Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    54s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/04/2024, 21:28

General

  • Target

    2024-04-30_49e034e10f53b6ab9332e4e3424400c2_goldeneye.exe

  • Size

    204KB

  • MD5

    49e034e10f53b6ab9332e4e3424400c2

  • SHA1

    1149b59d76b478aa33e6858531c5a4d468b03c62

  • SHA256

    a367e49b4f96743627510f18a0c7536b8e85fa00aa15b0e3dfe4f5beba666b16

  • SHA512

    34f25244e146ff26155579fcfa6f53be00ad786f58f359b8e010fe706327672195f0bfa1dcc1c7b2407a81a4e97edbf300e46b566aa25cb3bb68a2e828848e85

  • SSDEEP

    1536:1EGh0ool15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3Hgdo:1EGh0ool1OPOe2MUVg3Ve+rXfMUy

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 12 IoCs
  • Modifies Installed Components in the registry 2 TTPs 24 IoCs
  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-04-30_49e034e10f53b6ab9332e4e3424400c2_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-04-30_49e034e10f53b6ab9332e4e3424400c2_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5084
    • C:\Windows\{A66F1723-E0C1-47e8-BBFB-F539552137D4}.exe
      C:\Windows\{A66F1723-E0C1-47e8-BBFB-F539552137D4}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2368
      • C:\Windows\{3652EFDE-0657-4490-AE36-888C59C91CD9}.exe
        C:\Windows\{3652EFDE-0657-4490-AE36-888C59C91CD9}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:996
        • C:\Windows\{7037D56B-1B82-41ca-8F18-BB98AA355128}.exe
          C:\Windows\{7037D56B-1B82-41ca-8F18-BB98AA355128}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:716
          • C:\Windows\{EFFC9106-78EC-4ebf-BB35-7BDDDA671CDC}.exe
            C:\Windows\{EFFC9106-78EC-4ebf-BB35-7BDDDA671CDC}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3996
            • C:\Windows\{BCF1390F-E7E3-4671-B4CB-E160A13184AE}.exe
              C:\Windows\{BCF1390F-E7E3-4671-B4CB-E160A13184AE}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2240
              • C:\Windows\{8F21941D-9E96-476c-88FC-2687840E442C}.exe
                C:\Windows\{8F21941D-9E96-476c-88FC-2687840E442C}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:3332
                • C:\Windows\{EFEFD926-D976-4c29-A486-9A1780EC6C39}.exe
                  C:\Windows\{EFEFD926-D976-4c29-A486-9A1780EC6C39}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:464
                  • C:\Windows\{C9AA124C-6906-4590-8AFA-3C81892982CC}.exe
                    C:\Windows\{C9AA124C-6906-4590-8AFA-3C81892982CC}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:4112
                    • C:\Windows\{32112511-4C1F-4d0c-BB6E-DC79A547BF93}.exe
                      C:\Windows\{32112511-4C1F-4d0c-BB6E-DC79A547BF93}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:2996
                      • C:\Windows\{63D61664-2294-461d-96D1-82F36FD3259C}.exe
                        C:\Windows\{63D61664-2294-461d-96D1-82F36FD3259C}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:832
                        • C:\Windows\{3C573426-94A6-448d-BF7C-C4095A4B0044}.exe
                          C:\Windows\{3C573426-94A6-448d-BF7C-C4095A4B0044}.exe
                          12⤵
                          • Modifies Installed Components in the registry
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:1460
                          • C:\Windows\{11A8F4CB-38A1-4901-89B4-462FF41208C0}.exe
                            C:\Windows\{11A8F4CB-38A1-4901-89B4-462FF41208C0}.exe
                            13⤵
                            • Executes dropped EXE
                            PID:1572
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{3C573~1.EXE > nul
                            13⤵
                              PID:5020
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{63D61~1.EXE > nul
                            12⤵
                              PID:4624
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{32112~1.EXE > nul
                            11⤵
                              PID:4548
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{C9AA1~1.EXE > nul
                            10⤵
                              PID:708
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{EFEFD~1.EXE > nul
                            9⤵
                              PID:3528
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{8F219~1.EXE > nul
                            8⤵
                              PID:3956
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{BCF13~1.EXE > nul
                            7⤵
                              PID:3112
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{EFFC9~1.EXE > nul
                            6⤵
                              PID:4292
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{7037D~1.EXE > nul
                            5⤵
                              PID:4456
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{3652E~1.EXE > nul
                            4⤵
                              PID:4516
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{A66F1~1.EXE > nul
                            3⤵
                              PID:1900
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                            2⤵
                              PID:4760

