Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17/04/2024, 02:39

General

  • Target

    2024-04-17_97a782d8b0a7402b28c7e618310a8ddc_goldeneye.exe

  • Size

    216KB

  • MD5

    97a782d8b0a7402b28c7e618310a8ddc

  • SHA1

    454ca0ba92c192145b9c7bdc12c9ecaf7163f089

  • SHA256

    ff826b09fbc2df8659ddf31569675fcf7948253175110f0abbb6bca4f4bb4543

  • SHA512

    3c6c60edd6b647c28e10ca601362177a6227d6a33de7607c3b9ecd429bdf128dfc8438440f6d9c4d77f0e4ef4f9ce83dc38901baded4893702d13c029745f5a9

  • SSDEEP

    3072:jEGh0oxl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMUy:jEG3lEeKcAEcGy

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-17_97a782d8b0a7402b28c7e618310a8ddc_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-17_97a782d8b0a7402b28c7e618310a8ddc_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2844
    • C:\Windows\{9F4125B8-31F9-4e93-B8C8-9485D1B498F2}.exe
      C:\Windows\{9F4125B8-31F9-4e93-B8C8-9485D1B498F2}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2780
      • C:\Windows\{D87F2E21-BF90-4735-BC21-8FA519C2EFFD}.exe
        C:\Windows\{D87F2E21-BF90-4735-BC21-8FA519C2EFFD}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2504
        • C:\Windows\{CC7883D1-D76D-4091-A508-FA0BBCB73652}.exe
          C:\Windows\{CC7883D1-D76D-4091-A508-FA0BBCB73652}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2364
          • C:\Windows\{09A5234E-CB8F-4767-BDF3-3C7CF9A1CEB8}.exe
            C:\Windows\{09A5234E-CB8F-4767-BDF3-3C7CF9A1CEB8}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2336
            • C:\Windows\{E28D3203-8296-42b9-B602-286772860395}.exe
              C:\Windows\{E28D3203-8296-42b9-B602-286772860395}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1488
              • C:\Windows\{D0355316-283D-49e2-915C-ED47CC63BDA1}.exe
                C:\Windows\{D0355316-283D-49e2-915C-ED47CC63BDA1}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2736
                • C:\Windows\{43F0D561-DF03-4bb5-998F-24A2DD138545}.exe
                  C:\Windows\{43F0D561-DF03-4bb5-998F-24A2DD138545}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2104
                  • C:\Windows\{1002196C-014B-49d9-8723-572E35DA31A3}.exe
                    C:\Windows\{1002196C-014B-49d9-8723-572E35DA31A3}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2632
                    • C:\Windows\{4E5CF75B-37F4-4215-BFF4-6FC8759A83EA}.exe
                      C:\Windows\{4E5CF75B-37F4-4215-BFF4-6FC8759A83EA}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1360
                      • C:\Windows\{ACCE3363-1DFF-4c6a-9B8F-5CBB35A9613D}.exe
                        C:\Windows\{ACCE3363-1DFF-4c6a-9B8F-5CBB35A9613D}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2228
                        • C:\Windows\{59C8E642-5C12-4292-AE4F-045E6B2C4E21}.exe
                          C:\Windows\{59C8E642-5C12-4292-AE4F-045E6B2C4E21}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:2256
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{ACCE3~1.EXE > nul
                          12⤵
                            PID:2076
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{4E5CF~1.EXE > nul
                          11⤵
                            PID:2004
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{10021~1.EXE > nul
                          10⤵
                            PID:1804
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{43F0D~1.EXE > nul
                          9⤵
                            PID:1728
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{D0355~1.EXE > nul
                          8⤵
                            PID:1344
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{E28D3~1.EXE > nul
                          7⤵
                            PID:2420
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{09A52~1.EXE > nul
                          6⤵
                            PID:2660
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{CC788~1.EXE > nul
                          5⤵
                            PID:1524
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{D87F2~1.EXE > nul
                          4⤵
                            PID:2424
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{9F412~1.EXE > nul
                          3⤵
                            PID:2608
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:1976

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\{09A5234E-CB8F-4767-BDF3-3C7CF9A1CEB8}.exe

                        Filesize

                        216KB

                        MD5

                        6b5baaebb953824c74c366dc3b24047f

                        SHA1

                        6ef2cb916a6b0ca4d464db45717afb96b36fb2a1

                        SHA256

                        ee4f6df86f2b794697b203eda5f1bb28751ad25553d99eb3bc150cb2469c2c5d

                        SHA512

                        be5f1ed125c2ee98848eecf3ab447d9ca05f90cc0b8173930b647177eb4daa76f3304021895329fd14dca34dfc385687269e611230a43b96cb0631f040baa907

                      • C:\Windows\{1002196C-014B-49d9-8723-572E35DA31A3}.exe

                        Filesize

                        216KB

                        MD5

                        e3a6bd7924161921f0c977848ec3bb18

                        SHA1

                        bce67a2c35c304c83e3d02aca30d6f4bedf0b41f

                        SHA256

                        a1fa8b0a79c3b917c6d3a3a2b53a3d01c46a4737f0cbf5604d7a3dbe85c54dff

                        SHA512

                        8598db13fa1dd3909429d2fade3807c38f14813090d22b262d105011e10fcea58882d4a81143c5b966346cc567aa52fd040398a2a806e20d03f13caf569093f8

