Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/02/2024, 23:25

General

  • Target

    2024-02-27_1c30e8576665116797808f923c00bace_goldeneye.exe

  • Size

    408KB

  • MD5

    1c30e8576665116797808f923c00bace

  • SHA1

    e6795570149c5617a958b03e0a7e378a31509966

  • SHA256

    74fc88fb6086dda112302a91e0b180c853b3632c646ab35d7f46926f4728f810

  • SHA512

    4316ecdbba240468e02392bf0a7a384e11226cf728a6cd0c89c7eca140c78cdb50c45bdb1e20a56e04863aa7859e622527c2e64e946e237b67468ad788d95b2d

  • SSDEEP

    3072:CEGh0oMl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBft:CEGWldOe2MUVg3vTeKcAEciTBqr3jy9

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 13 IoCs
  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-02-27_1c30e8576665116797808f923c00bace_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-02-27_1c30e8576665116797808f923c00bace_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5080
    • C:\Windows\{E58F8677-076F-4431-990D-AA50DD691F22}.exe
      C:\Windows\{E58F8677-076F-4431-990D-AA50DD691F22}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2096
      • C:\Windows\{15E43474-7D86-4da4-AE0E-23D2C604B15B}.exe
        C:\Windows\{15E43474-7D86-4da4-AE0E-23D2C604B15B}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:892
        • C:\Windows\{51AD14E1-5498-48a0-B7EB-120629BF29B2}.exe
          C:\Windows\{51AD14E1-5498-48a0-B7EB-120629BF29B2}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2616
          • C:\Windows\{08409513-D2D7-4c2a-899A-9F6590170A68}.exe
            C:\Windows\{08409513-D2D7-4c2a-899A-9F6590170A68}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3932
            • C:\Windows\{69E72F56-20C9-403e-BD69-C3E88B073B6C}.exe
              C:\Windows\{69E72F56-20C9-403e-BD69-C3E88B073B6C}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3972
              • C:\Windows\{17FF5BE5-AF47-4285-BF30-0BC9245C0394}.exe
                C:\Windows\{17FF5BE5-AF47-4285-BF30-0BC9245C0394}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4532
                • C:\Windows\{FF296E38-7E78-41bd-8754-EA71BACC4F13}.exe
                  C:\Windows\{FF296E38-7E78-41bd-8754-EA71BACC4F13}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:116
                  • C:\Windows\{737AC202-3065-49a9-A2EA-D2901D138119}.exe
                    C:\Windows\{737AC202-3065-49a9-A2EA-D2901D138119}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:1248
                    • C:\Windows\{7A328556-D303-4832-AD2E-9450EA4FE0C7}.exe
                      C:\Windows\{7A328556-D303-4832-AD2E-9450EA4FE0C7}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:4844
                      • C:\Windows\{73B5BE5E-F416-4c88-A9CE-A090B028E089}.exe
                        C:\Windows\{73B5BE5E-F416-4c88-A9CE-A090B028E089}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:4368
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{73B5B~1.EXE > nul
                          12⤵
                            PID:4120
                          • C:\Windows\{F69EF639-0A9D-4445-A963-E1B504CD1C46}.exe
                            C:\Windows\{F69EF639-0A9D-4445-A963-E1B504CD1C46}.exe
                            12⤵
                            • Modifies Installed Components in the registry
                            • Executes dropped EXE
                            • Drops file in Windows directory
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3148
                            • C:\Windows\{A8193D59-D611-4d66-A03E-AA020E1C3A6D}.exe
                              C:\Windows\{A8193D59-D611-4d66-A03E-AA020E1C3A6D}.exe
                              13⤵
                              • Executes dropped EXE
                              PID:4868
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /c del C:\Windows\{F69EF~1.EXE > nul
                              13⤵
                                PID:3864
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{7A328~1.EXE > nul
                            11⤵
                              PID:4248
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{737AC~1.EXE > nul
                            10⤵
                              PID:3792
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{FF296~1.EXE > nul
                            9⤵
                              PID:1096
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{17FF5~1.EXE > nul
                            8⤵
                              PID:3452
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{69E72~1.EXE > nul
                            7⤵
                              PID:2136
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{08409~1.EXE > nul
                            6⤵
                              PID:4156
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{51AD1~1.EXE > nul
                            5⤵
                              PID:4752
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{15E43~1.EXE > nul
                            4⤵
                              PID:1908
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{E58F8~1.EXE > nul
                            3⤵
                              PID:4728
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                            2⤵
                              PID:2800