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Windows\{11A8F4CB-38A1-4901-89B4-462FF41208C0}.exe

                            Filesize

                            204KB

                            MD5

                            ca39f23111015d79441b39867c232968

                            SHA1

                            2941b04309e02eb5a80bda19dbbce11229584f73

                            SHA256

                            e39607dddd2f4dd09a8d1279d84f51cc35d58863a2bb6dfef0a8fa185271579c

                            SHA512

                            361894fe7a3de4cc317ca936afcb62b48a2fecdbcbbc455e5d6a682855faa3798676b14b80a41a09f543bdb11a42b420168cd0b1447461f4e3e51168163ba91a

                          • C:\Windows\{32112511-4C1F-4d0c-BB6E-DC79A547BF93}.exe

                            Filesize

                            204KB

                            MD5

                            28a3ab684c2d50f6e47d9a70d35bd109

                            SHA1

                            072d7c6a8c0f03ba569c1f0733066d0bf8f2a5c7

                            SHA256

                            391895f8cbc0721343c1e6450a9bd84e30cdfd237db1d34aa5807e42d4b9cec6

                            SHA512

                            06b1367aa93c2702b9feccb98154ce66bd256595b88e58f36fc54c5096f9426452fdd48f85d9b2957f47f2fb0358e6e61b92b668e7ffb01ace823e472ba5fec5

                          • C:\Windows\{3652EFDE-0657-4490-AE36-888C59C91CD9}.exe

                            Filesize

                            204KB

                            MD5

                            429d65abed31920cd79c6fad8d3ca01f

                            SHA1

                            b1195e26b72e2338a28ade5c930393e5da969727

                            SHA256

                            a1784b372cd8468e1734565a18b069116d75b8c23e1881b40995f9873f627d57

                            SHA512

                            d66f8ee4d5124e81536c618215a8210f631239c4d658f05274afffd4679fb032499d2089dd4a75517b7afbb8f1aa75ee048bc9504242146aba34b9aa54eb6c27

                          • C:\Windows\{3C573426-94A6-448d-BF7C-C4095A4B0044}.exe

                            Filesize

                            204KB

                            MD5

                            15986cd091e0b1fb4bb47310c443f780

                            SHA1

                            d0d2a5a3271498fdf0106e1419f6ca8f447b9d47

                            SHA256

                            ca5fa52c12820713219a16feb5818a6d0fdef4bacc95b44486fa89a4223f7904

                            SHA512

                            23856f2f85c25fa6a830cc8a5a6e502ea0fecb9a09735643aa69211f669e996a50f55ca4a08eeb8abdea3f0101779df1a814909c340c7f765747fe558978e17e

                          • C:\Windows\{63D61664-2294-461d-96D1-82F36FD3259C}.exe

                            Filesize

                            204KB

                            MD5

                            9a0fc3af13251d063ec9f7f1bdbc3dfd

                            SHA1

                            e35b3aedff3bedccd106f57defd370280260e622

                            SHA256

                            8259b4f78a97e2871746258ec4cfe261a29427fb81d3a77a1b165f3b92b51f3e

                            SHA512

                            208dbc300295a959ed31afe34e4c8f4dc180e2d0f322e3c92ffa16d4856a84729a74d3f58a232851a5b08ca9c1542d50addec41b9d34afcb5c3fe107dff21c9e

                          • C:\Windows\{7037D56B-1B82-41ca-8F18-BB98AA355128}.exe

                            Filesize

                            204KB

                            MD5

                            c649503de0f572dc32670dbb12456bfc

                            SHA1

                            95508773f6ca65e6ae41adf1b2896a32259c395a

                            SHA256

                            c8d3fc874210841431ac3657d4d233f4e83d0beb5c92e17bcb2ef2c68ed0e121

                            SHA512

                            01ef3f21f3fb5f1149a6b53bbb644ad03984787362f138d1577a123fecb4cc0540ccc4d29442b46cba6c2137428dc503dcf396413736dbf1a111d51feee3318b

