Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/03/2024, 23:33

General

  • Target

    2024-03-12_7e883eb35385cfd4268b0027200e3217_goldeneye.exe

  • Size

    197KB

  • MD5

    7e883eb35385cfd4268b0027200e3217

  • SHA1

    7614c302c73fb2f735bbb988a1d3815d2ef4474b

  • SHA256

    3f43cb3dabe3354bac3d368aaa25e3601d9957c5b254109a6898b6f74dd23d87

  • SHA512

    3405403a97953430035ab0829db3e835452f6d71d12dae26b63bddb4df7554c61d9e844303ada656ec88f537619d6eaf3f95f593377a9fd0d03a893197920aa7

  • SSDEEP

    3072:jEGh0oAl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEGKlEeKcAEca

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 12 IoCs
  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-12_7e883eb35385cfd4268b0027200e3217_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-12_7e883eb35385cfd4268b0027200e3217_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3780
    • C:\Windows\{7636E774-5D91-4583-A38A-925EDD20C24E}.exe
      C:\Windows\{7636E774-5D91-4583-A38A-925EDD20C24E}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4364
      • C:\Windows\{573D99DA-0952-4542-9F6F-27F8A3086C8B}.exe
        C:\Windows\{573D99DA-0952-4542-9F6F-27F8A3086C8B}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1044
        • C:\Windows\{9CA06927-C183-496f-8898-767BFF6D76EA}.exe
          C:\Windows\{9CA06927-C183-496f-8898-767BFF6D76EA}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1640
          • C:\Windows\{A01D8936-F09F-4a7d-A99A-2233F481F378}.exe
            C:\Windows\{A01D8936-F09F-4a7d-A99A-2233F481F378}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4848
            • C:\Windows\{936A98A4-CAB6-4c70-AC03-CF1794DDBDCA}.exe
              C:\Windows\{936A98A4-CAB6-4c70-AC03-CF1794DDBDCA}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3676
              • C:\Windows\{4D1FCA84-5C88-4521-9333-783AFB22308D}.exe
                C:\Windows\{4D1FCA84-5C88-4521-9333-783AFB22308D}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:3956
                • C:\Windows\{6CEB3197-5152-4e73-8EB0-AEF61A3C58C6}.exe
                  C:\Windows\{6CEB3197-5152-4e73-8EB0-AEF61A3C58C6}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2468
                  • C:\Windows\{3DEF7D48-53A7-4bb9-ABB5-3A47DA017710}.exe
                    C:\Windows\{3DEF7D48-53A7-4bb9-ABB5-3A47DA017710}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2784
                    • C:\Windows\{CF7FF4F5-DAC8-4c21-B8C5-B1FE6FD32A93}.exe
                      C:\Windows\{CF7FF4F5-DAC8-4c21-B8C5-B1FE6FD32A93}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:3900
                      • C:\Windows\{FDF32034-7DAE-4fec-8E81-A6A8F76FD7A3}.exe
                        C:\Windows\{FDF32034-7DAE-4fec-8E81-A6A8F76FD7A3}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:3780
                        • C:\Windows\{5AC6911F-B4F0-4255-9BC2-B17F972C790B}.exe
                          C:\Windows\{5AC6911F-B4F0-4255-9BC2-B17F972C790B}.exe
                          12⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2384
                          • C:\Windows\{95EBFA00-D058-43d7-A2A1-1BB53C5621A2}.exe
                            C:\Windows\{95EBFA00-D058-43d7-A2A1-1BB53C5621A2}.exe
                            13⤵
                            • Executes dropped EXE
                            PID:3776
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{5AC69~1.EXE > nul
                            13⤵
                              PID:3988
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{FDF32~1.EXE > nul
                            12⤵
                              PID:1220
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{CF7FF~1.EXE > nul
                            11⤵
                              PID:640
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{3DEF7~1.EXE > nul
                            10⤵
                              PID:3060
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{6CEB3~1.EXE > nul
                            9⤵
                              PID:1664
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{4D1FC~1.EXE > nul
                            8⤵
                              PID:3632
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{936A9~1.EXE > nul
                            7⤵
                              PID:4788
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{A01D8~1.EXE > nul
                            6⤵
                              PID:4972
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{9CA06~1.EXE > nul
                            5⤵
                              PID:3524
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{573D9~1.EXE > nul
                            4⤵
                              PID:2580
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{7636E~1.EXE > nul
                            3⤵
                              PID:4400
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                            2⤵
                              PID:2368