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Windows\{08409513-D2D7-4c2a-899A-9F6590170A68}.exe

                            Filesize

                            408KB

                            MD5

                            6a209684569d0559f4267a9fccef805f

                            SHA1

                            de561e426faaf4463e414b39159837c4de65484a

                            SHA256

                            c7e36441e3822d589718123f07c5a412eb962453557fb47f64089a222b721e6d

                            SHA512

                            9359220f75cbef6f2e155fed9e681cbf8656b36cd7579c46c10af248a43e2dbf17589201a58be62e68306f3796fdf4202c3bb210399e3c2c5511517975c1142b

                          • C:\Windows\{15E43474-7D86-4da4-AE0E-23D2C604B15B}.exe

                            Filesize

                            408KB

                            MD5

                            888a8533114124785c20be3c9f0ca91c

                            SHA1

                            b78d44ba6567ee7588b282d59120610b94a5b7f1

                            SHA256

                            7d516b809a93049510e7b17e031ec647a5770c1c42241d2aa57185f31b2a9fb5

                            SHA512

                            c661e7d2ad89370cb81df92f42b445113debffc7ebbb3994700ecb7779fb812c288c8cada7a59d93b21af3b01e45cdfc868f6c0960031a180b8dd86d1d4e781f

                          • C:\Windows\{17FF5BE5-AF47-4285-BF30-0BC9245C0394}.exe

                            Filesize

                            408KB

                            MD5

                            71d09946618f0decc05b3dff590e8b35

                            SHA1

                            401dbde52a8991d0e112c641773bff22679a3ab7

                            SHA256

                            d52ed3964667d9a826ae1ed9599bb4fe4feafad28d69ada6ea7014f1b84aa1df

                            SHA512

                            6dbe1a9d09439f2b10bc01d850c563aff51ac3c556d5249e4b363d2f305221d0ebf99e280441e5b93b038fec643486971539f5c0d56b4aaefc5877a12d47200c

                          • C:\Windows\{51AD14E1-5498-48a0-B7EB-120629BF29B2}.exe

                            Filesize

                            408KB

                            MD5

                            6dadbab9f6f612529c144838224fb2f3

                            SHA1

                            c5e88af72348cb61b390c7ae94eaac8828c6682e

                            SHA256

                            17bb766d92926dc7fc80db038961a0e933aca5842d803385a348d3ae3c13dade

                            SHA512

                            9a70720d0f34c285ffe8358c008399202f5d572555e8759f88361a63c37d1c6d8328dddf5ffe20b59e842e7371c875c50b3d242f562152b61ed603a9c7483b45

                          • C:\Windows\{69E72F56-20C9-403e-BD69-C3E88B073B6C}.exe

                            Filesize

                            408KB

                            MD5

                            6bba410a8828f73dc039e9e3142bb19a

                            SHA1

                            a88c9c49bf75de473e032d1e58faa1069e3ed604

                            SHA256

                            482e64d7ef486662de778f84c2c6776df81d66aacdb7821d99d5c08808d513a7

                            SHA512

                            81e3e27b83a1da89608d451a516d2cb7bae8976e8800cffa33e6f6bd92ae795bc3326a7725e498362dcbf827d52d516de0bd80d60d179457ed506fcc3aba742f

                          • C:\Windows\{737AC202-3065-49a9-A2EA-D2901D138119}.exe

                            Filesize

                            408KB

                            MD5

                            732b54c466d13c330ba0dd2554b58e5b

                            SHA1

                            92c6dd39750a9d3a791524ad529c48dd51581ab4

                            SHA256

                            64a93066457747e08cee983bc307a10eba0880a1a35730b93960f89288e5f745

                            SHA512

                            0967aa5a5b9a5215bba49e5bbb2529bb5bb9dfee157c065e5ea56a92c7af4ed229da4e71cb7e09b12d2ff922635d36e00f7615f4b2fe4554833975932dd10fe0