                          • C:\Windows\{8F21941D-9E96-476c-88FC-2687840E442C}.exe

                            Filesize

                            204KB

                            MD5

                            529547d059a669fd8bbd5d1399e0bb3d

                            SHA1

                            35904623131e9fdc3d7acd64e811bb20ec8a7ef1

                            SHA256

                            330307324ba90055e4e1dbaf785e6f688ba31c61dd545c6f898c7daab7f02e9d

                            SHA512

                            ba1edd501caff27c677cced4a1bf4c458313fd661ac51a85455e52060fdf5823a110d13bc34ffb9a4212b55c2ccb45843631987a0bdb60e64a2282262185a79d

                          • C:\Windows\{A66F1723-E0C1-47e8-BBFB-F539552137D4}.exe

                            Filesize

                            204KB

                            MD5

                            aa451483ed11ea1e3d77daa7ee5eaeca

                            SHA1

                            dc66fd633072e87b76f99f9e199bb0e80a8672ed

                            SHA256

                            6822bc373ad134511e76505a78ec51b98589656285d928b0800f859c189a72a7

                            SHA512

                            298504509bb06e148d2034324109ad5c35de94ae075713340e3ca01e73c65809690651d35fffa13273d63688514253d2eedac18397ba1a77cd9f45c5499866b6

                          • C:\Windows\{BCF1390F-E7E3-4671-B4CB-E160A13184AE}.exe

                            Filesize

                            204KB

                            MD5

                            8837e64e183446a42b54cd75b68bea0d

                            SHA1

                            a3ddd1aa00859a4a1752cea92c5c06e33f1dc274

                            SHA256

                            eb2ecf24561ef77a8c144ce5a3bcf275a9a06d245ba6b73ca7c7b15340950484

                            SHA512

                            d2a51d3b1d06fd8ab59eafd6778f51fa55b12da5d69f6e7e40eeb2a4a50a70451239bc45341edcaddb5749cc509df9c1c06c937c55f882b4f84a94b8a16ee7b6

                          • C:\Windows\{C9AA124C-6906-4590-8AFA-3C81892982CC}.exe

                            Filesize

                            204KB

                            MD5

                            5812dcecc2e7331c102a823bf10b9ed4

                            SHA1

                            3a6cde2cdcae4c85ea04de4edef729370b748a55

                            SHA256

                            0b1dc6287ff515ef475c8ee2d037e56ffe399057b0b04cc9b5009d03c5b99de7

                            SHA512

                            aa0be1fce74af4b90f2105fcc86e549f11f6cf1b60959953e014f04f556ef725e65630599cc9a917f1e1a2f9ea17c2187ad816a8b7c585a11df3229c93ea00be

                          • C:\Windows\{EFEFD926-D976-4c29-A486-9A1780EC6C39}.exe

                            Filesize

                            204KB

                            MD5

                            f4ae8d4bdcc8e4236d8acfedeee52187

                            SHA1

                            ca95be6144b0ce8d6fc63faaa1a4577e48604002

                            SHA256

                            b565fe041009c21bf414e9d853caefcb48219d4da5c145cf329d0048dc9201bd

                            SHA512

                            e1013deca64201a8d2695daf806755188d79cfabd789afaf8013913b104a0b3afb529aeecc5ccee6d7690d53e1de387088899c7f81c1977870c24fae28f99628

                          • C:\Windows\{EFFC9106-78EC-4ebf-BB35-7BDDDA671CDC}.exe

                            Filesize

                            204KB

                            MD5

                            b46f44c1e675a01fc792af58ebe8addb

                            SHA1

                            0442a59c815b9efd270110c150d59987e8effe41

                            SHA256

                            55cf6890ab2a340f38dbc629756a1778b64bf13de661d33223d34344489c542d

                            SHA512

                            e91be0350ec85cc58f00a2d10f92885f79b7ccf9d209ff01f021955c75b62ea98aeabf6b00e73480bf07f3068af5e879eb367548117f6306bf9e191a4332a1bf