Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    157s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/04/2024, 10:34

General

  • Target

    2024-04-20_1be85fc73534ed8bf5202dcfe75ca233_goldeneye.exe

  • Size

    408KB

  • MD5

    1be85fc73534ed8bf5202dcfe75ca233

  • SHA1

    79b7f5098f40f72c7d32b6f8ff74b13fb4975bab

  • SHA256

    85a083fbef249b1262b39e78a6466f1fc2f0584455d71eab1dd19fedbdace727

  • SHA512

    6e1b8a34300ccc265c0bcc560b84b248bac1e2a8bad4748b1098958c16722d24cc7f420b53a7717cfb654a48d45a1ff8a2506a21c97b77a1715db69b5c774864

  • SSDEEP

    3072:CEGh0ofl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBft:CEGRldOe2MUVg3vTeKcAEciTBqr3jy9

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-20_1be85fc73534ed8bf5202dcfe75ca233_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-20_1be85fc73534ed8bf5202dcfe75ca233_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5100
    • C:\Windows\{BB84690D-8814-4fec-A338-77CBB5797E39}.exe
      C:\Windows\{BB84690D-8814-4fec-A338-77CBB5797E39}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3480
      • C:\Windows\{9CAA2A7C-4667-4e41-BC03-BBBD25F400B2}.exe
        C:\Windows\{9CAA2A7C-4667-4e41-BC03-BBBD25F400B2}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2304
        • C:\Windows\{A0EECDC8-9472-43f2-8F0A-B3C54298D360}.exe
          C:\Windows\{A0EECDC8-9472-43f2-8F0A-B3C54298D360}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4572
          • C:\Windows\{D62CCBDF-767F-4183-A6E5-6908E8D347A8}.exe
            C:\Windows\{D62CCBDF-767F-4183-A6E5-6908E8D347A8}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4052
            • C:\Windows\{57A5A87E-76A9-4083-A74E-D4BEF22435C7}.exe
              C:\Windows\{57A5A87E-76A9-4083-A74E-D4BEF22435C7}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:752
              • C:\Windows\{0A177BF9-9D96-4a17-A957-A3A5068D2C63}.exe
                C:\Windows\{0A177BF9-9D96-4a17-A957-A3A5068D2C63}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4320
                • C:\Windows\{940690B0-67F4-444c-B9E2-16E872E45BA2}.exe
                  C:\Windows\{940690B0-67F4-444c-B9E2-16E872E45BA2}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2740
                  • C:\Windows\{4582B23F-C8B4-4b12-8B7F-2A2D82705263}.exe
                    C:\Windows\{4582B23F-C8B4-4b12-8B7F-2A2D82705263}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:1684
                    • C:\Windows\{415F6A98-6E22-47ef-8B7C-779CAA45E45C}.exe
                      C:\Windows\{415F6A98-6E22-47ef-8B7C-779CAA45E45C}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:3152
                      • C:\Windows\{CB8FBA7A-90B6-46ec-BC62-ACBA029EC171}.exe
                        C:\Windows\{CB8FBA7A-90B6-46ec-BC62-ACBA029EC171}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:2660
                        • C:\Windows\{9B5DB931-14A8-4ca1-934F-8D236CC7B7DC}.exe
                          C:\Windows\{9B5DB931-14A8-4ca1-934F-8D236CC7B7DC}.exe
                          12⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3964
                          • C:\Windows\{572393E5-D545-4da9-B67F-16A43899F7E6}.exe
                            C:\Windows\{572393E5-D545-4da9-B67F-16A43899F7E6}.exe
                            13⤵
                              PID:2976
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{CB8FB~1.EXE > nul
                            12⤵
                              PID:4176
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{415F6~1.EXE > nul
                            11⤵
                              PID:3408
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{4582B~1.EXE > nul
                            10⤵
                              PID:1836
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{94069~1.EXE > nul
                            9⤵
                              PID:496
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{0A177~1.EXE > nul
                            8⤵
                              PID:2752
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{57A5A~1.EXE > nul
                            7⤵
                              PID:4384
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{D62CC~1.EXE > nul
                            6⤵
                              PID:5012
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{A0EEC~1.EXE > nul
                            5⤵
                              PID:4800
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{9CAA2~1.EXE > nul
                            4⤵
                              PID:4876
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{BB846~1.EXE > nul
                            3⤵
                              PID:1032
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                            2⤵
                              PID:4212
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3692 --field-trial-handle=2244,i,11878111470816612087,2265290141962607370,262144 --variations-seed-version /prefetch:8
                            1⤵
                              PID:2300

