Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    12/03/2024, 07:25

General

  • Target

    2024-03-12_2faa224e3327af62f250a59a467a91cb_goldeneye.exe

  • Size

    197KB

  • MD5

    2faa224e3327af62f250a59a467a91cb

  • SHA1

    d2458ccbe522ccb358310c13485b6c22320017da

  • SHA256

    bb6845faa17cb36a5403418e9d33ff8d9a9f9aaeef15633a58181b5aa9d44ca0

  • SHA512

    abcfc2945f230ac342e42397c1808eea8de931932a421d5e4326449068157efd59ca72186afe769d7d249af14643e6635bced65038e174e1cfd2d73915fdb884

  • SSDEEP

    3072:jEGh0oil+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEGQlEeKcAEca

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-12_2faa224e3327af62f250a59a467a91cb_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-12_2faa224e3327af62f250a59a467a91cb_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Windows\{621B8106-E480-4bf9-B2EA-2AB878F88170}.exe
      C:\Windows\{621B8106-E480-4bf9-B2EA-2AB878F88170}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2984
      • C:\Windows\{4DA679C0-D1E0-49a2-89CE-EEA4CA312E74}.exe
        C:\Windows\{4DA679C0-D1E0-49a2-89CE-EEA4CA312E74}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1952
        • C:\Windows\{79168ADC-208A-4f40-9D84-A63217238C00}.exe
          C:\Windows\{79168ADC-208A-4f40-9D84-A63217238C00}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2724
          • C:\Windows\{5272C736-6665-419a-A971-D41712605834}.exe
            C:\Windows\{5272C736-6665-419a-A971-D41712605834}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1844
            • C:\Windows\{3DF53357-ADC8-4854-87B9-683E843B4DEF}.exe
              C:\Windows\{3DF53357-ADC8-4854-87B9-683E843B4DEF}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2676
              • C:\Windows\{6711ACCE-1146-4f0b-A67B-E27932EA4A94}.exe
                C:\Windows\{6711ACCE-1146-4f0b-A67B-E27932EA4A94}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2000
                • C:\Windows\{9A63CD24-4290-4fe6-A582-4A4756CD14A7}.exe
                  C:\Windows\{9A63CD24-4290-4fe6-A582-4A4756CD14A7}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2316
                  • C:\Windows\{06A6A20E-A1B2-44fb-B657-39166FEC272D}.exe
                    C:\Windows\{06A6A20E-A1B2-44fb-B657-39166FEC272D}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1244
                    • C:\Windows\{0871750D-267F-4f59-81F9-7DD953F85466}.exe
                      C:\Windows\{0871750D-267F-4f59-81F9-7DD953F85466}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1976
                      • C:\Windows\{F401679D-A41B-4b97-9AAB-38AEC88C1B6F}.exe
                        C:\Windows\{F401679D-A41B-4b97-9AAB-38AEC88C1B6F}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2228
                        • C:\Windows\{79BEF252-9709-4c6d-99E7-34E0B132613D}.exe
                          C:\Windows\{79BEF252-9709-4c6d-99E7-34E0B132613D}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:960
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{F4016~1.EXE > nul
                          12⤵
                            PID:1428
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{08717~1.EXE > nul
                          11⤵
                            PID:768
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{06A6A~1.EXE > nul
                          10⤵
                            PID:1260
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{9A63C~1.EXE > nul
                          9⤵
                            PID:756
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{6711A~1.EXE > nul
                          8⤵
                            PID:2844
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{3DF53~1.EXE > nul
                          7⤵
                            PID:2012
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{5272C~1.EXE > nul
                          6⤵
                            PID:2304
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{79168~1.EXE > nul
                          5⤵
                            PID:1344
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{4DA67~1.EXE > nul
                          4⤵
                            PID:2480
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{621B8~1.EXE > nul
                          3⤵
                            PID:1728
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:2564

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\{06A6A20E-A1B2-44fb-B657-39166FEC272D}.exe

                        Filesize

                        197KB

                        MD5

                        dd7473118e0899fed5b5e3919b99444a

                        SHA1

                        d8c1ec87b98eeda0dce3d49ec8fe34d2608278eb

                        SHA256

                        86a7a50b9e14c4b3b3399f25f7099404fb788ff86ec07f7794d2f110943e80dc

                        SHA512

                        9f651aa958fe3540990b835a4fbe7f5d298cb0cea41651a11565b47d1da8c4a48ee4631aef2968a81799b5d5659eef92f66b95dd78db7e55a64ba798f97c6455

                      • C:\Windows\{0871750D-267F-4f59-81F9-7DD953F85466}.exe

                        Filesize

                        197KB

                        MD5

                        6c76e940480697e9eeda6e720f0cf7a2

                        SHA1

                        4d9ed1ef539aed5de615077c28d01d3b45459013

                        SHA256

                        7ca9101f9b0b3118375a15fd4bea24c1d0fdb92bac8a1c5d05178dcffa4a7bf6

                        SHA512

                        0da6407641d4e26dbe5e224d06a5aeee4cc032132e758616df220eb40e963f08170df70f94b3ba9eb96d4995760a8376215d44ee946a00907479e5c46c57e24c

                      • C:\Windows\{3DF53357-ADC8-4854-87B9-683E843B4DEF}.exe

                        Filesize

                        197KB

                        MD5

                        56caebb0ffc2d8c4b484c5ffd48bf883

                        SHA1

                        f41126eeda15adca4ca05a65d627840cfc7640a2

                        SHA256

                        0020b698d54c1a7319adf5ccc2ab3974082b0c93631dbc23c8b72b284d508ef4

                        SHA512

                        c0ecf102a6f09e943fc9a74ab180b45555b7c12c3d0b55a370c8b711d2a7b10090573667ace863e6923d7bfad2eb4030050bd65edfa00991f49ea06538aa4cce

