Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29/03/2024, 04:25 UTC

General

  • Target

    2024-03-29_2a4e6d79bb3ac0a3ce603d3e02940d43_goldeneye.exe

  • Size

    192KB

  • MD5

    2a4e6d79bb3ac0a3ce603d3e02940d43

  • SHA1

    672a9c8ebf45d4dc6f013d5131e0c755536ebb2e

  • SHA256

    6de584a57549165150ea67d7df78408a8329aeb510600525bcc6929d4cf12d15

  • SHA512

    00f20ff6f2598b9dd227e3e13789910ab6330ec5e08ec92168f68248b882e956bbdcd42cf4728c644a4b316b74828955e11d4a012acb4b0affc3c4fe1f8dcb2d

  • SSDEEP

    1536:1EGh0oIl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3H6:1EGh0oIl1OPOe2MUVg3Ve+rXfMUa

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-29_2a4e6d79bb3ac0a3ce603d3e02940d43_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-29_2a4e6d79bb3ac0a3ce603d3e02940d43_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2656
    • C:\Windows\{F0D4879B-C8FD-4f31-BF0C-05BF60F04004}.exe
      C:\Windows\{F0D4879B-C8FD-4f31-BF0C-05BF60F04004}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1684
      • C:\Windows\{A10A422C-E15C-4341-9606-80B37A80D695}.exe
        C:\Windows\{A10A422C-E15C-4341-9606-80B37A80D695}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2544
        • C:\Windows\{1E421CC6-02F1-487d-A80A-5094056319AA}.exe
          C:\Windows\{1E421CC6-02F1-487d-A80A-5094056319AA}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2836
          • C:\Windows\{0DEF5C9D-F268-4253-A21B-1D73FA556950}.exe
            C:\Windows\{0DEF5C9D-F268-4253-A21B-1D73FA556950}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:788
            • C:\Windows\{83D4A543-2C2D-4bf9-ACDF-3C7A614BF86D}.exe
              C:\Windows\{83D4A543-2C2D-4bf9-ACDF-3C7A614BF86D}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:572
              • C:\Windows\{3C7A52A4-04E4-4318-9434-899DB864BD2E}.exe
                C:\Windows\{3C7A52A4-04E4-4318-9434-899DB864BD2E}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2732
                • C:\Windows\{25409364-D57D-4b19-9488-CE8930F3048D}.exe
                  C:\Windows\{25409364-D57D-4b19-9488-CE8930F3048D}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2348
                  • C:\Windows\{DEAF4FF5-5222-4912-9A8F-F30B647C8431}.exe
                    C:\Windows\{DEAF4FF5-5222-4912-9A8F-F30B647C8431}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1844
                    • C:\Windows\{29AD14CF-1A21-4bff-BC27-09243C68166B}.exe
                      C:\Windows\{29AD14CF-1A21-4bff-BC27-09243C68166B}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1764
                      • C:\Windows\{92253DA3-D4C1-4d91-AF63-EA1F38F8DE85}.exe
                        C:\Windows\{92253DA3-D4C1-4d91-AF63-EA1F38F8DE85}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2088
                        • C:\Windows\{1610B2BA-71A5-4533-9B4B-16C13E1C5482}.exe
                          C:\Windows\{1610B2BA-71A5-4533-9B4B-16C13E1C5482}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:2952
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{92253~1.EXE > nul
                          12⤵
                            PID:2936
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{29AD1~1.EXE > nul
                          11⤵
                            PID:2928
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{DEAF4~1.EXE > nul
                          10⤵
                            PID:1104
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{25409~1.EXE > nul
                          9⤵
                            PID:2044
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{3C7A5~1.EXE > nul
                          8⤵
                            PID:952
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{83D4A~1.EXE > nul
                          7⤵
                            PID:2948
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{0DEF5~1.EXE > nul
                          6⤵
                            PID:2080
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{1E421~1.EXE > nul
                          5⤵
                            PID:1956
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{A10A4~1.EXE > nul
                          4⤵
                            PID:3032
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{F0D48~1.EXE > nul
                          3⤵
                            PID:2760
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:2668

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\{0DEF5C9D-F268-4253-A21B-1D73FA556950}.exe

                        Filesize

                        192KB

                        MD5

                        f1d6e51c5af0016c101997e73ce7c09f

                        SHA1

                        cb593976f2add58673c730ff27c61be7d876640b

                        SHA256

                        2530da9bd114c1ef548fd402c44ef769a77d562f6c748a55fae2271c00e6fe88

                        SHA512

                        abda0b3d15373638b7e4aba639609cd3788a8407f17f49333cb655474843faca13eb50afd08c949eea1ffc690c83bd7a3870d7802ccba6c8622eeb692bd6445f

                      • C:\Windows\{1610B2BA-71A5-4533-9B4B-16C13E1C5482}.exe

                        Filesize

                        192KB

                        MD5

                        bd03e28029934a092c4c91402ae9b5de

                        SHA1

                        4f380e02d8f749f1eec040b6d428acda8500b735

                        SHA256

                        9c48a33617584a441b3749c378d2a841f4984ac787e44d22920d641884fd13c5

                        SHA512

                        516e5285a561be2e22de806090cd0cc27431b4d495bf1207b88f0a413c084fa9cdafcd99614c8c60cbf7f9205e80544f706272fcd6a4afb0c751b52bbee3684c

                      • C:\Windows\{1E421CC6-02F1-487d-A80A-5094056319AA}.exe

                        Filesize

                        192KB

                        MD5

                        1129a95a142ef17523e5f2b32d4cb0d4

                        SHA1

                        d351be974f2c00f155bba7b4ddb43004c5a247e7

                        SHA256

                        1b751d216d90708ee296f15a2a58b9484ccaf44a95845807fcf3044f31f83e7d

                        SHA512

                        4987fc9e2f75399ec09224b0cea8e1ae8179eb13777184ac4272e3458fadedf2cd442d448e57f51044b3e74c9e1a3f82814e1ed9fe68d56a3d5f477a1ddda101