                          • C:\Windows\{73B5BE5E-F416-4c88-A9CE-A090B028E089}.exe

                            Filesize

                            408KB

                            MD5

                            5d4c29ff3fd0660e371bfac18905096e

                            SHA1

                            2362bc8ffa7b862602bf396bb370c14ecf5be21c

                            SHA256

                            cad0117af02c286f1f0290c9499c2af0b920a6f341e3fea3cefde8ce4b224b1e

                            SHA512

                            7a18451eaa7cacd64e4a274c2ddf1b50dd7854c4648f381655cf07e6099cff9387d2da0e115796203ccd445d3c657d41c31ef7f7aec6d14a8f6474331b4a32ad

                          • C:\Windows\{7A328556-D303-4832-AD2E-9450EA4FE0C7}.exe

                            Filesize

                            408KB

                            MD5

                            92fa9c7f399c36d175d5cca3bf657c1b

                            SHA1

                            0178007f920ef970537d95fe29d26656617e8a17

                            SHA256

                            0e4150766fb1e19c9f71fb8895786603e54347a69d9f4fdfc387b2611083e4d5

                            SHA512

                            a123c74f199c6f783bfb2f123b341a9444062e6031cb194993c756193c7fcab6d8a87dc41284c564f3ebf18ee6b3d5b2e00a189dee9810baec00d3a70d9d99f9

                          • C:\Windows\{A8193D59-D611-4d66-A03E-AA020E1C3A6D}.exe

                            Filesize

                            408KB

                            MD5

                            0f2603e6f60474826947fa576de63a23

                            SHA1

                            1c34c70b298388a73397bee3fe0559d4cd6576ce

                            SHA256

                            f29cdefde12da1a012ac31f3cc4331eadf5baef4992db3f2e0d97510edbe9700

                            SHA512

                            6664b6ad49bb2ab34f62e435045f53b67289796bea0e15750bc6b1d0333c6e0498c497f7dc14dbf5b4d61bec5c9f08f357bdf64b50d82e13b5e499451f50c36e

                          • C:\Windows\{E58F8677-076F-4431-990D-AA50DD691F22}.exe

                            Filesize

                            54KB

                            MD5

                            eabb1cd7b766ca436ae70def0c91a12e

                            SHA1

                            124d695f98dab6506a1d85d51b77e05c6ef15c1e

                            SHA256

                            7730a297100022720892dde44abd2a1b16aa6b4352418a992ebf70cecd18ddff

                            SHA512

                            c42cd6762c37bf14d516ec81dd796c8fa15ba559e9822885287500b7fd2ebc433833b244a443b2714aec28003939604318ecc9518679a87e13f43b6c836616cd

                          • C:\Windows\{E58F8677-076F-4431-990D-AA50DD691F22}.exe

                            Filesize

                            408KB

                            MD5

                            c2964b042f8208632eb153dfad2d01fb

                            SHA1

                            e175510a6cd28a6123a568ca76ac2e0b0075807d

                            SHA256

                            bc4702fdbded15c773ce5ec6a79a51592ceab5bfea1d710fd316b345ec22c2a3

                            SHA512

                            fd686952b9a89f24b229798612b027073ac9ff6861b560ad40a2dc75978eb61e30a4ae52b64f7d3963cd2a552876accf48c6d83598d5d0259026d3f72dc4b095

                          • C:\Windows\{F69EF639-0A9D-4445-A963-E1B504CD1C46}.exe

                            Filesize

                            408KB

                            MD5

                            3c86a2afa6f146382afc7e4c16412f8f

                            SHA1

                            da007c0827543e9a387d6f9176b4870c3b264c98

                            SHA256

                            d38ace6182e145c8e19d903ec328d48f698d1c848babd4b0824a76fddeeb5d62

                            SHA512

                            5cac0c5b5948705cf48fed050a50a6777cee9008c646e3825a117c9e00699e47caac99f43e4d93f31f073fd70d6cadb308dd5b1465b5594c901c9611da90fb7d

                          • C:\Windows\{FF296E38-7E78-41bd-8754-EA71BACC4F13}.exe

                            Filesize

                            408KB

                            MD5

                            07bb11ad5f7473bf029e7e5e226aea3c

                            SHA1

                            3cc2e25e523ccc97f170d855b055c3b881a43bca

                            SHA256

                            1e5d265c2c3144cb7589d4427918a940019aca90e006741ce9a28798e8afab89

                            SHA512

                            898ba20627ce6c4f48bcc73ef4ba6b28aea3d830e7bd621e4a40e5bdc005ad5273cb5f5fdbaca1b499703157d875a45a8360c77fba901e13b376b19615dd5100