Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29/03/2024, 04:25

General

  • Target

    2024-03-29_2a4e6d79bb3ac0a3ce603d3e02940d43_goldeneye.exe

  • Size

    192KB

  • MD5

    2a4e6d79bb3ac0a3ce603d3e02940d43

  • SHA1

    672a9c8ebf45d4dc6f013d5131e0c755536ebb2e

  • SHA256

    6de584a57549165150ea67d7df78408a8329aeb510600525bcc6929d4cf12d15

  • SHA512

    00f20ff6f2598b9dd227e3e13789910ab6330ec5e08ec92168f68248b882e956bbdcd42cf4728c644a4b316b74828955e11d4a012acb4b0affc3c4fe1f8dcb2d

  • SSDEEP

    1536:1EGh0oIl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3H6:1EGh0oIl1OPOe2MUVg3Ve+rXfMUa

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-03-29_2a4e6d79bb3ac0a3ce603d3e02940d43_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-03-29_2a4e6d79bb3ac0a3ce603d3e02940d43_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2656
    • C:\Windows\{F0D4879B-C8FD-4f31-BF0C-05BF60F04004}.exe
      C:\Windows\{F0D4879B-C8FD-4f31-BF0C-05BF60F04004}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1684
      • C:\Windows\{A10A422C-E15C-4341-9606-80B37A80D695}.exe
        C:\Windows\{A10A422C-E15C-4341-9606-80B37A80D695}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2544
        • C:\Windows\{1E421CC6-02F1-487d-A80A-5094056319AA}.exe
          C:\Windows\{1E421CC6-02F1-487d-A80A-5094056319AA}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2836
          • C:\Windows\{0DEF5C9D-F268-4253-A21B-1D73FA556950}.exe
            C:\Windows\{0DEF5C9D-F268-4253-A21B-1D73FA556950}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:788
            • C:\Windows\{83D4A543-2C2D-4bf9-ACDF-3C7A614BF86D}.exe
              C:\Windows\{83D4A543-2C2D-4bf9-ACDF-3C7A614BF86D}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:572
              • C:\Windows\{3C7A52A4-04E4-4318-9434-899DB864BD2E}.exe
                C:\Windows\{3C7A52A4-04E4-4318-9434-899DB864BD2E}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2732
                • C:\Windows\{25409364-D57D-4b19-9488-CE8930F3048D}.exe
                  C:\Windows\{25409364-D57D-4b19-9488-CE8930F3048D}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2348
                  • C:\Windows\{DEAF4FF5-5222-4912-9A8F-F30B647C8431}.exe
                    C:\Windows\{DEAF4FF5-5222-4912-9A8F-F30B647C8431}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1844
                    • C:\Windows\{29AD14CF-1A21-4bff-BC27-09243C68166B}.exe
                      C:\Windows\{29AD14CF-1A21-4bff-BC27-09243C68166B}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1764
                      • C:\Windows\{92253DA3-D4C1-4d91-AF63-EA1F38F8DE85}.exe
                        C:\Windows\{92253DA3-D4C1-4d91-AF63-EA1F38F8DE85}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2088
                        • C:\Windows\{1610B2BA-71A5-4533-9B4B-16C13E1C5482}.exe
                          C:\Windows\{1610B2BA-71A5-4533-9B4B-16C13E1C5482}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:2952
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{92253~1.EXE > nul
                          12⤵
                            PID:2936
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{29AD1~1.EXE > nul
                          11⤵
                            PID:2928
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{DEAF4~1.EXE > nul
                          10⤵
                            PID:1104
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{25409~1.EXE > nul
                          9⤵
                            PID:2044
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{3C7A5~1.EXE > nul
                          8⤵
                            PID:952
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{83D4A~1.EXE > nul
                          7⤵
                            PID:2948
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{0DEF5~1.EXE > nul
                          6⤵
                            PID:2080
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{1E421~1.EXE > nul
                          5⤵
                            PID:1956
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{A10A4~1.EXE > nul
                          4⤵
                            PID:3032
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{F0D48~1.EXE > nul
                          3⤵
                            PID:2760
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:2668

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\{0DEF5C9D-F268-4253-A21B-1D73FA556950}.exe

                        Filesize

                        192KB

                        MD5

                        f1d6e51c5af0016c101997e73ce7c09f

                        SHA1

                        cb593976f2add58673c730ff27c61be7d876640b

                        SHA256

                        2530da9bd114c1ef548fd402c44ef769a77d562f6c748a55fae2271c00e6fe88

                        SHA512

                        abda0b3d15373638b7e4aba639609cd3788a8407f17f49333cb655474843faca13eb50afd08c949eea1ffc690c83bd7a3870d7802ccba6c8622eeb692bd6445f

                      • C:\Windows\{1610B2BA-71A5-4533-9B4B-16C13E1C5482}.exe

                        Filesize

                        192KB

                        MD5

                        bd03e28029934a092c4c91402ae9b5de

                        SHA1

                        4f380e02d8f749f1eec040b6d428acda8500b735

                        SHA256

                        9c48a33617584a441b3749c378d2a841f4984ac787e44d22920d641884fd13c5

                        SHA512

                        516e5285a561be2e22de806090cd0cc27431b4d495bf1207b88f0a413c084fa9cdafcd99614c8c60cbf7f9205e80544f706272fcd6a4afb0c751b52bbee3684c

                      • C:\Windows\{1E421CC6-02F1-487d-A80A-5094056319AA}.exe

                        Filesize

                        192KB

                        MD5

                        1129a95a142ef17523e5f2b32d4cb0d4

                        SHA1

                        d351be974f2c00f155bba7b4ddb43004c5a247e7

                        SHA256

                        1b751d216d90708ee296f15a2a58b9484ccaf44a95845807fcf3044f31f83e7d

                        SHA512

                        4987fc9e2f75399ec09224b0cea8e1ae8179eb13777184ac4272e3458fadedf2cd442d448e57f51044b3e74c9e1a3f82814e1ed9fe68d56a3d5f477a1ddda101

