Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    08/04/2024, 19:28

General

  • Target

    2024-04-08_af9e0517c70c6cd8a3bbadd478ceb2d0_goldeneye.exe

  • Size

    216KB

  • MD5

    af9e0517c70c6cd8a3bbadd478ceb2d0

  • SHA1

    3f34dfcea92cc8b68eab4233cb98aa3855a024d1

  • SHA256

    e1a8ae76a860d0ed762222ed64d6e9f6b3a8d1be52a83b4d448087f6c428c1da

  • SHA512

    b99c9c32a3040b691964978d98dd31c7aa51d5cdf510a1bacc4b5a22b6ae7d195c12b110b39548d1324a17c54244fe3058b15ffadfe5527fc2bca4334684e574

  • SSDEEP

    3072:jEGh0o5l+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMUy:jEGLlEeKcAEcGy

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-08_af9e0517c70c6cd8a3bbadd478ceb2d0_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-08_af9e0517c70c6cd8a3bbadd478ceb2d0_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Windows\{34D73555-7953-4833-B929-E6A05923CEF9}.exe
      C:\Windows\{34D73555-7953-4833-B929-E6A05923CEF9}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1136
      • C:\Windows\{7EAEECDA-64B1-4a82-9A62-7A1D488A2470}.exe
        C:\Windows\{7EAEECDA-64B1-4a82-9A62-7A1D488A2470}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2660
        • C:\Windows\{F4633634-5854-4c0c-88A6-DC52FB03CA36}.exe
          C:\Windows\{F4633634-5854-4c0c-88A6-DC52FB03CA36}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2812
          • C:\Windows\{0A2E8323-06DE-4214-879D-248B74B5E734}.exe
            C:\Windows\{0A2E8323-06DE-4214-879D-248B74B5E734}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:768
            • C:\Windows\{6F5B98BE-938A-4da3-8212-17DD62A19D99}.exe
              C:\Windows\{6F5B98BE-938A-4da3-8212-17DD62A19D99}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2000
              • C:\Windows\{A7176E8C-3B7C-4c46-9193-26F96A1C2586}.exe
                C:\Windows\{A7176E8C-3B7C-4c46-9193-26F96A1C2586}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2064
                • C:\Windows\{799E45D8-BF33-4c24-A828-9A218F932D22}.exe
                  C:\Windows\{799E45D8-BF33-4c24-A828-9A218F932D22}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2244
                  • C:\Windows\{779E683B-993F-4945-94EB-CEFAADCC2298}.exe
                    C:\Windows\{779E683B-993F-4945-94EB-CEFAADCC2298}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1636
                    • C:\Windows\{7411FF76-F4D3-4811-B711-9AC5319AA287}.exe
                      C:\Windows\{7411FF76-F4D3-4811-B711-9AC5319AA287}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2684
                      • C:\Windows\{3B2B5F0A-558E-49d2-B1A5-C9370DB984BA}.exe
                        C:\Windows\{3B2B5F0A-558E-49d2-B1A5-C9370DB984BA}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2412
                        • C:\Windows\{2F36676C-BC08-44bb-85B4-233B2F1BE1AA}.exe
                          C:\Windows\{2F36676C-BC08-44bb-85B4-233B2F1BE1AA}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:1600
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{3B2B5~1.EXE > nul
                          12⤵
                            PID:2776
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{7411F~1.EXE > nul
                          11⤵
                            PID:592
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{779E6~1.EXE > nul
                          10⤵
                            PID:2108
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{799E4~1.EXE > nul
                          9⤵
                            PID:1684
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{A7176~1.EXE > nul
                          8⤵
                            PID:1196
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{6F5B9~1.EXE > nul
                          7⤵
                            PID:816
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{0A2E8~1.EXE > nul
                          6⤵
                            PID:1700
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{F4633~1.EXE > nul
                          5⤵
                            PID:2960
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{7EAEE~1.EXE > nul
                          4⤵
                            PID:2384
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{34D73~1.EXE > nul
                          3⤵
                            PID:2676
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:2220

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\{0A2E8323-06DE-4214-879D-248B74B5E734}.exe

                        Filesize

                        216KB

                        MD5

                        1e049b265fd5b68b3f199f90dd52f232

                        SHA1

                        e1fb6976c8b78cd1710bd6fafb4d05d19665975b

                        SHA256

                        c6ccc05d090fd3872baebb45e63f1de9b7ad665072ad69539b103d391b09c32f

                        SHA512

                        83d404b192bceca3a61338f4ff6508ef3c05e3a3b3c48a230eeead89835f3ebf6d509d355c87f7601f4b1e6f6c3faab8b33c9a182f0de97d92b70e6c85cc8d7f

                      • C:\Windows\{2F36676C-BC08-44bb-85B4-233B2F1BE1AA}.exe

                        Filesize

                        216KB

                        MD5

                        fba5944a20872e5fcddc5759226b9e7f

                        SHA1

                        dac1f4b375c0b8b718a93969f622129526b9b87f

                        SHA256

                        aff777d899dc4774645b786b4e458cc7d290cfcaa6e1b0541e3c633a7d29ff1e

                        SHA512

                        54135b453006c58ef7e7c2528f56b6169c8ff64765528f1988e97a642ceb06220610f18d59ed79bcd3d93177828bb2423fabac5a0afe31613eeb91d970f249e7

                      • C:\Windows\{34D73555-7953-4833-B929-E6A05923CEF9}.exe

                        Filesize

                        216KB

                        MD5

                        e4b74f932c3e79dab63a9a6394ad8038

                        SHA1

                        d8d27ea2e0f82c7e237a07740a0025d88ac6c2d3

                        SHA256

                        5f3f625c8880d8b90e0a36a10df620c9f2df30d6c37004685f02c5574fe5650c

                        SHA512

                        d0bf87f36eac0a240271fa09c06c48c2e3222841ee43c112cd392a338a6d22efc765068408d2b37a1a462d588bafcdb4c2aaec46659899acfa5edc44b226b44a