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Windows\{0A177BF9-9D96-4a17-A957-A3A5068D2C63}.exe

                              Filesize

                              408KB

                              MD5

                              3731f8dc29aa2e25aacb82f5341fabfa

                              SHA1

                              1ff6a78891f9524caf27a3157b7350d2a77cdf37

                              SHA256

                              0e336f16fc777d8065adc769f353022a822cb2c9a8ec92d0abb623083d7fb98c

                              SHA512

                              ebdbac88507dc3db9b7da729f8c980b9fa71db4a5923012a17ca17088de607be8f763947a5f5a9c60bb2a13195ec8fa45e3ecd2bd9c956b655dfa1ff61b9bd64

                            • C:\Windows\{415F6A98-6E22-47ef-8B7C-779CAA45E45C}.exe

                              Filesize

                              408KB

                              MD5

                              9928a5b1755c6fc6124b391963129511

                              SHA1

                              ed99b8b797a0f11bbdf08c5f78b80fefe73f3842

                              SHA256

                              580d797d809377bbe12afd7e732b6664a36bfc6776aa107854245ed860289007

                              SHA512

                              422ed82712fe366f176da8638d0827e82565e8d1b4f4da2f4f5979e13ac6419611dd67ff023d5440ceb77aa902ac4f21853ba9b2bdbdee9cd8a55ca14f7153a8

                            • C:\Windows\{4582B23F-C8B4-4b12-8B7F-2A2D82705263}.exe

                              Filesize

                              408KB

                              MD5

                              53260a3f6ba2aac6449b2f8ed150d260

                              SHA1

                              fe00e89800d3c2ece28329ac7bb933069686b5de

                              SHA256

                              f2a651482df692fbd634ebd687b5d6b0ce537005d9461c64b11a85cd986ebbd4

                              SHA512

                              dc12cad85b5165776aefcf45a949fb3b2a5b8518d7d2b0ce49241490b320b37ca3ea74f97fddf57c6691c24ab20b313268647dc0380279910bf76bf17b0f6813

                            • C:\Windows\{57A5A87E-76A9-4083-A74E-D4BEF22435C7}.exe

                              Filesize

                              408KB

                              MD5

                              e99206b6c2a283c7332aef02548ab06e

                              SHA1

                              f998a8033893506696ce4a68a72c01061e32f1b9

                              SHA256

                              a72b933e48365ebec9d42b17dc8f6653cee6a402b6de405b6c969e4715be7f19

                              SHA512

                              98dab963b4e4e477bbe58e241e22c2e039aa6dfc6d8825734add11de0bcaa27a70f6397cf6b2f8131395fbc7b812a9f6c9fc64e9cb27d342b1469cd65a45a6a1

                            • C:\Windows\{940690B0-67F4-444c-B9E2-16E872E45BA2}.exe

                              Filesize

                              408KB

                              MD5

                              a9a4cc84a6b89bb09b549ddf17fb27f5

                              SHA1

                              4edb24a9ebb5c14ba6d2e88c04acbb89698b76e3

                              SHA256

                              3264cc7cf72ae6047ad3cd4e9912d1353f3103a0c9463c8e3afc9e418ffa525c

                              SHA512

                              135df943020f0420ebd49b3ea2b7ec9abe0b1fe74ddaac9bc1e21652656f098defa5d77ef52cc47c2ff809969eba0b352f95d1517a8c68b71f462a1ab7049a14

