Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/03/2024, 00:29

General

  • Target

    2024-03-12_5327744f8cf9fcb5e8fc5b92e06fd90e_goldeneye.exe

  • Size

    204KB

  • MD5

    5327744f8cf9fcb5e8fc5b92e06fd90e

  • SHA1

    d6b45ec7f11311cf7496b3dc808570bbb6e48d41

  • SHA256

    0a42597fe072cfec5cf1f68fe37dab8e1a1f224e18f2dd7f90d03dae05c62ba3

  • SHA512

    b3a79d85101beb70f353d3c3842eb77a5675c9f0354aa982ab0f222e07e42bf13a1f9d92958fef806347f291878e1695c9ede179a3e35bdb63a34176356786db

  • SSDEEP

    1536:1EGh0oNl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3Hgdo:1EGh0oNl1OPOe2MUVg3Ve+rXfMUy

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 12 IoCs
  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-12_5327744f8cf9fcb5e8fc5b92e06fd90e_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-12_5327744f8cf9fcb5e8fc5b92e06fd90e_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3176
    • C:\Windows\{444C4ED9-4F75-4d31-BA69-F4C4BCB41F13}.exe
      C:\Windows\{444C4ED9-4F75-4d31-BA69-F4C4BCB41F13}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2740
      • C:\Windows\{E6D5DB82-D71C-4767-BDEF-3C8E5A1C9F96}.exe
        C:\Windows\{E6D5DB82-D71C-4767-BDEF-3C8E5A1C9F96}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3448
        • C:\Windows\{08245D81-79E0-464e-B6BB-AE76421CF7D7}.exe
          C:\Windows\{08245D81-79E0-464e-B6BB-AE76421CF7D7}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1908
          • C:\Windows\{69D61F01-FD05-4404-9014-59C5EA664A8B}.exe
            C:\Windows\{69D61F01-FD05-4404-9014-59C5EA664A8B}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2432
            • C:\Windows\{1412299B-6601-4917-9025-F992BCE36325}.exe
              C:\Windows\{1412299B-6601-4917-9025-F992BCE36325}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2512
              • C:\Windows\{FE080021-C68B-495c-8AB1-A1CDD8BFF647}.exe
                C:\Windows\{FE080021-C68B-495c-8AB1-A1CDD8BFF647}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4148
                • C:\Windows\{D944F184-B1DE-4f93-9B23-E269034CC2CA}.exe
                  C:\Windows\{D944F184-B1DE-4f93-9B23-E269034CC2CA}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2688
                  • C:\Windows\{BC6F974A-4DAE-4cad-BDEC-7A0CCBB5C389}.exe
                    C:\Windows\{BC6F974A-4DAE-4cad-BDEC-7A0CCBB5C389}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:4976
                    • C:\Windows\{9556F436-BF21-4649-A1DB-BE825842497D}.exe
                      C:\Windows\{9556F436-BF21-4649-A1DB-BE825842497D}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:4996
                      • C:\Windows\{AACB6D4D-FB75-4c11-9977-B048797041EE}.exe
                        C:\Windows\{AACB6D4D-FB75-4c11-9977-B048797041EE}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:4132
                        • C:\Windows\{BC7D93AE-933B-490a-98F3-8B3948B6E794}.exe
                          C:\Windows\{BC7D93AE-933B-490a-98F3-8B3948B6E794}.exe
                          12⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4408
                          • C:\Windows\{840B63DA-6DC9-4995-9092-1488F51A7D28}.exe
                            C:\Windows\{840B63DA-6DC9-4995-9092-1488F51A7D28}.exe
                            13⤵
                            • Executes dropped EXE
                            PID:2560
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{BC7D9~1.EXE > nul
                            13⤵
                              PID:4392
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{AACB6~1.EXE > nul
                            12⤵
                              PID:4176
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{9556F~1.EXE > nul
                            11⤵
                              PID:4452
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{BC6F9~1.EXE > nul
                            10⤵
                              PID:4088
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{D944F~1.EXE > nul
                            9⤵
                              PID:3096
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{FE080~1.EXE > nul
                            8⤵
                              PID:2216
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{14122~1.EXE > nul
                            7⤵
                              PID:640
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{69D61~1.EXE > nul
                            6⤵
                              PID:3440
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{08245~1.EXE > nul
                            5⤵
                              PID:5000
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{E6D5D~1.EXE > nul
                            4⤵
                              PID:2028
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{444C4~1.EXE > nul
                            3⤵
                              PID:2352
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                            2⤵
                              PID:3008

