Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/04/2024, 00:50

General

  • Target

    2024-04-16_bf04d94f9185e2a7f7f35d651d6f9bce_goldeneye.exe

  • Size

    380KB

  • MD5

    bf04d94f9185e2a7f7f35d651d6f9bce

  • SHA1

    2f121e0d4a6c5e6e047acbaea26fd2be1202ec8a

  • SHA256

    3162bc7836ff74163f393a0850aa2d901967b36c3d1b162eea03a6c89c2c75e4

  • SHA512

    6c57f3f1781373472355533fef70777ff9a5c722cdbc56d88ca486d26c3211ccf1ba3ffb7c959742aec65e3b0d00856127368835b868d716e753c5bfbe307221

  • SSDEEP

    3072:mEGh0o7lPOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGw:mEGll7Oe2MUVg3v2IneKcAEcARy

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 12 IoCs
  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-16_bf04d94f9185e2a7f7f35d651d6f9bce_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-16_bf04d94f9185e2a7f7f35d651d6f9bce_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3188
    • C:\Windows\{D7DFEBA3-40EF-41d3-9267-5E4397111C39}.exe
      C:\Windows\{D7DFEBA3-40EF-41d3-9267-5E4397111C39}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4664
      • C:\Windows\{BC81F630-8ED0-4973-9EC8-4A92FF4DCBE4}.exe
        C:\Windows\{BC81F630-8ED0-4973-9EC8-4A92FF4DCBE4}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1648
        • C:\Windows\{960A5732-E1CB-4a14-B082-E4CF2D572C0A}.exe
          C:\Windows\{960A5732-E1CB-4a14-B082-E4CF2D572C0A}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2720
          • C:\Windows\{3E2C627C-A9F8-453b-BFE4-C42C8A4E3D01}.exe
            C:\Windows\{3E2C627C-A9F8-453b-BFE4-C42C8A4E3D01}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:488
            • C:\Windows\{F82EA265-1CF5-444b-995C-573AAC461625}.exe
              C:\Windows\{F82EA265-1CF5-444b-995C-573AAC461625}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4432
              • C:\Windows\{8A473261-E6DA-48ec-AD98-5FBEAAA0B740}.exe
                C:\Windows\{8A473261-E6DA-48ec-AD98-5FBEAAA0B740}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:992
                • C:\Windows\{2097BC2B-8F3B-4513-A627-20DD2C6C7E14}.exe
                  C:\Windows\{2097BC2B-8F3B-4513-A627-20DD2C6C7E14}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1356
                  • C:\Windows\{EDF1092F-78CB-4404-A1E6-50B26BF61B72}.exe
                    C:\Windows\{EDF1092F-78CB-4404-A1E6-50B26BF61B72}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:1508
                    • C:\Windows\{5155D801-74E9-4d25-9158-81339EA8E662}.exe
                      C:\Windows\{5155D801-74E9-4d25-9158-81339EA8E662}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:2972
                      • C:\Windows\{01421C38-140F-4dcb-8362-66FC66E9D9BF}.exe
                        C:\Windows\{01421C38-140F-4dcb-8362-66FC66E9D9BF}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:3328
                        • C:\Windows\{3BD2A6F8-E097-43cd-B17A-9014B2A3BF55}.exe
                          C:\Windows\{3BD2A6F8-E097-43cd-B17A-9014B2A3BF55}.exe
                          12⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1380
                          • C:\Windows\{1F10970D-C0A6-4295-9782-3C791B17C6B1}.exe
                            C:\Windows\{1F10970D-C0A6-4295-9782-3C791B17C6B1}.exe
                            13⤵
                            • Executes dropped EXE
                            PID:3076
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{3BD2A~1.EXE > nul
                            13⤵
                              PID:4356
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{01421~1.EXE > nul
                            12⤵
                              PID:2672
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{5155D~1.EXE > nul
                            11⤵
                              PID:228
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{EDF10~1.EXE > nul
                            10⤵
                              PID:3596
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{2097B~1.EXE > nul
                            9⤵
                              PID:1500
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{8A473~1.EXE > nul
                            8⤵
                              PID:1348
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{F82EA~1.EXE > nul
                            7⤵
                              PID:3212
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{3E2C6~1.EXE > nul
                            6⤵
                              PID:640
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{960A5~1.EXE > nul
                            5⤵
                              PID:3332
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{BC81F~1.EXE > nul
                            4⤵
                              PID:1692
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{D7DFE~1.EXE > nul
                            3⤵
                              PID:568
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                            2⤵
                              PID:224