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Windows\{3DEF7D48-53A7-4bb9-ABB5-3A47DA017710}.exe

                            Filesize

                            197KB

                            MD5

                            1dc11f36700f78b7660dbeb69e32bcb9

                            SHA1

                            a5133cc821c131ce5a76b7098fbc7a2feb1a2ba1

                            SHA256

                            92f071d3a39c0d926e7f2c32fa65d9cecb3d605184c798c71dbcb8fa1ba94d49

                            SHA512

                            6a9f94b73c0ea5e3879a34d5d3c24b7aaddbbbe34526c1c21f519fc6d057ec9a66639ca1b78f257cbf3f4b892550c94d804ae329bdd67b8d647b88d895321de9

                          • C:\Windows\{4D1FCA84-5C88-4521-9333-783AFB22308D}.exe

                            Filesize

                            197KB

                            MD5

                            c1008fc12fbf025aa8c27414d1907b89

                            SHA1

                            172bf1104b0856e3c79d16b047ab683b57d38faa

                            SHA256

                            3451b97973674550f177ed01328ff461c07cb7a2b5120984dd6678ecc3902dbe

                            SHA512

                            56ba38eec7ec94c3ca5e5f823d428aa1f2edf3a89e6c1af8827c46527c50018f6d37660863574e734a450d9eb572e6a876cd0fe86f3748fad3af17d48c402258

                          • C:\Windows\{573D99DA-0952-4542-9F6F-27F8A3086C8B}.exe

                            Filesize

                            197KB

                            MD5

                            fe95d8174197db3211ff4173accdada7

                            SHA1

                            8da66421e5b1480605819a0a231a90988c838f61

                            SHA256

                            9e30423f508daf9d640b76ab2d705541cf8f892d88f737ff33b3e78329a5f035

                            SHA512

                            7ba604e942d963ab9ba5d9c0a73e6556243024cd6b83b4bee1c166da3476278f6f27fc832d1513196ec0e2fecaec0d4d679aabfd27a18365230df62dcf39c8f0

                          • C:\Windows\{5AC6911F-B4F0-4255-9BC2-B17F972C790B}.exe

                            Filesize

                            197KB

                            MD5

                            059073719ca82bf3c43f21acf9611341

                            SHA1

                            b8ad4ef40eb426832b9fc6fb652b3a23fa06e780

                            SHA256

                            448cb649ff364d6a522682af1bb4d8ec11605cd96374d695cd765ae3eb16bc25

                            SHA512

                            d372294532213dc87cc22a8ff2eaba6a33cd9f2aa7f66e1fefa0d09904005839cf27e2e6b59e789597174389fcc5b3e691bc5cde275f4cae8ee0a9fe46854c1b

                          • C:\Windows\{6CEB3197-5152-4e73-8EB0-AEF61A3C58C6}.exe

                            Filesize

                            197KB

                            MD5

                            402f7577e95b91e88037b6dcf2e8ab85

                            SHA1

                            99afbcc73b3cf56261805f90ad0130caaf23e896

                            SHA256

                            13d1a734432a0f9e476766a2fd3e1355af343ff271f1141e025e15947f17d85f

                            SHA512

                            568aad28168fa21af147bf97bc36772bb7e199a0a6d3c0200cb309fb0f490b512c44b2b7d270ca21e7af870856d15f6d17217d5e477ddf505bf73b148c60cee9

                          • C:\Windows\{7636E774-5D91-4583-A38A-925EDD20C24E}.exe

                            Filesize

                            197KB

                            MD5

                            7e7f3e50f3e033b4274ffcd8a63f386e

                            SHA1

                            b7821421e6855764de229aa5a787ed470e2de959

                            SHA256

                            edf9b4929669a7476cce2ba20228a70d51aed8bc639eea3c593133c04de4f2ef

                            SHA512

                            2723611764d10d41e1abf85d9b3ab3ae897d353c293d9d917656a93cca26d72fb9822ebe99a716e097578b188579c798701124101227cadbfac3eadc78958002