                      • C:\Windows\{25409364-D57D-4b19-9488-CE8930F3048D}.exe

                        Filesize

                        192KB

                        MD5

                        9b50a2d1a09aaf049878b427ed6624ba

                        SHA1

                        0cc4fd0595e352e80fb5591934d39d1308f27307

                        SHA256

                        b852395fc9cdaf9ee8df20fc115fff638725abf305f8214ae9c7de551bae33ca

                        SHA512

                        f9740c899f342be7dea115fa6761069cd100c57544faf4f7d2725d7a936890266428bf90901186e7c974a99c2ac3bce6caf7e47be424a917d2421743d53f08eb

                      • C:\Windows\{29AD14CF-1A21-4bff-BC27-09243C68166B}.exe

                        Filesize

                        192KB

                        MD5

                        6d8d01e9f77df877af5eb7fd32f860e0

                        SHA1

                        fabd1c3a3c791cddd9ab50d14a6f0e702b98833e

                        SHA256

                        8380d8438bae57d00dc126ed8b6671199e326445f97a7c1107d2f7ba074e1cd7

                        SHA512

                        45569ec692233f4379f1a5d28ac9d03d18033990bb27d7eff1fd4ae6405f39fb17477740ee2124c1fa3ada7ed2b5d0c8f18eeb8a07ad8966bac374547fa6a014

                      • C:\Windows\{3C7A52A4-04E4-4318-9434-899DB864BD2E}.exe

                        Filesize

                        192KB

                        MD5

                        0b5d534d146655244d96d6947069f744

                        SHA1

                        5340d6be36f90f9fbc9157ac7c54fc35e0d3d531

                        SHA256

                        0c0d8fa851b37396310a5b47761577abfb425acc04eb3d587ff1ac2a931ef240

                        SHA512

                        0446a2251f17cec7d7b13bc2bb30e1b5b2286e55c7b33977fae09a40102d6d2c391a1f346dd5c9aebad0988c33e688576db777fc634f24772eced22b1d3b4a9a

                      • C:\Windows\{83D4A543-2C2D-4bf9-ACDF-3C7A614BF86D}.exe

                        Filesize

                        192KB

                        MD5

                        d0cc6688e1e6961a25b2a67d905b9207

                        SHA1

                        a30ae7f04e1347c3f4c9d3f6774e0ad96bc1b983

                        SHA256

                        1709d2ffdf72d7bb35b34e5c043da6a79e934a27fcd371222c332ab66ebf57b5

                        SHA512

                        862ad6dff9cef57489638e126c210154acf6792cc2674529ef46c52f87e0f33d37f28ca96925eb200d5fc61d31137fa94d76aa999cc3b194c3f3f2574f6029ef

                      • C:\Windows\{92253DA3-D4C1-4d91-AF63-EA1F38F8DE85}.exe

                        Filesize

                        192KB

                        MD5

                        29fad7ca678de5393a4308e0cd940336

                        SHA1

                        fb5f4ac045361dcbd9a63d84a30bce8443d6847a

                        SHA256

                        613f980e04ad160d78f7b40efe389aebdd1839ba2471d06ab406e0be70bb1d57

                        SHA512

                        1c5cd854c98a35b964217b554f29b73f6bcef55c6e4b2edad7c3ddeb4cb078ff11b28389c8ad79d4a0dc22f4c892db9ef25fc5b08c1fc9e7d1df8f124b69193f

                      • C:\Windows\{A10A422C-E15C-4341-9606-80B37A80D695}.exe

                        Filesize

                        192KB

                        MD5

                        e077334888bf363c45fa91d8fe08ed01

                        SHA1

                        70ce43e9fe1d16b58740a4a521d95a8fb4298522

                        SHA256

                        e4ebb5bd9366de9bc4609261f4b187284748e882c7aa0cdf3d3c30dc79107e11

                        SHA512

                        428375ce26b76aae3ff421192325657cfcade06e617e4ad322b1150cfb90990628ddaa4d00d3073080bc47fe626d13dbc4258652d9d949dba087e433ffc1c0ed

                      • C:\Windows\{DEAF4FF5-5222-4912-9A8F-F30B647C8431}.exe

                        Filesize

                        192KB

                        MD5

                        5c80b69cb2ea5ecdeda851f9cbe14b51

                        SHA1

                        fa142c4699cb86ab5617201569f4be8f0d16399d

                        SHA256

                        d93a4b712a68603d287c7f7128dc2f85a6a78786740fd49026ac24a0a1f1d5ab

                        SHA512

                        a86cd56b457de4d1c43b0adb48b991148deaf42459a9b1ed3cb44ba6ebdbdc338d544453595a7cc23c1529eb15bd060908214cbd37f5349739ff0cb152b3ecbf

                      • C:\Windows\{F0D4879B-C8FD-4f31-BF0C-05BF60F04004}.exe

                        Filesize

                        192KB

                        MD5

                        2e6552bd1f9e8e543459eb1e517d5d91

                        SHA1

                        a91e713a83b838b1d6aef04d9205cb66e0fdb384

                        SHA256

                        8b6a8f2b4d90a0f521657e2f4f3cfe081080958e1bb769e09e4925e6004a0071

                        SHA512

                        5d38853ba0839b18906b52958249b6415533173adc19cf93eaa7db7cd17df175de5d10a48397ef911f5de4bf251a1834ce4f56ae68e27bded446c72ad892bdbf