Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    12/03/2024, 10:30

General

  • Target

    2024-03-12_416cd2df03d64c68249c5d6ab1f320fb_goldeneye.exe

  • Size

    344KB

  • MD5

    416cd2df03d64c68249c5d6ab1f320fb

  • SHA1

    798bbd4005a7f6b4806fec139c2f5717d48a613b

  • SHA256

    71a59cf51dd9ea88f77acd47c6a3b9efb119a8aaf3e83d5ea105cc2dbe6b5870

  • SHA512

    8097118a410e640fe3b5f4d47e709877b8d8020a6cac7c1fbc7a34c67bbbb6c9b29c429146ff51a363b00df4e09a767e40c2e54c47c837a100ed8936a27e1e72

  • SSDEEP

    3072:mEGh0o8lEOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGL:mEGWlqOe2MUVg3v2IneKcAEcA

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-12_416cd2df03d64c68249c5d6ab1f320fb_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-12_416cd2df03d64c68249c5d6ab1f320fb_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:768
    • C:\Windows\{682B2F09-94B8-42a7-972B-486D3F0743B9}.exe
      C:\Windows\{682B2F09-94B8-42a7-972B-486D3F0743B9}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:868
      • C:\Windows\{80107138-41BE-46f8-8288-05BA0D6A2845}.exe
        C:\Windows\{80107138-41BE-46f8-8288-05BA0D6A2845}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3056
        • C:\Windows\{D9A909C7-520D-4b2b-A88F-BC45108DD56D}.exe
          C:\Windows\{D9A909C7-520D-4b2b-A88F-BC45108DD56D}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2584
          • C:\Windows\{9993CFA8-4214-4233-B6B7-85D68467ED56}.exe
            C:\Windows\{9993CFA8-4214-4233-B6B7-85D68467ED56}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2828
            • C:\Windows\{E9D0AF0B-534E-438a-AD91-30E1E47A5941}.exe
              C:\Windows\{E9D0AF0B-534E-438a-AD91-30E1E47A5941}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:528
              • C:\Windows\{40DE3A22-C326-482c-922A-D90B6ACFEBFB}.exe
                C:\Windows\{40DE3A22-C326-482c-922A-D90B6ACFEBFB}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2000
                • C:\Windows\{0195A872-2B5E-4b5c-81DA-03553301EDDD}.exe
                  C:\Windows\{0195A872-2B5E-4b5c-81DA-03553301EDDD}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:596
                  • C:\Windows\{A287C2F3-BA83-42ee-91CE-C8C434F7E9BE}.exe
                    C:\Windows\{A287C2F3-BA83-42ee-91CE-C8C434F7E9BE}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2748
                    • C:\Windows\{AC5F6CE1-87DE-466a-BF1F-9A0BC51FA270}.exe
                      C:\Windows\{AC5F6CE1-87DE-466a-BF1F-9A0BC51FA270}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2012
                      • C:\Windows\{97565752-F2BD-4ae4-8391-5F6CEC6C23F5}.exe
                        C:\Windows\{97565752-F2BD-4ae4-8391-5F6CEC6C23F5}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:544
                        • C:\Windows\{D7524234-F543-4e39-BE96-891C69D7B632}.exe
                          C:\Windows\{D7524234-F543-4e39-BE96-891C69D7B632}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:836
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{97565~1.EXE > nul
                          12⤵
                            PID:2100
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{AC5F6~1.EXE > nul
                          11⤵
                            PID:1896
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{A287C~1.EXE > nul
                          10⤵
                            PID:2312
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{0195A~1.EXE > nul
                          9⤵
                            PID:2740
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{40DE3~1.EXE > nul
                          8⤵
                            PID:440
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{E9D0A~1.EXE > nul
                          7⤵
                            PID:1096
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{9993C~1.EXE > nul
                          6⤵
                            PID:2760
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{D9A90~1.EXE > nul
                          5⤵
                            PID:2868
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{80107~1.EXE > nul
                          4⤵
                            PID:2416
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{682B2~1.EXE > nul
                          3⤵
                            PID:2708
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:2612

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\{0195A872-2B5E-4b5c-81DA-03553301EDDD}.exe

                        Filesize

                        344KB

                        MD5

                        474301e43985565cbd9de80ceeb0957c

                        SHA1

                        8d06f6b86a531236ceb5150d26a6f3b89892df13

                        SHA256

                        ddd9aed78465abaef66340d0bc287c23fa3077674181725294f38a6f7266d68e

                        SHA512

                        bb9f836a3a76f47622c14851b74bc04edd5a0416a4bd2ff576d5e39285364ac023bc4b1372174b6f61826cc994b3a7a7c8cc4a616db1d34d2fa1a8b340233c9c

                      • C:\Windows\{40DE3A22-C326-482c-922A-D90B6ACFEBFB}.exe

                        Filesize

                        344KB

                        MD5

                        c7d14550db0ef5f6b99ac31d29287b1d

                        SHA1

                        d7a49d0f820e5c77ece74d054a6bfb14e08fea5b

                        SHA256

                        b6ff9023910524d367df993754a6d50b8b35fa6e2c64fd393d66525c588a30e6

                        SHA512

                        53cd6b4b8ba92eb1987b6c52a2ce8fc363bc74146352e9ecb2b340af563abc881670cf53d12d46bf62892acaa6fcc220f9e9ed1efc3b6ac3f35f5321d64bf621

