Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/04/2024, 15:44

General

  • Target

    2024-04-11_cfedb16492903c61a6c70d08e1fcfaa9_goldeneye.exe

  • Size

    168KB

  • MD5

    cfedb16492903c61a6c70d08e1fcfaa9

  • SHA1

    3b02fe75e35590332b34ff62dbf0b3d65a1bd230

  • SHA256

    2cd46ce3036e586734fe8440a5a97030a0c2722e78b2ef98085987061b16b4e3

  • SHA512

    72db918a1042a216d9eed15254cca211a9de35c8c42210131e279838f1ba232cba3c96508d17b33d3ad66d8982e54ceaad612821b391dbed91bf325c25e57f0b

  • SSDEEP

    1536:1EGh0o0lq5IRVhNJ5Qef7BudMeNzVg3Ve+rrS2:1EGh0o0lqOPOe2MUVg3Ve+rX

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 12 IoCs
  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-11_cfedb16492903c61a6c70d08e1fcfaa9_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-11_cfedb16492903c61a6c70d08e1fcfaa9_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3504
    • C:\Windows\{8F585D7D-CFFF-4929-AFEB-8FBE29A2A407}.exe
      C:\Windows\{8F585D7D-CFFF-4929-AFEB-8FBE29A2A407}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5040
      • C:\Windows\{C6614846-4BEF-4579-987C-190130CB54E5}.exe
        C:\Windows\{C6614846-4BEF-4579-987C-190130CB54E5}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2904
        • C:\Windows\{A37ABD88-74FE-4431-9180-75E4495590B1}.exe
          C:\Windows\{A37ABD88-74FE-4431-9180-75E4495590B1}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2600
          • C:\Windows\{A053DED3-67D7-4f1a-BE5A-93F26DB1F0A3}.exe
            C:\Windows\{A053DED3-67D7-4f1a-BE5A-93F26DB1F0A3}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1016
            • C:\Windows\{2E346217-8847-4850-BAB1-FF1DCFB0E9E0}.exe
              C:\Windows\{2E346217-8847-4850-BAB1-FF1DCFB0E9E0}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1652
              • C:\Windows\{C2A0127A-D30C-4a77-8F7A-9C0B8011184F}.exe
                C:\Windows\{C2A0127A-D30C-4a77-8F7A-9C0B8011184F}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1012
                • C:\Windows\{3B54A4CE-4F23-4186-B57B-59095E8D2E07}.exe
                  C:\Windows\{3B54A4CE-4F23-4186-B57B-59095E8D2E07}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2604
                  • C:\Windows\{63AE665D-11AC-444c-9026-E78CF4101474}.exe
                    C:\Windows\{63AE665D-11AC-444c-9026-E78CF4101474}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:4248
                    • C:\Windows\{A1F84E29-BF84-410e-BD2B-8FF4B62AF22E}.exe
                      C:\Windows\{A1F84E29-BF84-410e-BD2B-8FF4B62AF22E}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:3716
                      • C:\Windows\{6CDCAC57-FC87-4934-9E94-573022CD5E26}.exe
                        C:\Windows\{6CDCAC57-FC87-4934-9E94-573022CD5E26}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:1864
                        • C:\Windows\{8601576F-FDCC-47e6-BC34-AF29B592C717}.exe
                          C:\Windows\{8601576F-FDCC-47e6-BC34-AF29B592C717}.exe
                          12⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4448
                          • C:\Windows\{CA23BBC5-1BB2-4f2e-996F-3CFEDAB7FC75}.exe
                            C:\Windows\{CA23BBC5-1BB2-4f2e-996F-3CFEDAB7FC75}.exe
                            13⤵
                            • Executes dropped EXE
                            PID:1992
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{86015~1.EXE > nul
                            13⤵
                              PID:3504
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{6CDCA~1.EXE > nul
                            12⤵
                              PID:4976
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{A1F84~1.EXE > nul
                            11⤵
                              PID:4632
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{63AE6~1.EXE > nul
                            10⤵
                              PID:2724
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{3B54A~1.EXE > nul
                            9⤵
                              PID:3272
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{C2A01~1.EXE > nul
                            8⤵
                              PID:2368
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{2E346~1.EXE > nul
                            7⤵
                              PID:1412
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{A053D~1.EXE > nul
                            6⤵
                              PID:4832
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{A37AB~1.EXE > nul
                            5⤵
                              PID:456
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{C6614~1.EXE > nul
                            4⤵
                              PID:180
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{8F585~1.EXE > nul
                            3⤵
                              PID:4492
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                            2⤵
                              PID:3792

