Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    184s
  • max time network
    198s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/04/2024, 12:26 UTC

General

  • Target

    2024-04-19_19ff94abde1f2f976ede0fb076ba666d_goldeneye.exe

  • Size

    197KB

  • MD5

    19ff94abde1f2f976ede0fb076ba666d

  • SHA1

    30d997c7010e392248833444410a3680f8a80b71

  • SHA256

    1ee7387805bdfdb6d145033d4c5df25235eb204f81699ff69613b840922f8c52

  • SHA512

    2890da9ceddbc6528107eb161f876cfaed015e1e1084320d4e4254cc5cc02559927e252d5494db366e61f155e6f8965415bb074c5bc43814809a4202eca87865

  • SSDEEP

    3072:jEGh0orl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEG5lEeKcAEca

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 12 IoCs
  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-19_19ff94abde1f2f976ede0fb076ba666d_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-19_19ff94abde1f2f976ede0fb076ba666d_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1576
    • C:\Windows\{9A0CAE39-2449-451d-AE4A-6E5D864D8F53}.exe
      C:\Windows\{9A0CAE39-2449-451d-AE4A-6E5D864D8F53}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2332
      • C:\Windows\{3F7111A3-46E4-4f5b-A7C7-9ACF72E84180}.exe
        C:\Windows\{3F7111A3-46E4-4f5b-A7C7-9ACF72E84180}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1212
        • C:\Windows\{C6E9C362-9604-4c7c-A314-79C4AEF14A49}.exe
          C:\Windows\{C6E9C362-9604-4c7c-A314-79C4AEF14A49}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1452
          • C:\Windows\{980DB619-CA53-4e06-948D-65CF7FDD0D4E}.exe
            C:\Windows\{980DB619-CA53-4e06-948D-65CF7FDD0D4E}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4672
            • C:\Windows\{1F4E9740-C2CB-4b8c-8031-0788DC952F2E}.exe
              C:\Windows\{1F4E9740-C2CB-4b8c-8031-0788DC952F2E}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2616
              • C:\Windows\{C0A4B8F7-CF71-49f4-B27C-AD6900E31301}.exe
                C:\Windows\{C0A4B8F7-CF71-49f4-B27C-AD6900E31301}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2476
                • C:\Windows\{094980D5-1F39-4db5-9A85-BBDCE5B09747}.exe
                  C:\Windows\{094980D5-1F39-4db5-9A85-BBDCE5B09747}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:3676
                  • C:\Windows\{18C202B6-181B-4b02-8D9A-ED6E6E97B850}.exe
                    C:\Windows\{18C202B6-181B-4b02-8D9A-ED6E6E97B850}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:4288
                    • C:\Windows\{C211656F-0786-4e1b-8FCA-FBB822549A1D}.exe
                      C:\Windows\{C211656F-0786-4e1b-8FCA-FBB822549A1D}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:1652
                      • C:\Windows\{98DB313B-9256-495f-93F3-D5D708E97724}.exe
                        C:\Windows\{98DB313B-9256-495f-93F3-D5D708E97724}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:436
                        • C:\Windows\{C98680E7-A790-4e4d-A23C-3B7DF7F08700}.exe
                          C:\Windows\{C98680E7-A790-4e4d-A23C-3B7DF7F08700}.exe
                          12⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4884
                          • C:\Windows\{6D8EDDEC-F1DB-478f-A169-E1163CD7D4AA}.exe
                            C:\Windows\{6D8EDDEC-F1DB-478f-A169-E1163CD7D4AA}.exe
                            13⤵
                            • Executes dropped EXE
                            PID:2252
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{C9868~1.EXE > nul
                            13⤵
                              PID:2332
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{98DB3~1.EXE > nul
                            12⤵
                              PID:1576
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{C2116~1.EXE > nul
                            11⤵
                              PID:3200
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{18C20~1.EXE > nul
                            10⤵
                              PID:4040
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{09498~1.EXE > nul
                            9⤵
                              PID:2360
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{C0A4B~1.EXE > nul
                            8⤵
                              PID:4236
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{1F4E9~1.EXE > nul
                            7⤵
                              PID:4196
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{980DB~1.EXE > nul
                            6⤵
                              PID:1196
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{C6E9C~1.EXE > nul
                            5⤵
                              PID:4080
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{3F711~1.EXE > nul
                            4⤵
                              PID:3380
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{9A0CA~1.EXE > nul
                            3⤵
                              PID:2252
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                            2⤵
                              PID:432