                      • C:\Windows\{3B2B5F0A-558E-49d2-B1A5-C9370DB984BA}.exe

                        Filesize

                        216KB

                        MD5

                        52e578a203cb40cb453b3d7d0b7dda25

                        SHA1

                        bf5b4cb6992ca1b864c9285b5cbc5c4011ce89b2

                        SHA256

                        44f277872f02ae16ca093aa3f195362ebeb4aafabedc17acab0f70d80a5b6467

                        SHA512

                        7ae798711504d7310293b4a23bf35b39d37b26d14cabd8179d2b8f9babfd03f43203134ff787be9e9a79ecd2646d639df2ddfa88ce9ac79f5e3fcdacfa0dc1a1

                      • C:\Windows\{6F5B98BE-938A-4da3-8212-17DD62A19D99}.exe

                        Filesize

                        216KB

                        MD5

                        69e155023a0e424495381709b3ae2410

                        SHA1

                        ac2d9d8e83d63ee765116b03d10bd9f179c9fb51

                        SHA256

                        db4766d9712029e58fa59eb0f997e79de664a3a8dd9d1e7394da398e472e9650

                        SHA512

                        edfbf18c6d85c4efbed759e43e1553de960f7dc1b286662330bca7d1df939d9456d53f78bee41f40e2d9065c4105b3f3c9a107cf0b0a9f5fb11f2ce594232659

                      • C:\Windows\{7411FF76-F4D3-4811-B711-9AC5319AA287}.exe

                        Filesize

                        216KB

                        MD5

                        9be07b717224989407aebc5e3599f4a9

                        SHA1

                        73d856d7b40218d389595eb555a35293a83d93ab

                        SHA256

                        93031d8b8bbd9f0e933b306838d2d39efb0c375f8a9f8bde1958281afc73197d

                        SHA512

                        0cdd2cb5b82a6717589a1856cb32a1fa07f3a369df2c3f2d56c7280e1251f45c39662914cc2822e2f94f793a48b6f08e97f343b6be0ab2574ce09b7a8828611f

                      • C:\Windows\{779E683B-993F-4945-94EB-CEFAADCC2298}.exe

                        Filesize

                        216KB

                        MD5

                        e68005af584b7aa344c0f9dad2408e7d

                        SHA1

                        3b9ca7ed203b17c82fe43ceeb49036db54eb9506

                        SHA256

                        2cc709da93fe363a2d8cc00fd39ac180ee1b26845aa8c2f031e0d6b5f5127d24

                        SHA512

                        5d01df62bf3b5c265ea978b606c321878b16d70c0dfb86b42322e7f68368e3e5f3a188ae75f87a1f58bd1ece5fc2497da12eff4c566a59bd1abf590e9c20e835

                      • C:\Windows\{799E45D8-BF33-4c24-A828-9A218F932D22}.exe

                        Filesize

                        216KB

                        MD5

                        51e12676dc61a9e8b04639487d4c5836

                        SHA1

                        283c9dd8b47a106a9bb2f606327b32ad9ae6ec22

                        SHA256

                        c7dacac1aee4beb0ddcd67d8572889934023865f95660d5fe9b982961f2a4f30

                        SHA512

                        f46879f706d1aaa87c4b8a490345141f7ffa835a0a7594a9a37080addd0536d1e2680bb55877d6cb87fe7cdd079dd90c62453be8e600fa733df5ada0a5337ca7

                      • C:\Windows\{7EAEECDA-64B1-4a82-9A62-7A1D488A2470}.exe

                        Filesize

                        216KB

                        MD5

                        b5a7a594d2329eb3218d9254c79596bc

                        SHA1

                        6f4d7eda9b7631862e9d107e5e990aa3181f91ac

                        SHA256

                        affe796834ae8f09f81390e6f411d4c0706b2493e5b04cdbe8c8c54f6147a0f3

                        SHA512

                        585eba645d70ad5f276d3ade0b9ba69ea8810110e4098aa571eb1317eafd38fcaf1584baeba24162d0fca3fb1179b23d6077af50702818d7ab324aa77ec81430

                      • C:\Windows\{A7176E8C-3B7C-4c46-9193-26F96A1C2586}.exe

                        Filesize

                        216KB

                        MD5

                        8d6c2059096f045009e86f68dc62b8c3

                        SHA1

                        39ac3234664fe527777c9fcfe5ab763057aaefa0

                        SHA256

                        040a047538e0e939af72c2ea925a8ff2048d45b6c5e2655f143747b19a3747cc

                        SHA512

                        fab72708482f777bb7de210a334c75a085dcc7c3c01125e38e5877dc8c1b21b29f14094d30d29432930692ad73c60cbce1c1ecf7117546544b2f4e9ad37ad84a

                      • C:\Windows\{F4633634-5854-4c0c-88A6-DC52FB03CA36}.exe

                        Filesize

                        216KB

                        MD5

                        5f91a04e236bac3711a2581a9672f5c9

                        SHA1

                        96d16821814a2621fe31d096e2e10452121789f0

                        SHA256

                        16314e98a9cf66491cd837c99c0036174a8045aa1afe9b3caec694f7e9930541

                        SHA512

                        b0745e90fd2580c7daee782d74468a22819d4283d3c0d60dc1570fcb068f07fcfe95df6097fd3c4fd328e7e7ee97f42fbfc910aab527d912c333cdeddf2bd254