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Windows\{01421C38-140F-4dcb-8362-66FC66E9D9BF}.exe

                            Filesize

                            380KB

                            MD5

                            c532692e2864cd9f68c1b66f27dfd6e0

                            SHA1

                            cf14aa437a828f9fba0c0478d2ca369abaed6f75

                            SHA256

                            21cf00d13f3be57eab993b667765a11cc0516b903b692c48f9c12ba19023495c

                            SHA512

                            fc5d1a3677165314348707ee49d72abd66a731d2a9f74dde85aed3ef0e23af2b9b474fcd64b5109a0107a5194de8ef48b2b053e23500548596a5cb5537f97ca7

                          • C:\Windows\{1F10970D-C0A6-4295-9782-3C791B17C6B1}.exe

                            Filesize

                            380KB

                            MD5

                            85ea883817534cb975dc07b25e81999a

                            SHA1

                            2e46757999606258aaa055e336bbaae491abae23

                            SHA256

                            00eeb02bc4a7971568fbbbe2313b41ec9b7dad491403032062c85e57f95dc06e

                            SHA512

                            438344b2ec86b09cf638b53e46f0ebd411a9a978b49a362c1393213d32a3edc39d790ed5a7e9c44331a7d8f926032cd10f051e49087aed5051fec11787958b4d

                          • C:\Windows\{2097BC2B-8F3B-4513-A627-20DD2C6C7E14}.exe

                            Filesize

                            380KB

                            MD5

                            5d27efd5860b8d60d816a796d6c493e2

                            SHA1

                            454decf6d2eee54ed8752c32a9f27f428aec05a4

                            SHA256

                            6f6489fcdff4864aed14103d7be3103172e1d2d341f36cf434152eca6799f348

                            SHA512

                            9fea9d5276ff60522764a1633873d65ebf547df76659b84e19a3e86ae2b1834f1c51e3e6311b3cd5087df0e938c73060a1f4d5f7d2fa4209fa70921ad77dc1cf

                          • C:\Windows\{3BD2A6F8-E097-43cd-B17A-9014B2A3BF55}.exe

                            Filesize

                            380KB

                            MD5

                            a680691ac37b2808375d6ce06216f626

                            SHA1

                            b09f4048a73ab40dab7cc6892a9de6730d27fc65

                            SHA256

                            9aaa5ea8c668cea267860765048c43f5dfc8ba9134b69a12f0b4548924d7c051

                            SHA512

                            2005cd7779f5cc69bfcfb3b9bbd0888657ac2911338e3c2995a90f82009d3dad32b49aa589468d6f420e2c0f6dc54501e8195f43429773cf8f5bc8e57ea2e3d1

                          • C:\Windows\{3E2C627C-A9F8-453b-BFE4-C42C8A4E3D01}.exe

                            Filesize

                            380KB

                            MD5

                            8f44518c905bd894456ad0bd9d5c92f0

                            SHA1

                            129c4c31c04f69554dd5fb2f709a486308e6088d

                            SHA256

                            eb77a25ba69833e4837c9f27f490704e4bd8726f29b57c851bcc6474575f8368

                            SHA512

                            43027faa26f4d6f68633ae2bf49243abe036bd1c8199e9a104eab2fba4cd54248eef362542761f6f666234b4539693db2a1bd4c1fb875ead0b71fff17c1fc2e9

                          • C:\Windows\{5155D801-74E9-4d25-9158-81339EA8E662}.exe

                            Filesize

                            380KB

                            MD5

                            b44dc7e77ee745519a907376155eddca

                            SHA1

                            fb629c8f8459af239bde6d1a52e2d8f5061a8f6d

                            SHA256

                            9e44e4c11eb596ee7881b68be37f94a4a980b0991d0a817e2a205db8567dbe0c

                            SHA512

                            ef6d14f89d792586b19124925a512dd44dfd5633e2379c7f42f50dfd77e4c0ed68061f44e28da96f92074a9681141c537cb3b7ff455491ba6a51e1c9d2a7545c