                          Network

                          • flag-us
                            DNS
                            79.121.231.20.in-addr.arpa
                            Remote address:
                            8.8.8.8:53
                            Request
                            79.121.231.20.in-addr.arpa
                            IN PTR
                            Response
                          • flag-us
                            DNS
                            86.23.85.13.in-addr.arpa
                            Remote address:
                            8.8.8.8:53
                            Request
                            86.23.85.13.in-addr.arpa
                            IN PTR
                            Response
                          • flag-us
                            DNS
                            82.90.14.23.in-addr.arpa
                            Remote address:
                            8.8.8.8:53
                            Request
                            82.90.14.23.in-addr.arpa
                            IN PTR
                            Response
                            82.90.14.23.in-addr.arpa
                            IN PTR
                            a23-14-90-82deploystaticakamaitechnologiescom
                          • flag-us
                            DNS
                            84.177.190.20.in-addr.arpa
                            Remote address:
                            8.8.8.8:53
                            Request
                            84.177.190.20.in-addr.arpa
                            IN PTR
                            Response
                          • flag-us
                            DNS
                            15.164.165.52.in-addr.arpa
                            Remote address:
                            8.8.8.8:53
                            Request
                            15.164.165.52.in-addr.arpa
                            IN PTR
                            Response
                          • flag-us
                            DNS
                            9.228.82.20.in-addr.arpa
                            Remote address:
                            8.8.8.8:53
                            Request
                            9.228.82.20.in-addr.arpa
                            IN PTR
                            Response
                          • flag-us
                            DNS
                            132.250.30.184.in-addr.arpa
                            Remote address:
                            8.8.8.8:53
                            Request
                            132.250.30.184.in-addr.arpa
                            IN PTR
                            Response
                            132.250.30.184.in-addr.arpa
                            IN PTR
                            a184-30-250-132deploystaticakamaitechnologiescom
                          • flag-us
                            DNS
                            24.139.73.23.in-addr.arpa
                            Remote address:
                            8.8.8.8:53
                            Request
                            24.139.73.23.in-addr.arpa
                            IN PTR
                            Response
                            24.139.73.23.in-addr.arpa
                            IN PTR
                            a23-73-139-24deploystaticakamaitechnologiescom
                          • flag-us
                            DNS
                            13.227.111.52.in-addr.arpa
                            Remote address:
                            8.8.8.8:53
                            Request
                            13.227.111.52.in-addr.arpa
                            IN PTR
                            Response
                          • flag-us
                            DNS
                            88.16.208.104.in-addr.arpa
                            Remote address:
                            8.8.8.8:53
                            Request
                            88.16.208.104.in-addr.arpa
                            IN PTR
                            Response
                          • 23.53.113.159:80
                            138 B
                            3
                          • 8.8.8.8:53
                            79.121.231.20.in-addr.arpa
                            dns
                            72 B
                            158 B
                            1
                            1

                            DNS Request

                            79.121.231.20.in-addr.arpa

                          • 8.8.8.8:53
                            86.23.85.13.in-addr.arpa
                            dns
                            70 B
                            144 B
                            1
                            1

                            DNS Request

                            86.23.85.13.in-addr.arpa

                          • 8.8.8.8:53
                            82.90.14.23.in-addr.arpa
                            dns
                            70 B
                            133 B
                            1
                            1

                            DNS Request

                            82.90.14.23.in-addr.arpa

                          • 8.8.8.8:53
                            84.177.190.20.in-addr.arpa
                            dns
                            72 B
                            158 B
                            1
                            1

                            DNS Request

                            84.177.190.20.in-addr.arpa

                          • 8.8.8.8:53
                            15.164.165.52.in-addr.arpa
                            dns
                            72 B
                            146 B
                            1
                            1

                            DNS Request

                            15.164.165.52.in-addr.arpa

                          • 8.8.8.8:53
                            9.228.82.20.in-addr.arpa
                            dns
                            70 B
                            156 B
                            1
                            1

                            DNS Request

                            9.228.82.20.in-addr.arpa

                          • 8.8.8.8:53
                            132.250.30.184.in-addr.arpa
                            dns
                            73 B
                            139 B
                            1
                            1

                            DNS Request

                            132.250.30.184.in-addr.arpa

                          • 8.8.8.8:53
                            24.139.73.23.in-addr.arpa
                            dns
                            71 B
                            135 B
                            1
                            1