                      • C:\Windows\{43F0D561-DF03-4bb5-998F-24A2DD138545}.exe

                        Filesize

                        216KB

                        MD5

                        e4dea4d8915ca86a0f8bfa8fcc4cfad4

                        SHA1

                        4a0d223256c011eb7497d347c54daf9c81d05212

                        SHA256

                        afa211a801e8102efc4dac893b3cdad52216a717092682e66f44de770ce14ebe

                        SHA512

                        f6eb2454498ac7a11fb43f90e1b7b3170f4732382b2accb05a36213df223a637480755ee7145df20354ff9c6c67dd899161fb0c25c36c0aa04d8e55aabdae038

                      • C:\Windows\{4E5CF75B-37F4-4215-BFF4-6FC8759A83EA}.exe

                        Filesize

                        216KB

                        MD5

                        9a031c8832df78e4bf468007128e3bb2

                        SHA1

                        762823a74a9d32b04ebc511ab7a9d4b725cd8b01

                        SHA256

                        5290801e16b9907151018a7c12594cff8788fc5dbceb9a85a4ac6a262de37e98

                        SHA512

                        10af691e634690d1cb828f4e1ba5036e102b3e2bb2e34b547499326d59d70083c90fa2b771c855f7311b68b19cd255baac81242591a5c9a7aa196d65e8d5c70f

                      • C:\Windows\{59C8E642-5C12-4292-AE4F-045E6B2C4E21}.exe

                        Filesize

                        216KB

                        MD5

                        3b4a7f0c4e84d3646e101199c85be96c

                        SHA1

                        cfe80773f48c7651ee8e5fde9402f8c4c2387d67

                        SHA256

                        efe27a3f995e8bd4c72616f30e1e5b84825c0c42e585a496fc78f441dc01f035

                        SHA512

                        7b501f3e0a6e1b40483f222869fdc819db526e60a7b8e98f64337cc84f3a7db79f4a4b98e3339209f844aa41d8549bf6f5e0153df16dc1c7eb20a0a6b4a530d0

                      • C:\Windows\{9F4125B8-31F9-4e93-B8C8-9485D1B498F2}.exe

                        Filesize

                        216KB

                        MD5

                        d6b01aec91969fae44720303d9a95ef7

                        SHA1

                        deb4c26ef5e83e16d12fed6d56d67652c80d325f

                        SHA256

                        ca38985f1068b69bc343028e17cf8308f5b2bc710e5cd8968c5388788c1fc3e4

                        SHA512

                        f56a53bfd367a4530783095e1842d479e801b4f3adfa144cbfc17c89bf5a57a57d5b6a8008401d096a06a6eb4a158cbd7640819841f12892c089ce9b9baa2fa4

                      • C:\Windows\{ACCE3363-1DFF-4c6a-9B8F-5CBB35A9613D}.exe

                        Filesize

                        216KB

                        MD5

                        c68d9ac4f8a088b719334dcfbcde7c63

                        SHA1

                        b5bf8c6fcd978fee071b03021d8d3f7d6d63b03b

                        SHA256

                        34386f5621fd9f3c919bd55759e0f3422296697cc829e59636a8ab3bf32c2eb7

                        SHA512

                        be786505aefdfc950de25f9c51e501b30f4b67bae67da14945b2b817200fa7079a4276a477b5a32f1993c4a17e721fd3a31ab17ec4911ba83460bf79b0286a0e

                      • C:\Windows\{CC7883D1-D76D-4091-A508-FA0BBCB73652}.exe

                        Filesize

                        216KB

                        MD5

                        b9ada6c37079cb9bc2839e07acce5526

                        SHA1

                        16776f72c9350dd6f28d3a101a7f9840e50aaf3c

                        SHA256

                        a1f8b783d217b87fb0ef9543eac25fbc001672a897ad453f3808f61e93789e41

                        SHA512

                        297d92376d881347a56026107ba70ee336d09dbbcd152bfe0b58a7179958b27a24d55903105c257ae76671d13e13c351863592b216e2f638c5085a78b691d56e

                      • C:\Windows\{D0355316-283D-49e2-915C-ED47CC63BDA1}.exe

                        Filesize

                        216KB

                        MD5

                        16e43bc5b47377c8422f0361ae480535

                        SHA1

                        064eb085f28a1f3ca450b34ca5d13e164bc1da81

                        SHA256

                        77aae83b487a443c218f0ded8ce76a8159969f2069c76cf3c03574050d588994

                        SHA512

                        6f1380bb1cfcd3066d53812b1f81afa89b8fa6f4668fc84282ffa918871646f6c2c777fba4c6de063d1923c283282a637110fbf98bb586c31378580650bb4dcd

                      • C:\Windows\{D87F2E21-BF90-4735-BC21-8FA519C2EFFD}.exe

                        Filesize

                        216KB

                        MD5

                        1fc935b6078052d51a689a04c464effe

                        SHA1

                        ea536badbea8a9bd28920c0ca83d8204d1c50473

                        SHA256

                        d8454747276b845bda0160d8844854308bfcc776e273578051b50f332317437f

                        SHA512

                        095f13999dee486ef5d76a5ece91e72e231493421076924c1d72b7d5a0ad2d0eca488921c422c7a45957109aed2f03f0954897c4a150a44cd79b85a51d5a2411

                      • C:\Windows\{E28D3203-8296-42b9-B602-286772860395}.exe

                        Filesize

                        216KB

                        MD5

                        852a9b6fe96f1cc0d6d85f17d0fad455

                        SHA1

                        e76cf95ea36d62772a7f7afa91c3a0f16a70fc7f

                        SHA256

                        374cee1da738488d0d74d93e193dd1d68fbda909c2a907629d33ac177586d473

                        SHA512

                        3acecf4ea7047308dbebeee839999c3b6f427d6dfcd67be77a1bee1f0507940cdec062cb06c199209073d2646ee2dd2dc0c2340e60d3180afe6e20bb74217f58