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Windows\{2E346217-8847-4850-BAB1-FF1DCFB0E9E0}.exe

                            Filesize

                            168KB

                            MD5

                            3f1e178ff48fc5364e1c211629e9a858

                            SHA1

                            4a00c20bc236e21124dd4ee824d27b604e17a0d0

                            SHA256

                            f1c27f24682897672898bd8600bfd62a6d3382ba7a7d3da8bd2f9b0d6d059806

                            SHA512

                            b3d7f25a8f8c38232d1eafe512cee3811a74fe2734888ded12457bb760fa8d299a7b3111e799925fb5781b2c852e1350480305e2f26dacfb0011fd6f56b55f72

                          • C:\Windows\{3B54A4CE-4F23-4186-B57B-59095E8D2E07}.exe

                            Filesize

                            168KB

                            MD5

                            c402bab7ba85994013446bf6c1fcc927

                            SHA1

                            e66515d8653c825ad10b0032d024b00eed399cf6

                            SHA256

                            590c0091f3caeab14bf8fd3254115ae552f39d4ca6cd704bc5550b64d16c49ad

                            SHA512

                            88ded105d6a79b0c1c2a08babffc73cdabd2492459e2e0b613d82dc5f26d84bece797308fc80f0afbfc44b34a83f404615b758560cd9ac36ec0411c4417bd0c2

                          • C:\Windows\{63AE665D-11AC-444c-9026-E78CF4101474}.exe

                            Filesize

                            168KB

                            MD5

                            c8a99cbd5c9c765ff41049365e3b105c

                            SHA1

                            df2a93c330c0db160fb6583e0a70d7e47ae63771

                            SHA256

                            9ea30d539461e95cfa9a309c98e644734c57c406ea2d5ca978acf4e4f971b1f8

                            SHA512

                            3997ac79faf7cdc664726fde252021c9ef423b3dd07a1c79a021a8e161aebad519b24c87dc118c712af47b62353eac326bf901e484626dfbcd8cb3df52e4623b

                          • C:\Windows\{6CDCAC57-FC87-4934-9E94-573022CD5E26}.exe

                            Filesize

                            168KB

                            MD5

                            2fa285f1dde80c5ed84dfa6f42c217fa

                            SHA1

                            1792236a99d0385f1ddf777239347cf32c81213d

                            SHA256

                            0df145f1898db2e4f92c3885d0d56cd1eeb91867060b7948384ef8ae50938455

                            SHA512

                            427ef311fa70ab6739a5645739b2b637a18062f48e72ec22a5dbb706d4bfee6f1d4157671d53c619beddae0e252e4ad3d27fac21e6b85241f3516eb9a4a63fbf

                          • C:\Windows\{8601576F-FDCC-47e6-BC34-AF29B592C717}.exe

                            Filesize

                            168KB

                            MD5

                            ec68dc653896a3ab39f9de141354392b

                            SHA1

                            62c28443c0f9aff5f57822881264e9368593306b

                            SHA256

                            a0b6a01c07fcd4d80f1e0a86f1462e2f00305075cebfc9cabc686e75f4258401

                            SHA512

                            f6c178a92accc4d6e017ce713a2a187070153c93eaf2c4a95ab48cea32e25446e20aa1ea236766febc9402877b7893d56cea5a1eecd1c6ef33dbc853cf591e24

                          • C:\Windows\{8F585D7D-CFFF-4929-AFEB-8FBE29A2A407}.exe

                            Filesize

                            168KB

                            MD5

                            7daa6889a3f4bc68e463c698cd04a1f1

                            SHA1

                            16e40baf3ff77c7f530c0d2be879811614d5f5ca

                            SHA256

                            e16a1d6f9638f1c6b2f937bc164784f159a71ae32ec944a0ba61c5ca2959021d

                            SHA512

                            d2fb694c42731d1d3447a02d395420d894fdc7106fc2ab43be6ea09f1929e422a2d6fed9c9930cdfd2f24a9a0e7415d26c185a539a5f73882294a86f3c02b4ee