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Windows\{08245D81-79E0-464e-B6BB-AE76421CF7D7}.exe

                            Filesize

                            204KB

                            MD5

                            1a9a09b8052519ac468bc0476f02d462

                            SHA1

                            8c27bb586fb4fef20c9070774d2ebc9df09aa7db

                            SHA256

                            b7b67f29456ea80861ac59a88bf7f4a73bc67387351a635dedc89da880fc3c66

                            SHA512

                            714c458543d570165f94cab106b1877340c014fa0358e8910a316e769c3b8506b9b29dcc8689b569467154b60bc2399bb52ad645ea4484cfb639e406010d4d98

                          • C:\Windows\{1412299B-6601-4917-9025-F992BCE36325}.exe

                            Filesize

                            204KB

                            MD5

                            a89b7883649c2c619aab29a2264ea8c4

                            SHA1

                            625605732bafc43cab16f2cce4c9bb11778fe4b7

                            SHA256

                            95a2c273fd84e2822135a207e3b80829b683be4a01c7998654468a60ef43d2e2

                            SHA512

                            7e7ddc681c934da87bf1abdb8b5b0e0ce63602fd3937e1404ad70baf51b8b7f84a791343c88f7be5354618f9fc9b4e80a1e9e54ad4cd17f4626393d86e1c6095

                          • C:\Windows\{444C4ED9-4F75-4d31-BA69-F4C4BCB41F13}.exe

                            Filesize

                            204KB

                            MD5

                            c19977da54074bf6453ce584bb9ab1eb

                            SHA1

                            004ec0d19b123ad5face97a0767f279c22c09288

                            SHA256

                            df554181dc70cd7891655f1dc9c1af509465eb093b2080f92bfcc3c3577e1068

                            SHA512

                            b887c0a03e4a59f58bafb91d1a0af4814f6f54b8f7b5630c2a972156cd5866a1f2d59db3177e218cf76825d6590860d59cf742c062a50e9d27841569523745b2

                          • C:\Windows\{69D61F01-FD05-4404-9014-59C5EA664A8B}.exe

                            Filesize

                            204KB

                            MD5

                            c33de4725ad32c4fd4aff1732368cd7e

                            SHA1

                            2649745471c8de08e62cd3af2e745f158d290aad

                            SHA256

                            3c4bbc235e7991c1f05e4f2c876c825a4ae24d5182a16ae60ac4bf0302fe638a

                            SHA512

                            cea0f41ccfbba5c2f5b5bf0b377d0da4f1773530f6a9feac3a2fc371b3f46df60f91bd3e181d1354641e39df159518deeb50bc6daaf2d5d5616ac7c7eebbb148

                          • C:\Windows\{840B63DA-6DC9-4995-9092-1488F51A7D28}.exe

                            Filesize

                            204KB

                            MD5

                            271fa1fc4e810497262e04a679bb73d7

                            SHA1

                            735851614dda8320e0eebcc6365a51511f569e24

                            SHA256

                            b603a905b2e7b20b388b0011df57a8bc3822c08310a12c276e17549ba541f9c2

                            SHA512

                            5246c80e9d03af6f95e71c567b671ac3dd9b8a891c0c28412108d68487e35eaddb7b2b5db5589f4eeee5e3d8f824fa22430f6dc58aa8efbde910fbdc88b3d948

                          • C:\Windows\{9556F436-BF21-4649-A1DB-BE825842497D}.exe

                            Filesize

                            204KB

                            MD5

                            f4961e8dcb4db0b504745b7bbaf27735

                            SHA1

                            da9bf98cdaa844e3d065bf132854bdbc0f560342

                            SHA256

                            5bc868cc505c87a0b821343ccb9538cd9c4deaecea9b455e550479e0f241f328

                            SHA512

                            d8831cab8b9c5c596d348932d5ab3f1f54ae3c474cba37b907c30068df4402e410e54eb34cd55a3fc0b83421bf8da204949dc44e5caf01719513079566fc3ead

