Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    09/03/2024, 14:44

General

  • Target

    2024-03-09_cc5a1c532eb5a0ccb25653297c2444f5_goldeneye.exe

  • Size

    168KB

  • MD5

    cc5a1c532eb5a0ccb25653297c2444f5

  • SHA1

    6e69fcd03a445b419c6128d51032e6cde424f1d5

  • SHA256

    e6e6d6da5d85e09e11f2a2b27e2224907db538b65a0c5cf4f291547bac676db8

  • SHA512

    97ab023b38cc5d7d84ce09b44da443f821a4aa91ea0e2b4af80979a2a606eacbf90872bdd71e30c8cfd2ea5e4e5b700a71e7172216b1a0a37700d238efcd1be0

  • SSDEEP

    1536:1EGh0ofli5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0ofliOPOe2MUVg3Ve+rX

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-09_cc5a1c532eb5a0ccb25653297c2444f5_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-09_cc5a1c532eb5a0ccb25653297c2444f5_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Windows\{F4F4E28C-9149-4717-BAC4-12B4A111142B}.exe
      C:\Windows\{F4F4E28C-9149-4717-BAC4-12B4A111142B}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2696
      • C:\Windows\{8C64A34B-F617-4cb8-8AE4-F18F21A3912C}.exe
        C:\Windows\{8C64A34B-F617-4cb8-8AE4-F18F21A3912C}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2648
        • C:\Windows\{FBEEED6B-3E13-4724-9EC0-FBDB6D41E58E}.exe
          C:\Windows\{FBEEED6B-3E13-4724-9EC0-FBDB6D41E58E}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2672
          • C:\Windows\{EA2D04BB-865B-4df8-975A-047CAE9EFF6B}.exe
            C:\Windows\{EA2D04BB-865B-4df8-975A-047CAE9EFF6B}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1404
            • C:\Windows\{7A337DD5-6881-44b2-999A-19B521AFFDE9}.exe
              C:\Windows\{7A337DD5-6881-44b2-999A-19B521AFFDE9}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2500
              • C:\Windows\{D4B803D7-2492-45fa-9C0D-8B8B103AA814}.exe
                C:\Windows\{D4B803D7-2492-45fa-9C0D-8B8B103AA814}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1660
                • C:\Windows\{80948AFA-71A8-4d09-8D1B-38A035CD8945}.exe
                  C:\Windows\{80948AFA-71A8-4d09-8D1B-38A035CD8945}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2760
                  • C:\Windows\{38FDCEEE-D9FC-4034-8CBA-F62638EAFFBA}.exe
                    C:\Windows\{38FDCEEE-D9FC-4034-8CBA-F62638EAFFBA}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1488
                    • C:\Windows\{E67F4E2A-6936-497a-9AA8-205DDA8CD7BF}.exe
                      C:\Windows\{E67F4E2A-6936-497a-9AA8-205DDA8CD7BF}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1664
                      • C:\Windows\{C27B0C6E-4C04-4c83-AB23-84D3A58F9DF4}.exe
                        C:\Windows\{C27B0C6E-4C04-4c83-AB23-84D3A58F9DF4}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2908
                        • C:\Windows\{EBFD61F7-C92C-40bd-9B53-82981D5C7551}.exe
                          C:\Windows\{EBFD61F7-C92C-40bd-9B53-82981D5C7551}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:2832
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{C27B0~1.EXE > nul
                          12⤵
                            PID:540
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{E67F4~1.EXE > nul
                          11⤵
                            PID:2748
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{38FDC~1.EXE > nul
                          10⤵
                            PID:1536
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{80948~1.EXE > nul
                          9⤵
                            PID:2880
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{D4B80~1.EXE > nul
                          8⤵
                            PID:588
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{7A337~1.EXE > nul
                          7⤵
                            PID:800
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{EA2D0~1.EXE > nul
                          6⤵
                            PID:796
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{FBEEE~1.EXE > nul
                          5⤵
                            PID:1956
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{8C64A~1.EXE > nul
                          4⤵
                            PID:2936
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{F4F4E~1.EXE > nul
                          3⤵
                            PID:2568
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:2792

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\{38FDCEEE-D9FC-4034-8CBA-F62638EAFFBA}.exe

                        Filesize

                        168KB

                        MD5

                        a807492d734a07434624fe963edc4bf7

                        SHA1

                        39cd1159577122ba2768873f924aabfc0ae52d16

                        SHA256

                        1acb6b1e00b6942bb7c2b16e92d4763d3b623e6a59849c23bc99c8e13d9da80d

                        SHA512

                        c50992d6f569847fc5a5be36d74e72060ac11611d2972ecb0ca4a49d8dadc3ca2c3754b8163290453750419b5f94e3e71e9fba0c961c0ba48716c1bf07251043

                      • C:\Windows\{7A337DD5-6881-44b2-999A-19B521AFFDE9}.exe

                        Filesize

                        168KB

                        MD5

                        d067bae8db925200894dae34693c8633

                        SHA1

                        735544b6e212a0bbd04ad712c9989bd0a3278ec7

                        SHA256

                        1f69bcc0aaa13151fc7a23a0bab1905ad1f54f44cb9c85e75e539e29c342c2b0

                        SHA512

                        0c4c0a7003eef4182e6a3dfa854dd7857764c1f8eaad2f7cf2a1cdac61adc7188e08d8aec1815e01a3d5021175baf7786f3e845f6f623e157aeb9eac896836bd