                          • C:\Windows\{8A473261-E6DA-48ec-AD98-5FBEAAA0B740}.exe

                            Filesize

                            380KB

                            MD5

                            24858a54ff08abf736d72c14322cf1b5

                            SHA1

                            f4294524d002f8cdcda345a9772e2816312ea107

                            SHA256

                            566a4b11861fa5e703463e3236382478c9156eeea61851f18bdb11f77e409b83

                            SHA512

                            e68bd4c5752e153e5fc87069c42ee250aa337bdac228ceaba057b0e99102989dfe2228f1364fd7236a9acb93eaf4cf9b732194685437464d51209ee8092f0e60

                          • C:\Windows\{960A5732-E1CB-4a14-B082-E4CF2D572C0A}.exe

                            Filesize

                            380KB

                            MD5

                            2433e4244cec8a0a11ee80f7401f5e21

                            SHA1

                            9efbcc5cf95c215c9cfbc7bd01d15a02d35d416e

                            SHA256

                            90951f28f1589c2be054dd3468bce37b460bca4811bb527dc292b94ce5d66718

                            SHA512

                            833d8f0e6bf3350652d0e35ee9c5fcaab7cc4a646df54c1e1dab8fab435768ba50479ac14e94525abe493d449eb92d0286375a88c27d9a82a977f6ece6be6001

                          • C:\Windows\{BC81F630-8ED0-4973-9EC8-4A92FF4DCBE4}.exe

                            Filesize

                            380KB

                            MD5

                            2e14e804faee9ac09404782eb2ddaa7b

                            SHA1

                            597884e66acb5d6b054d808f2c71cac0acfece2c

                            SHA256

                            296ab5eb12fd72b1fdcc1cbbf362595ee93d11a9a39d663536c5ae7a3807317b

                            SHA512

                            ceecdfd73157ca76110b76b2d977e0116cd2828795d4280f2d7944357425d3b23be10219871364e5fdb9bb032f0deb94ce5954973ac8ade7e22a95c42afcbc76

                          • C:\Windows\{D7DFEBA3-40EF-41d3-9267-5E4397111C39}.exe

                            Filesize

                            380KB

                            MD5

                            5b5cf30f734b49cf77604875269db4ae

                            SHA1

                            416e909585bfb08d85f2bb0fd9fdb54d73151057

                            SHA256

                            796234f8e828721ff9e80f4e859786b6cb588b7060e08859eb2a294748085fe6

                            SHA512

                            0205064d136619070197854e3e098e2b6667d3fb3732dfe990104e5d4292825222a229f9a10f5a617346b232b1eb9df27128d8a631f1c621f79198afc1616def

                          • C:\Windows\{EDF1092F-78CB-4404-A1E6-50B26BF61B72}.exe

                            Filesize

                            380KB

                            MD5

                            210e7a5a327de8a24a86b6972c29f1cf

                            SHA1

                            7291ef3577b72cd05686ed798b5c89c997096854

                            SHA256

                            33a4adbf4648675e36ec187ce83ad4f07ad2d09af337f516a51b091a0ba57afa

                            SHA512

                            9304f0e2cce47bf512df0b908efb6b17595a4b6654f010f6f537e37abcbfc52d88312a230ae4affd5b239aee64c53d0df8ac0c79a9a5d53ae2898957c0411f00

                          • C:\Windows\{F82EA265-1CF5-444b-995C-573AAC461625}.exe

                            Filesize

                            380KB

                            MD5

                            9a2514778553238c7e8a8819af1e97bc

                            SHA1

                            f8c8063ac41fdf32d0b15e44c7cf1adbecc5df4f

                            SHA256

                            fa88e3b27adce295568a5e5feedb44b5641d1e3a5a9154c5f0f97ce2d541c418

                            SHA512

                            044dd2f5b4a99cdfd76d0399f6543365f6079875ff54b210eb9a3cd96482fc2cb3e513e5a3af6d6e4dddcbbde83fb9128568461d8a15acc6ed7fd65ffba92fde