                            DNS Request

                            24.139.73.23.in-addr.arpa

                          • 8.8.8.8:53
                            13.227.111.52.in-addr.arpa
                            dns
                            72 B
                            158 B
                            1
                            1

                            DNS Request

                            13.227.111.52.in-addr.arpa

                          • 8.8.8.8:53
                            88.16.208.104.in-addr.arpa
                            dns
                            72 B
                            146 B
                            1
                            1

                            DNS Request

                            88.16.208.104.in-addr.arpa

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Windows\{094980D5-1F39-4db5-9A85-BBDCE5B09747}.exe

                            Filesize

                            197KB

                            MD5

                            827303aaafe6b70ea01ab16c806ff622

                            SHA1

                            4a4d661548bfc7a48fa2907f44a9c56e1aee0761

                            SHA256

                            e743dc711fe3f348538ce67dd6282735f3b6ca1194a0196bb4d4cff081a462aa

                            SHA512

                            9999e46b453cafc9f6029e4ca35bb233c867ceade1e55ce7d9f2d697a585fa38dfa9de15acf7e20ab4a117648faa11f0a3213e020e09384e040e63b844a405c4

                          • C:\Windows\{18C202B6-181B-4b02-8D9A-ED6E6E97B850}.exe

                            Filesize

                            197KB

                            MD5

                            28d539f404840bea1206ef34dd67d597

                            SHA1

                            8531b3b6da5bb0ae64a2b627e26a428475dfc9ea

                            SHA256

                            ffceb64774c8e808a96e8dd085d0e03b1f4227eeaf0b938b379926e8896f0d36

                            SHA512

                            82cd39d2f8817f55de98b75a928e784ef93731144759aa114929338fb8aa2f872bed92604d2ef4a07c41dd5feae06612436392fe9b3cc7236cabb8f32189c4a8

                          • C:\Windows\{1F4E9740-C2CB-4b8c-8031-0788DC952F2E}.exe

                            Filesize

                            197KB

                            MD5

                            9a9bbb3cf7956289a39e26fc938dc9a6

                            SHA1

                            eb7c64231c23105246d3347aa6078a239c009a4f

                            SHA256

                            74f1634519deefeac7a13e87ec5675a10b8539eb157cbf74c1607fde9617917f

                            SHA512

                            1bf9278bc2f16d09c25fef119ca01985af14fe7b7a0f044362fac13108adcc07e3f0d9a39c2edbd86759219c8a1f8b90eea05e540126aae03dbcb9e401593bd5

                          • C:\Windows\{3F7111A3-46E4-4f5b-A7C7-9ACF72E84180}.exe

                            Filesize

                            197KB

                            MD5

                            2973ae9df8de3944391e001380ecd325

                            SHA1

                            9e184350a37b7bd7f62ff8d489bc76dc176bfe51

                            SHA256

                            539f46a1ac5d92330e061849923f2d8a6fe1a2c58f2f6d0f2ec6c6812ce76655

                            SHA512

                            c269794d6812d498b6d3e08118f471f43b52d578f56b09f1b6536668d76f1eb63d4a861c96b406570669df6b6e123502b2fd685ef3fd431d87d3a1078f32fbef

                          • C:\Windows\{6D8EDDEC-F1DB-478f-A169-E1163CD7D4AA}.exe

                            Filesize

                            197KB

                            MD5

                            7571ee91d37360c49829b59845f38185

                            SHA1

                            1428aeada647c101f9801d36d5a0a17640fa2aab

                            SHA256

                            b77db16ff3bd31f0fa3e132015b63e4ef26bbd471d0b546260a4d0b25a4adf38

                            SHA512

                            06c8138ea87fdae1cd18b61c46611b100b88176d081856d03ccabebc9ca5e8c41a23bad739a2bce37ca282ae6ead32c5ec64e8c452780ae64f8fc3e0a37ba8f4

                          • C:\Windows\{980DB619-CA53-4e06-948D-65CF7FDD0D4E}.exe

                            Filesize

                            197KB

                            MD5

                            cfbf8f84c9c4efd9c8c400ab62196a3a

                            SHA1

                            db696d319733e911f75a603032867d9a91da2f7a

                            SHA256

                            90aa3c18714936809158603298f47341b7e3d35ffbef99b8546d31747d1654ed

                            SHA512

                            3b4f05c2da90fbda89cdae18428c5d82d1524c66bcc17d0050028e3edd42d9d70645fca4a74200587c7c7925815a75b5aae8cca77f28900fff47c1696e3a9baa