                          • C:\Windows\{AACB6D4D-FB75-4c11-9977-B048797041EE}.exe

                            Filesize

                            204KB

                            MD5

                            c093a7c5d999de70be2cd220e3b744cd

                            SHA1

                            80808f1ef00bd0c9b4edb19c375aa914cc6b4341

                            SHA256

                            7f8b90175beb9b1044a6f286ba7413c33ca2ceb9453ba970409ae2d0dcbf9050

                            SHA512

                            cb66043d6670aeee6d7e63e0554f882cbb58071608896b4eba36872f80427bbc5dc5f95c17b0d4eb59382e1f04f71e09ad0eff0d50d43b239e8a90a15fd8b4e5

                          • C:\Windows\{BC6F974A-4DAE-4cad-BDEC-7A0CCBB5C389}.exe

                            Filesize

                            204KB

                            MD5

                            61af1e2e1180245525d5e2d52f8962e3

                            SHA1

                            cbb1da6901ba57c9ace958fbc5dc7ce139c4d7bb

                            SHA256

                            8cab40c91cc655e07f546be53a9f3092349b860b671e1e0bc997e92b4a70852c

                            SHA512

                            3971c3e903837bde8e9ecd5ff5ebbf38ecdc8091c88caad077ba5fb6cb96ba552538446ae1c7687e0c88aaef616b0910caf30d09ab2b7cd81cb09bac5f656b81

                          • C:\Windows\{BC7D93AE-933B-490a-98F3-8B3948B6E794}.exe

                            Filesize

                            204KB

                            MD5

                            d351baf38a7e53646bf0957a33b4287a

                            SHA1

                            98b7cf4f208a0505ff8cfe7c391d55f6ab842fe4

                            SHA256

                            d803d8aeb59a9d68ee7c90573b95c27de33b18e5ecf0ed6d06f8c1b2ef279baa

                            SHA512

                            3d6bbf867f81cac713cc592d8173ef645d0262bf05da5073074a4bba2ce2a03b8553f14cab1ef41bb5c03b30c2d0ca438af1da9f4109d55cfba87548d623954c

                          • C:\Windows\{D944F184-B1DE-4f93-9B23-E269034CC2CA}.exe

                            Filesize

                            204KB

                            MD5

                            35fcaa0e3bc3248af9df8e35e8cf79be

                            SHA1

                            f5d335b34b399ae164cf1773742f1a726889da9d

                            SHA256

                            b722c2e66cfe790770f361dec804e4091fff6f50db5b65c9bc055dcc4dda757a

                            SHA512

                            08319f957cee4075c13d1e5b3d9a384d09f0bc133a5deb86264ddb1a6b7e991b4fccd41a1e26bceeb095ecc921ed7007a3cb0806fd721fd8ceaffb56b6f20702

                          • C:\Windows\{E6D5DB82-D71C-4767-BDEF-3C8E5A1C9F96}.exe

                            Filesize

                            204KB

                            MD5

                            ca88ca69821c410aa42e577336fd1a84

                            SHA1

                            745f410f2f4f0c17448b1a610425d8e525e45131

                            SHA256

                            785160c7be2845c371509276d5e0eacd4faa6701cec7f3a0f004469b15aff490

                            SHA512

                            9add09d8b6c63614ec6d01728c48b65f14bf8e51a8a11cb0e1069ebacc752964b34db1e4247a266396097e75a0658a1a6168b0cf94165d3be6278a94afc3d8fb

                          • C:\Windows\{FE080021-C68B-495c-8AB1-A1CDD8BFF647}.exe

                            Filesize

                            204KB

                            MD5

                            f6a52deac398db1be0b88746889c38aa

                            SHA1

                            23734d4a2ebe354afb375f27f43a37addfbcc20c

                            SHA256

                            e1f6020265e2af3cb2bc9e3b41c5a4589964a335de506f2136c9207bf7d17af0

                            SHA512

                            ef8e432263c7cf546c554ffe36b6cc720d1fd8748362fbd0a05ef6b6db65dcf5730c214587a86bd157c2648a4b8a4244909f2a9e716b33fef7fd74ae3568ac3a