                          • C:\Windows\{936A98A4-CAB6-4c70-AC03-CF1794DDBDCA}.exe

                            Filesize

                            197KB

                            MD5

                            c4b12cfd9e089c7b5512862d3163d57a

                            SHA1

                            31e5109f69786ebbd3aff9390fc1f0986cd059bf

                            SHA256

                            5b93527f2210bcc31ca6a2ec65b16a1f88c1abf60badf91b5ce9417e1d67431f

                            SHA512

                            6108d78ac6258908bc4090684972225e4099f572973350d64f0e2a01eb7d3449e4047c0ae105d058afd5917b9746702874a749ed3f3b6cb7ed19fb98b9e7aca1

                          • C:\Windows\{95EBFA00-D058-43d7-A2A1-1BB53C5621A2}.exe

                            Filesize

                            197KB

                            MD5

                            2ca85a4cd7f7a6364c5198ea5b800626

                            SHA1

                            cbef2c5d1d77c8593a9448a056fbf26a09255741

                            SHA256

                            217d8360f7d1069eaeaa86cad281952c9d57f51b0fe92e3e83032238d09c7dc5

                            SHA512

                            6874a3c122a9e2e4983a83b9ed4cea839aca9abe06ebfd2d75e630563925a681a6b18cd4c6735fa0410179176b98370680d9cf79b69b0d9aaa980b9c8bcc6f0f

                          • C:\Windows\{9CA06927-C183-496f-8898-767BFF6D76EA}.exe

                            Filesize

                            197KB

                            MD5

                            922863ccf08310ec30d08f76d44f714b

                            SHA1

                            e7abc775f1bf2c5178fe710a008c8107f853ec5c

                            SHA256

                            9054c88af08f458b67ce4a39adcbe3e7918f2ac2f5c3dde9cf6381c030431bbe

                            SHA512

                            73588bf63ad4ea2629d5bbb7278efa2b79f7fdee15e32a4ec2f24e2a70c247063e25f08f6da187735cb926d69533f5aaeea1125303b82adf2a5e7f19cb456448

                          • C:\Windows\{A01D8936-F09F-4a7d-A99A-2233F481F378}.exe

                            Filesize

                            197KB

                            MD5

                            fc90f350c220efa8a91e5dd35db48c14

                            SHA1

                            465b98347f30e34815d9554e6f7aca6ff5a868ac

                            SHA256

                            1f4e2f0d60c03d389f9a7db286165738d1198e0b7590c4a2299116b1c5f12277

                            SHA512

                            c342230396825dbbf43c8eacad97c344a7189b594209d1eb1d2f48b88b791a733bacf0684457c1b1d2e00e70648876f4a49dda76b42c3e04a39344630f1d5020

                          • C:\Windows\{CF7FF4F5-DAC8-4c21-B8C5-B1FE6FD32A93}.exe

                            Filesize

                            197KB

                            MD5

                            4ce08f838cc55c0f4d5d8e799e9596ed

                            SHA1

                            99c6891000bf4ec19a2d9277ceaa58651edb3785

                            SHA256

                            c59dd51c01f00937d6a64ee326f7e4fa6094845b4348a25bc22a4e8102f9c535

                            SHA512

                            9421971e4ef02dbbe91931e0973068b04e5f3eb17e23a39bded08e54cb925aec721cb90b91be5c6b85f2d7dab5c52985034ad7d9f31d38a55be1a1ef18829600

                          • C:\Windows\{FDF32034-7DAE-4fec-8E81-A6A8F76FD7A3}.exe

                            Filesize

                            197KB

                            MD5

                            5962ba61b6e61310942637362f7c18ee

                            SHA1

                            6c63e547a7dd53394c0d1c617055862dfc96396f

                            SHA256

                            85d3c7ab88912f3b234dc09cf009ab9b9d5467d84e133897cde005a477410edf

                            SHA512

                            4c7b9fead70c7bfa321ac6bd9776b977051c99bff23eeedfc56321a65fc4eead1295ac458eecb82f45f7ca987dece0d0f82590b28b7d9b1d7b2d95005ab4db30