Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    06/03/2024, 18:44

General

  • Target

    2024-03-06_eff4b2dcbf3e8f535b61d89accd95b8f_goldeneye.exe

  • Size

    344KB

  • MD5

    eff4b2dcbf3e8f535b61d89accd95b8f

  • SHA1

    5d383a00d93a35b5fddd76cfd8ef9c7357c2a325

  • SHA256

    1df90f64895d9f0020d3ef992528063bc33c983c9cf656f6c35d6cec7e7b5f12

  • SHA512

    0e25379a9a955acab0e0df4449d5345675f19ed2012d98cef359a8c1f20db318336552328b9af970f97ee7efc6d5e7bfc6cd86d4c61cc66c2719e5d5ec0f0e92

  • SSDEEP

    3072:mEGh0oVlEOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGL:mEG/lqOe2MUVg3v2IneKcAEcA

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-06_eff4b2dcbf3e8f535b61d89accd95b8f_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-06_eff4b2dcbf3e8f535b61d89accd95b8f_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2332
    • C:\Windows\{DD7797DC-7858-41e1-92C7-BC1B777759CA}.exe
      C:\Windows\{DD7797DC-7858-41e1-92C7-BC1B777759CA}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3024
      • C:\Windows\{C3C66F9C-7C55-4ca0-B75B-709B658008FE}.exe
        C:\Windows\{C3C66F9C-7C55-4ca0-B75B-709B658008FE}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2612
        • C:\Windows\{412147EB-A64C-4f39-8849-9F9CF5992080}.exe
          C:\Windows\{412147EB-A64C-4f39-8849-9F9CF5992080}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2488
          • C:\Windows\{1AA70263-C6DB-4f4d-80AE-1D5263C453FA}.exe
            C:\Windows\{1AA70263-C6DB-4f4d-80AE-1D5263C453FA}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2016
            • C:\Windows\{7B855263-4FF8-4174-BC4D-F6475EFF088E}.exe
              C:\Windows\{7B855263-4FF8-4174-BC4D-F6475EFF088E}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2696
              • C:\Windows\{5D52562C-9608-4f3f-B82F-97389FB6CD32}.exe
                C:\Windows\{5D52562C-9608-4f3f-B82F-97389FB6CD32}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:272
                • C:\Windows\{A88C5145-94D8-42e8-88F6-49AD88F1986C}.exe
                  C:\Windows\{A88C5145-94D8-42e8-88F6-49AD88F1986C}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1392
                  • C:\Windows\{12A3B659-3D5E-4388-92E1-41E7A37355A9}.exe
                    C:\Windows\{12A3B659-3D5E-4388-92E1-41E7A37355A9}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:592
                    • C:\Windows\{73AA0BA0-B32D-4160-9390-418E0AD0AAD7}.exe
                      C:\Windows\{73AA0BA0-B32D-4160-9390-418E0AD0AAD7}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1228
                      • C:\Windows\{69261703-382D-4eab-A788-EC18E9A98C93}.exe
                        C:\Windows\{69261703-382D-4eab-A788-EC18E9A98C93}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3000
                        • C:\Windows\{973B0962-4C59-4188-A539-E73B416B6F30}.exe
                          C:\Windows\{973B0962-4C59-4188-A539-E73B416B6F30}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:2960
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{69261~1.EXE > nul
                          12⤵
                            PID:2032
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{73AA0~1.EXE > nul
                          11⤵
                            PID:2852
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{12A3B~1.EXE > nul
                          10⤵
                            PID:1060
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{A88C5~1.EXE > nul
                          9⤵
                            PID:2704
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{5D525~1.EXE > nul
                          8⤵
                            PID:312
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{7B855~1.EXE > nul
                          7⤵
                            PID:1376
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{1AA70~1.EXE > nul
                          6⤵
                            PID:704
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{41214~1.EXE > nul
                          5⤵
                            PID:2724
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{C3C66~1.EXE > nul
                          4⤵
                            PID:2904
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{DD779~1.EXE > nul
                          3⤵
                            PID:2596
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:2552

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\{12A3B659-3D5E-4388-92E1-41E7A37355A9}.exe

                        Filesize

                        344KB

                        MD5

                        4827956b85dbbb27919ad2fb2ec58382

                        SHA1

                        ff3756557c4ca5200629939e96caedb72fed9d20

                        SHA256

                        a4e9e9ec12bc188bf5c26fa4000c85edf614b97a0433fde66f81f0be4aa56d6e

                        SHA512

                        baa140640777f10df49c9676780ad8661693b2be1a661d889f071b2897a72a5f88a6b3da46b2a895604594f052fd677d1a7f952dc8de97fa96d10a75a7fb9482

                      • C:\Windows\{1AA70263-C6DB-4f4d-80AE-1D5263C453FA}.exe

                        Filesize

                        344KB

                        MD5

                        badd2c0b29856aca4401211c01ba11aa

                        SHA1

                        469ffe9b6806bd3985527f68209a04cd66ddb1fe

                        SHA256

                        968c58213169c1a4df78da8c95196ed727ec71f08248cf851d03365bf9ff4914

                        SHA512

                        f349ad6df305f894ca3837698846b47bde814c12d447c33b5c4eaaf956c2f76dd2fd1ccfc968a1a1cadbd1687beb37a3f0af0d942921a0d3081d5d164e304d18

