

    08e1c33f3759e7fbed092ce590c0ac49

  • SHA1

    caeea6e46b8e3f99b8e946ee7e7ed6380e0cdc28

  • SHA256

    827de4f7d304e8128d7a1b89db5ecdeb8409068189a5e71d025eee1921af347c

  • SHA512

    a5dfcf72fe73cc1bc6a61adc17dffd6731eec75874d8cfca4883bdfd6c71026591fff1c58a69621b4fb2cfe08a34ab33dd98ad8cef8474c593684616e77b15d2

  • SSDEEP

    3072:jEGh0odlfOso7ie+rcC4F0fJGRIS8Rfd7eQEcGcr:jEG3l5eKcAEc

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 12 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-22_08e1c33f3759e7fbed092ce590c0ac49_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-22_08e1c33f3759e7fbed092ce590c0ac49_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:640
    • C:\Windows\{02E293DE-83CB-45c7-AB77-F27BAB5534F4}.exe
      C:\Windows\{02E293DE-83CB-45c7-AB77-F27BAB5534F4}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2632
      • C:\Windows\{F9EAB7B9-0726-4901-9E40-17D956C5A23D}.exe
        C:\Windows\{F9EAB7B9-0726-4901-9E40-17D956C5A23D}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2384
        • C:\Windows\{7A9E7481-28F9-4891-9513-3D49FB99748F}.exe
          C:\Windows\{7A9E7481-28F9-4891-9513-3D49FB99748F}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2376
          • C:\Windows\{215E4690-81FF-490c-A7EF-C8E70BCBC00F}.exe
            C:\Windows\{215E4690-81FF-490c-A7EF-C8E70BCBC00F}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:552
            • C:\Windows\{C40A95C2-BFE5-4dd2-AA62-1642A0D135D8}.exe
              C:\Windows\{C40A95C2-BFE5-4dd2-AA62-1642A0D135D8}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2328
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c del C:\Windows\{C40A9~1.EXE > nul
                7⤵
                  PID:1828
                • C:\Windows\{FE65002E-950C-4b22-8595-874754036F3C}.exe
                  C:\Windows\{FE65002E-950C-4b22-8595-874754036F3C}.exe
                  7⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2672
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{FE650~1.EXE > nul
                    8⤵
                      PID:1972
                    • C:\Windows\{02F393DC-A6B8-4e2e-96AF-4A3E0B2EEE79}.exe
                      C:\Windows\{02F393DC-A6B8-4e2e-96AF-4A3E0B2EEE79}.exe
                      8⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:1796
                      • C:\Windows\{DA064B03-2541-4ea9-A61B-F2E545D40081}.exe
                        C:\Windows\{DA064B03-2541-4ea9-A61B-F2E545D40081}.exe
                        9⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2216
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{DA064~1.EXE > nul
                          10⤵
                            PID:1556
                          • C:\Windows\{A4897CAB-EBC1-4cbc-A09D-010C6611B217}.exe
                            C:\Windows\{A4897CAB-EBC1-4cbc-A09D-010C6611B217}.exe
                            10⤵
                            • Modifies Installed Components in the registry
                            • Executes dropped EXE
                            • Drops file in Windows directory
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1644
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{A4897~1.EXE > nul
                              11⤵
                                PID:772
                              • C:\Windows\{2AD85B27-92C3-437f-A3A2-B4F2F1FB9CF5}.exe
                                C:\Windows\{2AD85B27-92C3-437f-A3A2-B4F2F1FB9CF5}.exe
                                11⤵
                                • Modifies Installed Components in the registry
                                • Executes dropped EXE
                                • Drops file in Windows directory
                                • Suspicious use of AdjustPrivilegeToken
                                PID:856
                                • C:\Windows\{F159B72E-1ACA-4c24-B4E3-5767AA5CDE45}.exe
                                  C:\Windows\{F159B72E-1ACA-4c24-B4E3-5767AA5CDE45}.exe
                                  12⤵
                                  • Executes dropped EXE
                                  PID:3016
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c del C:\Windows\{2AD85~1.EXE > nul
                                  12⤵
                                    PID:2724
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{02F39~1.EXE > nul
                              9⤵
                                PID:936
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{215E4~1.EXE > nul
                          6⤵
                            PID:372
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{7A9E7~1.EXE > nul
                          5⤵
                            PID:1048
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{F9EAB~1.EXE > nul
                          4⤵
                            PID:2432
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{02E29~1.EXE > nul
                          3⤵
                            PID:2812
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:2924