                      • C:\Windows\{25409364-D57D-4b19-9488-CE8930F3048D}.exe

                        Filesize

                        192KB

                        MD5

                        9b50a2d1a09aaf049878b427ed6624ba

                        SHA1

                        0cc4fd0595e352e80fb5591934d39d1308f27307

                        SHA256

                        b852395fc9cdaf9ee8df20fc115fff638725abf305f8214ae9c7de551bae33ca

                        SHA512

                        f9740c899f342be7dea115fa6761069cd100c57544faf4f7d2725d7a936890266428bf90901186e7c974a99c2ac3bce6caf7e47be424a917d2421743d53f08eb

                      • C:\Windows\{29AD14CF-1A21-4bff-BC27-09243C68166B}.exe

                        Filesize

                        192KB

                        MD5

                        6d8d01e9f77df877af5eb7fd32f860e0

                        SHA1

                        fabd1c3a3c791cddd9ab50d14a6f0e702b98833e

                        SHA256

                        8380d8438bae57d00dc126ed8b6671199e326445f97a7c1107d2f7ba074e1cd7

                        SHA512

                        45569ec692233f4379f1a5d28ac9d03d18033990bb27d7eff1fd4ae6405f39fb17477740ee2124c1fa3ada7ed2b5d0c8f18eeb8a07ad8966bac374547fa6a014

                      • C:\Windows\{3C7A52A4-04E4-4318-9434-899DB864BD2E}.exe

                        Filesize

                        192KB

                        MD5

                        0b5d534d146655244d96d6947069f744

                        SHA1

                        5340d6be36f90f9fbc9157ac7c54fc35e0d3d531

                        SHA256

                        0c0d8fa851b37396310a5b47761577abfb425acc04eb3d587ff1ac2a931ef240

                        SHA512

                        0446a2251f17cec7d7b13bc2bb30e1b5b2286e55c7b33977fae09a40102d6d2c391a1f346dd5c9aebad0988c33e688576db777fc634f24772eced22b1d3b4a9a

                      • C:\Windows\{83D4A543-2C2D-4bf9-ACDF-3C7A614BF86D}.exe

                        Filesize

                        192KB

                        MD5

                        d0cc6688e1e6961a25b2a67d905b9207

                        SHA1

                        a30ae7f04e1347c3f4c9d3f6774e0ad96bc1b983

                        SHA256

                        1709d2ffdf72d7bb35b34e5c043da6a79e934a27fcd371222c332ab66ebf57b5

                        SHA512

                        862ad6dff9cef57489638e126c210154acf6792cc2674529ef46c52f87e0f33d37f28ca96925eb200d5fc61d31137fa94d76aa999cc3b194c3f3f2574f6029ef

                      • C:\Windows\{92253DA3-D4C1-4d91-AF63-EA1F38F8DE85}.exe

                        Filesize

                        192KB

                        MD5

                        29fad7ca678de5393a4308e0cd940336

                        SHA1

                        fb5f4ac045361dcbd9a63d84a30bce8443d6847a

                        SHA256

                        613f980e04ad160d78f7b40efe389aebdd1839ba2471d06ab406e0be70bb1d57

                        SHA512

                        1c5cd854c98a35b964217b554f29b73f6bcef55c6e4b2edad7c3ddeb4cb078ff11b28389c8ad79d4a0dc22f4c892db9ef25fc5b08c1fc9e7d1df8f124b69193f

                      • C:\Windows\{A10A422C-E15C-4341-9606-80B37A80D695}.exe

                        Filesize

                        192KB

                        MD5

                        e077334888bf363c45fa91d8fe08ed01

                        SHA1

                        70ce43e9fe1d16b58740a4a521d95a8fb4298522

                        SHA256

                        e4ebb5bd9366de9bc4609261f4b187284748e882c7aa0cdf3d3c30dc79107e11

                        SHA512

                        428375ce26b76aae3ff421192325657cfcade06e617e4ad322b1150cfb90990628ddaa4d00d3073080bc47fe626d13dbc4258652d9d949dba087e433ffc1c0ed

                      • C:\Windows\{DEAF4FF5-5222-4912-9A8F-F30B647C8431}.exe

                        Filesize

                        192KB

                        MD5

                        5c80b69cb2ea5ecdeda851f9cbe14b51

                        SHA1

                        fa142c4699cb86ab5617201569f4be8f0d16399d

                        SHA256

                        d93a4b712a68603d287c7f7128dc2f85a6a78786740fd49026ac24a0a1f1d5ab

                        SHA512

                        a86cd56b457de4d1c43b0adb48b991148deaf42459a9b1ed3cb44ba6ebdbdc338d544453595a7cc23c1529eb15bd060908214cbd37f5349739ff0cb152b3ecbf

                      • C:\Windows\{F0D4879B-C8FD-4f31-BF0C-05BF60F04004}.exe

                        Filesize

                        192KB

                        MD5

                        2e6552bd1f9e8e543459eb1e517d5d91

                        SHA1

                        a91e713a83b838b1d6aef04d9205cb66e0fdb384

                        SHA256

                        8b6a8f2b4d90a0f521657e2f4f3cfe081080958e1bb769e09e4925e6004a0071

                        SHA512

                        5d38853ba0839b18906b52958249b6415533173adc19cf93eaa7db7cd17df175de5d10a48397ef911f5de4bf251a1834ce4f56ae68e27bded446c72ad892bdbf

                      We care about your privacy.

                      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.