                          • C:\Windows\{A053DED3-67D7-4f1a-BE5A-93F26DB1F0A3}.exe

                            Filesize

                            168KB

                            MD5

                            7565773f365c5a7972e7d940a76773ad

                            SHA1

                            78fbcce9f183a04d1d9a7362059252bba1f03fb3

                            SHA256

                            8df91a994d6e1f6860be40272d982668352d8d027e70bc8f7673893224f2e500

                            SHA512

                            68c08a1095bb403069c9e368bafbe06016ebf4961ffb63f6924908fb2f0e630a80fc4190a5d2a6e11bcea3777ee998476f1715c6c04a8b62ab7dd21e30ec3aa0

                          • C:\Windows\{A1F84E29-BF84-410e-BD2B-8FF4B62AF22E}.exe

                            Filesize

                            168KB

                            MD5

                            d111234a9f1d683548d2049eeab24992

                            SHA1

                            66e57c7063c7fadfe14f2fea84373eef1d656c0b

                            SHA256

                            0f9b4e6139bb3afb07e618322ad79f7a13bf74dd068807f20b211b84b44c4a51

                            SHA512

                            4aee7e083e325c8d2a08395c2090b8db05799786c3c96e25d96959a3be7c86ac931841d12c13304c1db3d5bed6211dac0619204bb331fe12c168fefb08b6616d

                          • C:\Windows\{A37ABD88-74FE-4431-9180-75E4495590B1}.exe

                            Filesize

                            168KB

                            MD5

                            b687bacef6a9551ea787d0f9415c7406

                            SHA1

                            b2f4151e29b4865571343bec9302841eae467eae

                            SHA256

                            c6407eeac1daa395e548102137053e7b3c615a9ab675d4a2ba292fac040e3dd9

                            SHA512

                            29a4ef6feb93462824eb2074d78c8916383f91ae270b5da69dc1f27e8aad01c5c0b131c1d8b395fa198679c6c7fdbe6f44aa64c21026499f60360297bcccb1aa

                          • C:\Windows\{C2A0127A-D30C-4a77-8F7A-9C0B8011184F}.exe

                            Filesize

                            168KB

                            MD5

                            0a750ed6b3dc75f86fd85b9597df7295

                            SHA1

                            54f810d5ca2dd22190110829a9363d7a3799cfff

                            SHA256

                            09e609f72c5c28d1e048f5b90c9db593a046d1d6e965a9ec40f6d482e8304265

                            SHA512

                            f7e39a57ce00302d7dbc1cc8660c72bdd62ec213e8dab420b19da8849a8a053673e7aa57d5f752804d3564817e24697bbf67015b543520c307f4142ddafb37f4

                          • C:\Windows\{C6614846-4BEF-4579-987C-190130CB54E5}.exe

                            Filesize

                            168KB

                            MD5

                            3e9e6852764df17d4b78bbe19b058bb5

                            SHA1

                            52f034554ae8ad9b326c480a77ad71279db8d1bf

                            SHA256

                            6cde7df1bfae74094fb9c91a4da3e005454986a6764ce8b23cab222cefe2995a

                            SHA512

                            746be03e2e57d37c45d2f1d8815563bbf35a9f46049a2cf5196a881be482c64ee2e1363c7a910fb06293b14eea850c312cce906571942e8fc652f7b825caad4c

                          • C:\Windows\{CA23BBC5-1BB2-4f2e-996F-3CFEDAB7FC75}.exe

                            Filesize

                            168KB

                            MD5

                            334e6df7623f4333961684229c44bb4e

                            SHA1

                            5e1a57e342be00e0ba53a8b9257c6e23ec5b6354

                            SHA256

                            c8a693f1a5eb086f51704a99beff4e1d256ab0aa235ec6f6584a6a5a61595a37

                            SHA512

                            91ac95ee5dbd955281e3502300a3ed0ebc6444009cd0111142ec7dfe8dc0bc3ad68b001d5e2738aca1f1780b829b72a5120f2b40d6c3eef8da964e5bcb4cbb38