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\{02E293DE-83CB-45c7-AB77-F27BAB5534F4}.exe

                        Filesize

                        180KB

                        MD5

                        328880be084192cbb22bbff233d414f9

                        SHA1

                        e558df95780c80d43d4b5c6648b245e720f8f906

                        SHA256

                        df5a86db7bda9838f4a2c6ca982343b2f77e30c5f88dae644779d45d911dfad5

                        SHA512

                        4c4bbd7cc1d25ce0560843277327114289b72be167e634072a8e0699089b08cb1cbe561bcd391319d4e9eebc66df8bd6aa6f8881dafd6a191f9f7874e0c02576

                      • C:\Windows\{02F393DC-A6B8-4e2e-96AF-4A3E0B2EEE79}.exe

                        Filesize

                        180KB

                        MD5

                        03e0f5d6b9b2f578ad28efc104211a31

                        SHA1

                        9bba376f5ea9e9aeb4a0c375a460cc8a898bcf2c

                        SHA256

                        dd493c4599381d8b7749846536ba699ca773351872b4a6dcdfc97609b1fee154

                        SHA512

                        8be0b2a4b4e55d0011f0bbf0084759e30b9012ef7f3c4dfa813cbf921b49dbe802da3cd529ab2a71c318d635dbd197b5f92a46df9d5dd208aa6c9ebae18bfd82

                      • C:\Windows\{02F393DC-A6B8-4e2e-96AF-4A3E0B2EEE79}.exe

                        Filesize

                        150KB

                        MD5

                        081665bdb1f55415c839325b9983ada3

                        SHA1

                        1655d3c8a9adf6a7bd7a8b1dd2939bcf04c915dc

                        SHA256

                        677fd1ad0f905f531471f4616cf6c73b26babedc319eaa70f43d09ca7f251889

                        SHA512

                        2205bf90764e6a08bc6215cff111371d33234926eefbc10863ab26f0fac5c31fab03aa67915ff1cdb93d14e9650151bbae36236b268d0bbd1ed0446cd63e446b

                      • C:\Windows\{215E4690-81FF-490c-A7EF-C8E70BCBC00F}.exe

                        Filesize

                        180KB

                        MD5

                        377a48a7f6eaa6bc8147e77207b0ea3a

                        SHA1

                        6703ca0da262b23f38fee727055f0e885b7c40e5

                        SHA256

                        7845bc671dcf9be53f60aade2c191d6bea2bfc04403e86b2555db5db8049752f

                        SHA512

                        47cb687cb7d810b9baac420e02e769d06da47a5ba30aac525d089e3e508c0be37768da47a462ffb8f263db38f6cdc5d5a63cf2030278296f2eb0e7fb621cd2be

                      • C:\Windows\{2AD85B27-92C3-437f-A3A2-B4F2F1FB9CF5}.exe

                        Filesize

                        180KB

                        MD5

                        c0e7d3d37e708ec3de2ba2ddab0d8911

                        SHA1

                        79d344d2aa36bd249c92bbf49c7cd6f16bd0b413

                        SHA256

                        3fab8b69c8bc765b4990550defa0baca424d34ef1e25f50c2291131cbfe47dc4

                        SHA512

                        3235996d68bdf2f2bc0f90dade69caca37c1f60e2f69a39616304ed39a7c40733c0fad7802047aaf1fc337b2e0cf97927050cd8a97bff86ba57813308564b89a

                      • C:\Windows\{7A9E7481-28F9-4891-9513-3D49FB99748F}.exe

                        Filesize

                        180KB

                        MD5

                        6b702fe1fb41d1b8d76f564173301cce

                        SHA1

                        5653475d6b99996c621b3b216e469c877ead425c

                        SHA256

                        b5f269f4d316e523a2548f33a28e9d0f419580c628117dc66b734ed4c5d071d9

                        SHA512

                        52cfb5548f2f5a23baac832b8a55590f080a00e0de74fa67af438b6bf9039be64b050771fe59365a233ec6f5e85e960d53c550ccfc814c68258e6cdbf8f331a5