                      • C:\Windows\{80948AFA-71A8-4d09-8D1B-38A035CD8945}.exe

                        Filesize

                        168KB

                        MD5

                        1a2f882f822259a9cd345cde83226876

                        SHA1

                        8f3217e75204f64f14330eb3fb2e4ffbb276e65b

                        SHA256

                        098e74c4803d43069b48bb29e0967871632fd0ef518c4a4e6cead7d065b19711

                        SHA512

                        66b27ba2dda3bea7433d54f2af8f9fca6e65e7a30c77c41745c4732e382dd7d78c5f9f7a01632e8c75a8d26a59154cc8e4fe18f165aab72aa0d1ef48f87ed71f

                      • C:\Windows\{8C64A34B-F617-4cb8-8AE4-F18F21A3912C}.exe

                        Filesize

                        168KB

                        MD5

                        b8475e1fbf77e27720aff2a9375b2876

                        SHA1

                        6d394905fbbdb1ac08fc9395103965d167a8ba4a

                        SHA256

                        74572fd2e58c3500d3238f82964ce5805c0fae84b1113511f1e5d38b21a933f2

                        SHA512

                        d5d5f87e6dd9c7e557c2338c723c8f4e6e10f4e16b3aa0caf256276577d4983e9685252089b14a5bd0c6765f6f78a7d775b81a2ca871933ee0a2e66b497731d2

                      • C:\Windows\{C27B0C6E-4C04-4c83-AB23-84D3A58F9DF4}.exe

                        Filesize

                        168KB

                        MD5

                        3db41aad5226363d6a32e44f96b7e9ed

                        SHA1

                        8a56417962aaa573a65a15dc1cb6f1bd08be018d

                        SHA256

                        6672486f30e94cfdb66f379644b23b55ee65263cb613cd477f27c1066b416ae4

                        SHA512

                        5cde4abc471542507645401471d07a5fc107ff0fbb40008d710a0b498712d67b64db04a8408f21561e89175668e4a8ef30958e5fee8d772c90c634213998d80c

                      • C:\Windows\{D4B803D7-2492-45fa-9C0D-8B8B103AA814}.exe

                        Filesize

                        168KB

                        MD5

                        b2e8ca84ad2bfea098013be2f63334fb

                        SHA1

                        8033541083aff2cd8523c2486b0383b8153af43e

                        SHA256

                        3e13ed0b0aa2d5222baad72a947a0686b6104ae4174778bb30d4e0f5a7ceb22d

                        SHA512

                        429617bed19bbc6fb7c1a630e42ce84b1525232b4be32d175f37a9c0f1ae1532329b3096eeb2683317ccf1bbd00eedac3b43b1b6421668fa5452c1478fcce216

                      • C:\Windows\{E67F4E2A-6936-497a-9AA8-205DDA8CD7BF}.exe

                        Filesize

                        168KB

                        MD5

                        97343c53372b80794aed1380d404c4c1

                        SHA1

                        31c4a8612a638af313dccb64767778365e9a1cf3

                        SHA256

                        3fb76eff5d94480684843def69c7bd69ba342baeabf418c6ee35c97f46da0186

                        SHA512

                        a7876fd23c124ac0566788512208b976aa931cb2148fbe65da5963f450943c128471c8c6b060bae78cd992a6f6fec163c0b14c8e1ddbd007eb6c50f31e8cdae2

                      • C:\Windows\{EA2D04BB-865B-4df8-975A-047CAE9EFF6B}.exe

                        Filesize

                        168KB

                        MD5

                        c96770359c2776070f71ce2cb8c8813c

                        SHA1

                        c9fba611011ad89938eab4d08c2279ae6724641c

                        SHA256

                        28ed7a0189e677dc9b6282d603dd5859a99906e5492def7040883fef984baf21

                        SHA512

                        007ac3e21182cc4bdaa0b51638211335f8bd6211208ea1e082775179bb83e6211c080120a5da8810b977855be8625abdf6ad7990fb69e8ac02f444eef64382ed

                      • C:\Windows\{EBFD61F7-C92C-40bd-9B53-82981D5C7551}.exe

                        Filesize

                        168KB

                        MD5

                        82448763c80db506af4def2d88c5036b

                        SHA1

                        3150c1316af1dcc4131f82682ff849e17c5b50b6

                        SHA256

                        95ae9ca42569c6007fa63f0e1d110583585beb5191359fd44c448391c7ad3729

                        SHA512

                        6ad0df1baf83948163450eaf224c5753d09c719658cf692e26416f449eba2b30fc96fcebe296e1c9301fbf2f61381a26ea8b46074e64b4a2e301ab572950588d

                      • C:\Windows\{F4F4E28C-9149-4717-BAC4-12B4A111142B}.exe

                        Filesize

                        168KB

                        MD5

                        c5e92fe0139bf8dda831e839b75dd363

                        SHA1

                        b29a23fe4f69ad2225bb42f69ac361dd04071219

                        SHA256

                        63c9492f9b5a88f9ff1fe2a5124fef9bc8b8d1ca9664ff4ac9542c85e8931e51

                        SHA512

                        772e1a9f6134de87ab1aced50068531645b83608d90e3706630fba871fc97cd2e3e5aa534aa9a157ddbe06b4f26c2404bf95578036b70bb77e1cf776016fd9eb

                      • C:\Windows\{FBEEED6B-3E13-4724-9EC0-FBDB6D41E58E}.exe

                        Filesize

                        168KB

                        MD5

                        992e643fc145bc6221f6a3c07da7248c

                        SHA1

                        2d48be1fabf1aa7b6a0f28cfb2d7f2c1aebef387

                        SHA256

                        c3afbda9cc7e033efc3bbbcbfce1cdd466fc785cde3f20dd3f117a69f819e4e1

                        SHA512

                        2c2ceeb3e47ee4cddd09dad53938879b148d097fbf2ec80ac2a7b0f84e43b3496a02230a16fea25b47b6bad025591f4158604942cf17f603e956924aa6309adb