                      • C:\Windows\{412147EB-A64C-4f39-8849-9F9CF5992080}.exe

                        Filesize

                        344KB

                        MD5

                        5e5763095e3ad91c12f7a8ac89bacf2e

                        SHA1

                        a60d0b10f45457c086e9e809b1b41489eda2b606

                        SHA256

                        09354d9f548026c6944e490f497aac82038bf295c8666105a5f40f14d0f88a4a

                        SHA512

                        fa9d5310181c10979ba6e5daf816f595620ff8a5ca34168eff7c0818c03725343329b4a8039369d18a9830b4db1c2a4b5b24ad2792deeb1847d8ec520f20529f

                      • C:\Windows\{5D52562C-9608-4f3f-B82F-97389FB6CD32}.exe

                        Filesize

                        344KB

                        MD5

                        a196597ffc2f496038164145fa65a764

                        SHA1

                        bb1fde65f451ea0daada2056a47cc7ec556d1fe1

                        SHA256

                        374e6cb1949551522ea7dabba2990957334227ee626e41055506d973221649bf

                        SHA512

                        aa3deb2cf04d5dfa5cfc468502e8d53e957a4f180bd618faf480534ce833660ca26a1f409d1d7c3146a61760216a543e68a2ce8ea5508a11458ba08df0d32bc7

                      • C:\Windows\{69261703-382D-4eab-A788-EC18E9A98C93}.exe

                        Filesize

                        344KB

                        MD5

                        7aff5dc62a471c59aebff3f660f2bf19

                        SHA1

                        910d77a282a5396e4dd559f9c5e6091c62dcfd53

                        SHA256

                        ac7f6325c3d9131ce41597f1998186a0ccabb02dedced6029166f024eca6a36a

                        SHA512

                        9c10ae2e745e2d0d4c857fc6c5b32a86d43c4e79007543bda939dc227badaff29b0e24f693528e448f2bb346ee5cce41278f39903b354f851e28df5e67c4b6f2

                      • C:\Windows\{73AA0BA0-B32D-4160-9390-418E0AD0AAD7}.exe

                        Filesize

                        344KB

                        MD5

                        d1cf20c2ac09ba937154be42af828709

                        SHA1

                        441f19d0ec49087b57a88230d6c42c0460d7e4b7

                        SHA256

                        91a9a2352f2fd80fa4b2b41c3f73b0c64ddf84f713470c281716e524dd89f99e

                        SHA512

                        4576681a33c5ce9a825998e8687cc7214b7f1a55b497ec0da554f165b55ae0305da10d03768d43ed52effb588624a87b87180938d22ecbb390b6910968253595

                      • C:\Windows\{7B855263-4FF8-4174-BC4D-F6475EFF088E}.exe

                        Filesize

                        344KB

                        MD5

                        3d62d8533c765c7b48fc281223c2adcf

                        SHA1

                        9dda31f312a3fa26e8a9e8a4f2aafbffa8500ca9

                        SHA256

                        170252f3a73a4ba5fedf17623f715a75784c6b374d7ffc5e85471c99a3c378b6

                        SHA512

                        565bfd21d56e1a8b4a664e334181f0d90896bffbc52c9c89dacd58979fbea07d6b1ed9a2a800d47ff8273d92bc7921627013399d85377fa26e7516950ebf1a6b

                      • C:\Windows\{973B0962-4C59-4188-A539-E73B416B6F30}.exe

                        Filesize

                        344KB

                        MD5

                        c3277e0a8ea38c6bd9d7f2b0110bdd54

                        SHA1

                        e649999462e2713dc17f4d997b63331807a209fa

                        SHA256

                        d5e7e7c5e0d7cc224f69eab5514365c1b53b714f962d163e659f1327943b5c65

                        SHA512

                        d07e5acaf13c6f00dc5510c31ef15ae51755a051431f853d5aa1cae1db892628f798d578b2afb7984cc56313df883e92c7387c146cd38009749190dfd3191ea7

                      • C:\Windows\{A88C5145-94D8-42e8-88F6-49AD88F1986C}.exe

                        Filesize

                        344KB

                        MD5

                        47d7b4737c2f11e4f8ce4866d55ef622

                        SHA1

                        dd5ecc0d72ea50805326817830a7ffde25c0f395

                        SHA256

                        ffd12ffcb08539e240dc8cfc86f857f6314224f8dd4963913730abc3a742012c

                        SHA512

                        6fd53e07bba0433c7cb3acc96a89ea1757a99cc339c50bfbd26a0a7507dbf60a1aed459e6d5e95a5418c6b77a408f770fca310eecca3c82699d7e95d379902d5

                      • C:\Windows\{C3C66F9C-7C55-4ca0-B75B-709B658008FE}.exe

                        Filesize

                        344KB

                        MD5

                        5fc41d95ecd4ed8570ce79aa3c490711

                        SHA1

                        59db324cddd67fc604ef458a3e81cbfa5e026b2a

                        SHA256

                        3732fcd2ecbd897288339d06f62c65bd1e3101ead02bcfcb436c134916344e44

                        SHA512

                        6716ab424df1887c7b56a60d0d1e44a79715b0db53fd65abb8a721b159b91d695621a03b6f2a56772857bd53344a98313f243031ac3425e732a47bebd866ee42

                      • C:\Windows\{DD7797DC-7858-41e1-92C7-BC1B777759CA}.exe

                        Filesize

                        344KB

                        MD5

                        6ce10f035398f635e832a447d3be49b3

                        SHA1

                        3ba03a9ab914708d32a9d4a60f663b9f0bef82c9

                        SHA256

                        b2fb8ec8792bc1269a5975f12dc467b5fafc2457e0b0fd6764c206da80995809

                        SHA512

                        48659cea6c3a8ca97b1995cb31228ad8273fd0fd712eb417971fdc143bd2068e431f1359e1e659710bf1ad0023c1082a183b91c820bb4be10e88a33b3409126c