                      • C:\Windows\{682B2F09-94B8-42a7-972B-486D3F0743B9}.exe

                        Filesize

                        344KB

                        MD5

                        e4e4eb84b213a41c0ed9e4bccada4dbc

                        SHA1

                        49cf4c5d26be7c976dbe3fca47d6a40b7d14d616

                        SHA256

                        c003db05906b8aa769727847f0358579b170c82d968f48dc4090ea88dbd00e9d

                        SHA512

                        0b677e4f647423fd7430add38b0593ce635e98a1c2e1620687480f1f908b6b476e8e70679f767415ba260e3c30389c5c79ab2ea3a5b00ffe855992869accf5b7

                      • C:\Windows\{80107138-41BE-46f8-8288-05BA0D6A2845}.exe

                        Filesize

                        344KB

                        MD5

                        9fa2de9e0c0520b345901cb777c7fafe

                        SHA1

                        23fb7d69f970603f3c2f446aa4000b6e429353ec

                        SHA256

                        2c05249a1701caaa0b1e4728c6b825a454238c72129c430858646d8c997d5a6f

                        SHA512

                        0bb81bd24eb5263810c0d7e7ca8ec327b9d650d327e908ae9fa4c4b945a238e5d4fbcc6fa7a1f75878103243977c3bb14efe67164af3b88c29f7761feb3c9332

                      • C:\Windows\{97565752-F2BD-4ae4-8391-5F6CEC6C23F5}.exe

                        Filesize

                        344KB

                        MD5

                        46bfde5dd49d94b3161095766425fbf8

                        SHA1

                        6c039ad7140bc9b28a377d3385e63812481852a7

                        SHA256

                        dd37f1f584dd1686f4221e9f8fba4a88f0147e0473dc793544050138292fee99

                        SHA512

                        bb15ba234d00ac0977de0b61e65b16d07ff5208ce439e1643266b2bb6a3807019aa77b7536d0b072f4740e271cf41c3f12f84412433dd95316f00f05fc42b33e

                      • C:\Windows\{9993CFA8-4214-4233-B6B7-85D68467ED56}.exe

                        Filesize

                        344KB

                        MD5

                        b08749750855bd78ce2dcb62fdd538f9

                        SHA1

                        fcc48d4964cee414a01ff2911cdc8faa3bc71f8f

                        SHA256

                        2abadfa5da7dfcfa28091f39f9438373a55a5df0c99ab4c28174d218177340c0

                        SHA512

                        443932cab1928d011f79d58a4c063f8251e030da89480c5bd17111c3ad31fb60b4a0808244227cd1a1ac2fc625bba4a064b2b706a29e643f9097207882a7ad2e

                      • C:\Windows\{A287C2F3-BA83-42ee-91CE-C8C434F7E9BE}.exe

                        Filesize

                        344KB

                        MD5

                        15ac5f356e143c1f28af0c7365a63638

                        SHA1

                        ca94fab9d7f341b70667d364f665b56eddfb7122

                        SHA256

                        324b6c44c7e7f93912a063b49ab44ff67d5d9efb47b34fcfff4c9b83f1a9c248

                        SHA512

                        c0a0396f5b5501add162c83f5037ba4f95c387cf0c39f995d7a179f3c73f57e25626d9428b4755a2f3ed2f6a81235946a202f263093453b44fb037fa07382a8a

                      • C:\Windows\{AC5F6CE1-87DE-466a-BF1F-9A0BC51FA270}.exe

                        Filesize

                        344KB

                        MD5

                        92e377ff014aeb2742d9a0385c8c83b8

                        SHA1

                        bacbd48c1679b81d17f1d1c73ad545570e824af5

                        SHA256

                        52af85b5409d49f81ff0352e7dec8230fa6990f2e488634a9a015e63027efe2c

                        SHA512

                        2762bd26ccd5994fea17a4270bb002fb8cc4e744a6a7905c52ed825f2905c536b70edcc2d5ad1dda972918e4772e8293d4263e2ae44fd817519d763e5f456159

                      • C:\Windows\{D7524234-F543-4e39-BE96-891C69D7B632}.exe

                        Filesize

                        344KB

                        MD5

                        d219dcb1bf53503e488aee48e66f9789

                        SHA1

                        c1a6bd2e32c0d8bef6e0808c1df97b896ce6a614

                        SHA256

                        14b0120ba9d1c0613c50bba7a494b645e2ae3450a27b424d7e6086090ee07621

                        SHA512

                        ebfdfded9241b904f0d68a63d87da0fca144eda071604c0a4d7e699856ec0506fab40f2343e6c1a17d8077ac7907970e4e80ec1ff4f1c4e2a5065fedd86a8eed

                      • C:\Windows\{D9A909C7-520D-4b2b-A88F-BC45108DD56D}.exe

                        Filesize

                        344KB

                        MD5

                        669513b5e6c71c414342de2208921790

                        SHA1

                        ab4a208a4fcfe346eab41ad1033c91d170d020a8

                        SHA256

                        9619701c5c619f0f4857b58be844eaa0b816c902f0114861a342b444e94f7c65

                        SHA512

                        0e54f5f26a7ec9b343fc8d6ee90c870c154742f5217bf08ed6d1356980962929edbe09a4667a77dea13962867129e86f58356ecfe48d265376978adba867cc50

                      • C:\Windows\{E9D0AF0B-534E-438a-AD91-30E1E47A5941}.exe

                        Filesize

                        344KB

                        MD5

                        2ecbe24ad4bd9fc256d27d3a71695525

                        SHA1

                        466b9d828672afa7688241d30d135b1b0a3b7269

                        SHA256

                        4aa118d6b01c826860d8a8813fb0bd69ea3a5634bef00bf5e841984c2a1d7182

                        SHA512

                        0fd0568940d9e7e7e6a49bc6e4fe384586285ea413687e91dd826f878fd095276bd037080d510311932f79155eb9b639a75b1f570fcdf35300229d8703d6efd1