                            • C:\Windows\{9B5DB931-14A8-4ca1-934F-8D236CC7B7DC}.exe

                              Filesize

                              408KB

                              MD5

                              4c940efe91a9e4ea4b185c718e924e39

                              SHA1

                              4a30ff01e2c7038b4216935b3e8b637aad29cec4

                              SHA256

                              6f10f78ebff375e6cb852e49012fefa0f7bbf30f88c2b45316123199ce6b14ec

                              SHA512

                              c66974f97e214e505a069321ae42f325ad4280be999165b32980388895c15919ab0ed52adb723e11ed9b21381f8b210aec6a3f58d14946c2fefe85eca47e8c37

                            • C:\Windows\{9CAA2A7C-4667-4e41-BC03-BBBD25F400B2}.exe

                              Filesize

                              408KB

                              MD5

                              4f082df8b001ee1ec1686cef19c0abed

                              SHA1

                              28efddab7ea5541da27db87a83b353e3f7f1fac1

                              SHA256

                              bcb867f42b31ae412923645c6deb9ea22a2c9c75dd886a3c2e41b4a149e5e53c

                              SHA512

                              afe44990994ea2089f374dba55f44cf03d9f760676df3907ffdeaa82c9984920eb412cc8fcc30372ed58230f69381657cd143424b23c774afbf93740dc64f540

                            • C:\Windows\{A0EECDC8-9472-43f2-8F0A-B3C54298D360}.exe

                              Filesize

                              408KB

                              MD5

                              5314a3db57dba7da15d781ae725ae3c0

                              SHA1

                              53c4a7c5cb1a7bb838cd36820fc6588b605cceea

                              SHA256

                              4247daba9bf9285ec498cbc885793e7e9f204847f6c1ae0851021d42bbd2de64

                              SHA512

                              7aa0c9bd8ec0034833c6b9c642ffb4d7c3c96bbf922ab9a3b1f93b36eccf83ae65bc6e1fc7ac6cdefd24570eeb3189a6a10d6a617618f2b5723a4965d86fc4a0

                            • C:\Windows\{BB84690D-8814-4fec-A338-77CBB5797E39}.exe

                              Filesize

                              408KB

                              MD5

                              80022cb39548d57c2de95ce30999e9e5

                              SHA1

                              f7779515a5fde59caba85cc72dfc01ec5dc08fd2

                              SHA256

                              c222b68b7660a92a4ca91248639507d6d841a1e02aa26853ecc6612e6b886d81

                              SHA512

                              eddbecd2583dc5ffcbccfde22b1aea430d8950a9b75e4db10b55a80da1fd5f54433b53f48f0b555cd3776fced609be78050c1043c8eb3fcf3e8c8bcb8150530d

                            • C:\Windows\{CB8FBA7A-90B6-46ec-BC62-ACBA029EC171}.exe

                              Filesize

                              408KB

                              MD5

                              2411df9ab177ec60847a6d825ad26851

                              SHA1

                              dd13477a2a85947113128500c8b623eaa2ce2ff6

                              SHA256

                              43a4ae492fabb65d2bb961a327254f2c249a18b333205a773fd530d7c2237718

                              SHA512

                              73d6f641d405f6f81ba6e8d9f6e34a15617d8f59911c52009bc2e7fb0f07fb8a9979d414e2e88d736887e1221054afcf81f1408ac5c5d99fc175b4c83a663853

                            • C:\Windows\{D62CCBDF-767F-4183-A6E5-6908E8D347A8}.exe

                              Filesize

                              408KB

                              MD5

                              788db080de71bd98680c541bf24f8e82

                              SHA1

                              a88111c45773cd0f8da4402845e68c5e805bbf43

                              SHA256

                              f776c2102044e95e1f28ed5550d46b27ec61ad28d7c2a736c52ff62510eeddca

                              SHA512

                              c97899fcb6fcc72278abb5b14593e8bcd368684c4624426323821a777542d5c67cc10d72b68724a736d30a2cfe5bbce5877644501527071b091876f4790495dc