                          • C:\Windows\{98DB313B-9256-495f-93F3-D5D708E97724}.exe

                            Filesize

                            197KB

                            MD5

                            c3bba18e7c1416930bbe74aeb48f9493

                            SHA1

                            12ff3f9f0c1c05a21660c4c64d463ea6dd06b6c6

                            SHA256

                            856b87f07978362fc4f590526fcda1af2d03cb395039789fe399b7f41d3b2911

                            SHA512

                            f3039b247fbd05b64f2a01ba55f898143b077a96cef6959dafb1d652f9b1cbe08d44edb3c001c9c11604be6d3911a784f6746c0b2406acfdf7276ffa4cc53d8d

                          • C:\Windows\{9A0CAE39-2449-451d-AE4A-6E5D864D8F53}.exe

                            Filesize

                            197KB

                            MD5

                            76791d9464b1e05dd454d09e24ab2f98

                            SHA1

                            cafc2df067a80a0e701a918deaf6e1f0ce770aa7

                            SHA256

                            d84b319177b6733a5f04bc68e152955c52ea1c479d8faf48b29449a0517e038d

                            SHA512

                            daf4f707124928ae6ef0c01aa4d777ceb7a31c48a4aaf981e91973fd1134703091e0507f248ef1d18ff6a6ea0d296ca2fba5cc9c9c037b7ea25465fc8115a237

                          • C:\Windows\{C0A4B8F7-CF71-49f4-B27C-AD6900E31301}.exe

                            Filesize

                            197KB

                            MD5

                            966d00944a946fc4ec08f0d4c981dc97

                            SHA1

                            ea21b0e78710f8cacc2f6d13aa9a9b040830c791

                            SHA256

                            456e32d7246122985280bfbf62545516909ee8f309fe6523e143a2f0d97364aa

                            SHA512

                            31e5175f43c3c7f4d9f7f010a7d724e0d7bb483bd3d60f31da5070b9edff64e5fb7259ac73d901847491873dcbe697f50f1d7baee2b368d6a5dbd5e00d6d91fe

                          • C:\Windows\{C211656F-0786-4e1b-8FCA-FBB822549A1D}.exe

                            Filesize

                            197KB

                            MD5

                            e82235eeb66e0b8f81a2548a0d6063c6

                            SHA1

                            ce5f4d6b1e85ef06510c54141089d4e4aacf6c49

                            SHA256

                            b7445819529b717ac28d7ec70baa2997ea0c8cc863f1a072c90b447ebd15fb53

                            SHA512

                            eef698ad04f5a0ba1336498a56193aebdf71f2f97f7a6ad9b4255f2c568e7e7e230ac5edf68334945ebbb14cfcc503801de1d374e0f579885b42d2542035992e

                          • C:\Windows\{C6E9C362-9604-4c7c-A314-79C4AEF14A49}.exe

                            Filesize

                            197KB

                            MD5

                            282d311e01faaa037f0c99ca7c7b87f3

                            SHA1

                            5e3bd006f7fb5bb75b8db24958a9d6526bea5418

                            SHA256

                            ef9a12b3b04dda1092be2719ef4824641559585eb7363ce26b9401339bb2ff61

                            SHA512

                            0d14332cd8cd50b6b5bf546084e6a3c94a5be53eeb150d8e182fbf8ba78f4174ab307192ae63f06ccf1e80b8a319cabd9df53d1172babcf93ada711baf1fbd95

                          • C:\Windows\{C98680E7-A790-4e4d-A23C-3B7DF7F08700}.exe

                            Filesize

                            197KB

                            MD5

                            4bcbc135edb87626e766d364fe684b45

                            SHA1

                            6be0e25651a3cbeebb672abdb73bbec809d61b02

                            SHA256

                            155e6ff609614aa9d7d61f657b20e98fc9038419102f3e255a4315b5b57cc1b7

                            SHA512

                            7957dd9506d1b2a5514d55db3c77ff487422ff4f2f7b7c44d1b9a80a9fcda9ca51ebeddf44afc4012738d502208f99eaeac158a0614d07cefd93b121ea32f44d

                          We care about your privacy.

                          This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.