                      • C:\Windows\{A4897CAB-EBC1-4cbc-A09D-010C6611B217}.exe

                        Filesize

                        180KB

                        MD5

                        71286dea72df167fa117de5670f06126

                        SHA1

                        049e38a727999acccb28136579c4e9103057486f

                        SHA256

                        ec67acf6970fd92c0af7aa137a245750de4aa95e03c7e6913a199b478145eb9a

                        SHA512

                        d71fff5eff6542fb9856a2604af02f626e72dcd9f82abdee95f18f0245e864a4b2ee40ab32860790bb1c35edc73190f018fc52653274b9f6e31a8a88f8066ba9

                      • C:\Windows\{C40A95C2-BFE5-4dd2-AA62-1642A0D135D8}.exe

                        Filesize

                        180KB

                        MD5

                        18970bc145c78e8a0f2a3c7a24d38520

                        SHA1

                        1082e7b0858fad650b0d8a7af1813367eb4d327e

                        SHA256

                        9f35866318d8654fffd572ffe6d178f8fdd3d14ee9d7276403745c789757e396

                        SHA512

                        55f63039d99a2f09de71b54576bb5c3707aca22aeddb77166f8a6ee3368187c38168550a6ceb34b37d09cae5949c02202d0632915de1545f760309617d2e0e33

                      • C:\Windows\{DA064B03-2541-4ea9-A61B-F2E545D40081}.exe

                        Filesize

                        180KB

                        MD5

                        7e9f0e47da0065b6f97645b8d293bb00

                        SHA1

                        c83bc963d5ccd2cc63c7bbb3c8f09db3d8c1a836

                        SHA256

                        db089302060d199e26daef555dafa958393eaab874d9557a321e94a476c8cd81

                        SHA512

                        00c86a2a0d01a29048d57ea80290d2366f72940a43035d1f1bdc471b855766631a1bf9dc3a80e0a5ca8c3f74a8ca83c778e734f719663827741778017de8bc71

                      • C:\Windows\{F159B72E-1ACA-4c24-B4E3-5767AA5CDE45}.exe

                        Filesize

                        180KB

                        MD5

                        9d5ce37989a1a67d7b5041b92a865d8a

                        SHA1

                        0c62acd554e9f19077277035ba87fa4a058ba5a0

                        SHA256

                        a4cbec0ff072e4bd8922280a68e7b3340769374c6048f959826083e8bc87a2de

                        SHA512

                        22005de91cf37fb235e198721c2790dc4cb9e875403b19ee47dc4a837718d45995232b758634da256d2c6d6ed39dde0c26124692d9f672940f2389d451d344d8

                      • C:\Windows\{F9EAB7B9-0726-4901-9E40-17D956C5A23D}.exe

                        Filesize

                        180KB

                        MD5

                        c73154c0eefaae780e25a17bb2446979

                        SHA1

                        62ea215edb55772b1847c9d801b365c9626f11a1

                        SHA256

                        b223817b841c490ee18fbe5cbc1ee7a7f5ef1d8b5cde4b8873646739a925a45c

                        SHA512

                        1c730dad7768fd92e3923571c97ddebb3722dfb60b3d87a38312a90a36a152b5cd6a64360343b8860c6433db0d399dfceac6133c348f9a7f4d7d25fab0eaa822

                      • C:\Windows\{FE65002E-950C-4b22-8595-874754036F3C}.exe

                        Filesize

                        180KB

                        MD5

                        4ea709923ab6fc891d8d1ff3501f7147

                        SHA1

                        3bfd639fc06d41d2db4d447de4a941c5bdd8fc33

                        SHA256

                        7be9f40ce32d94a6fe7cce77cad4a3ce4d1ce692dc487175d2aa76de7f4d005e

                        SHA512

                        f5e53e0f0308db2f977c500ae42a9f14692b682ad90a44430f5a3a690527356a337b8fa336cf3af9af3ea98823d0e545e289a4a0ed2704ed1d0765e57c5c1df7