                      • C:\Windows\{4DA679C0-D1E0-49a2-89CE-EEA4CA312E74}.exe

                        Filesize

                        197KB

                        MD5

                        2b6f154a6c85a88bcac2d235ccc5f66f

                        SHA1

                        c7f3b5beb811f17e5e3f132b85b649ae01506fcd

                        SHA256

                        5bb4b8766a59363610f1bd774bd06566a83f6976cc5876e4435bf10a25ce3d9c

                        SHA512

                        0935c2801b2ec4b04569a8f282ec0e2a6892d4d1dfd23923f12c59ebd6c0f09fcf0d87720fcd3e5ce555f3826e75a27482efa636893c3a7d977966d70e207280

                      • C:\Windows\{5272C736-6665-419a-A971-D41712605834}.exe

                        Filesize

                        197KB

                        MD5

                        182168f20d7660dc06f69e652be244f1

                        SHA1

                        2a14e1b40a10f5b008373c054c8c5ea76c995e33

                        SHA256

                        1b3de18a16462c5afa76ec6221159399d4947a43ba92b6847c357bda2d93340e

                        SHA512

                        c47e9e2dc387ee71a66c92ae6e42fbdf7ca59783da1efa3d417c15ff864e12f40d2e3ac4997d8691b22ac5ed3474b4f37af86068dd221586fab5ee72eece165b

                      • C:\Windows\{621B8106-E480-4bf9-B2EA-2AB878F88170}.exe

                        Filesize

                        197KB

                        MD5

                        0d4a3f9a6a21de76916a965f2e6a02e3

                        SHA1

                        8323b29db5c85a82f99a4f219217b22fb13e94ae

                        SHA256

                        1a1496b360b3fcc547e5cfa23b2c04f42704be57f680184d1342cdd41d815778

                        SHA512

                        5ed051f923078882789d7a937780a6d2dcc33533cbb192741d4b300773ad52cbe1b4e316bfbf72094c6fbadf4a7cfcc62448d649ced681fa1b6284a4e95861eb

                      • C:\Windows\{6711ACCE-1146-4f0b-A67B-E27932EA4A94}.exe

                        Filesize

                        197KB

                        MD5

                        4f7bfb9e0ac833fbf5d14eab6309c631

                        SHA1

                        fade97fe88c1942be57c72f4f66c88296cdadd29

                        SHA256

                        547f28629aca7da3f9857452a662283ade3b77e5a051878e8411b76c61a1900f

                        SHA512

                        103a9e29a5788a3ffb8ab371415ffd0dff094f4136304d4228d252766681fa411f193ef2105b13391ccc4ecd8b9f3c2698f734952d37eb17879f11e790d8d9d6

                      • C:\Windows\{79168ADC-208A-4f40-9D84-A63217238C00}.exe

                        Filesize

                        197KB

                        MD5

                        5d5caef803d53940e4203a21b5649dd5

                        SHA1

                        da295da85aeec4974aa9f8106b0081364d45a0a1

                        SHA256

                        9510a42eccef11a00ff9ca705de48015c7b2ea3e9319ffbc32b2542c42de4237

                        SHA512

                        77042fba9162bc8d2612046a13152ad3d226962a97ce7e2889fa0538f07b99a2908faef5e545e2bb2cbc5a6f70819b5ab3f1dd78351568b10f78922a1e835412

                      • C:\Windows\{79BEF252-9709-4c6d-99E7-34E0B132613D}.exe

                        Filesize

                        197KB

                        MD5

                        d0aa0de7ad3b47312a2113cd9ff7d895

                        SHA1

                        f033cb14ab61f88f03aa5f239ed8ed54a855be21

                        SHA256

                        550a8e3fbd3e946f51391e5129be8145e321f8cc5763030c7c83a3e757059902

                        SHA512

                        d71538f291cbacb28e2a516f3cb6289af8e119726fbfab9c77ee8a1f5d4ba857772de34596b1f55e118659d775443cd9bfd49722b49d26f164e0185a598f4825

                      • C:\Windows\{9A63CD24-4290-4fe6-A582-4A4756CD14A7}.exe

                        Filesize

                        197KB

                        MD5

                        756cff69bc4dfb90400aeec720ef6efd

                        SHA1

                        62e6cf970d63ab902c8052cafc1ab0d980c3c063

                        SHA256

                        49a7dc750a72bb835bb1bb90227733cc858c6e845eaf34784693193f7ad2e97a

                        SHA512

                        6d4d6f51cc8d58415cdfb77a48ef8cf4db7ffc786ff2ed6b75fdb9db91c2f08d4f9f654cf44f72dc47daa3e39ef0dd79fced8fa158a51529e147cac846fd1f08

                      • C:\Windows\{F401679D-A41B-4b97-9AAB-38AEC88C1B6F}.exe

                        Filesize

                        197KB

                        MD5

                        b0c388d6926965acd18bd257801e51dc

                        SHA1

                        35b3caebe9f62bbf828d2ca76ad9994efa76853f

                        SHA256

                        df7babc3009460a83bba2e650ca5a6e1edd5b02f80c36ae363af974b6f963783

                        SHA512

                        d8ca3d27428c927ae692e43f9c9d220d1da2b13bd29b67d8a714791746dda01ceacb6cd4e110baa0a155729af33add5e301d9815a7c881e3cc9cf5844b3a9a57