Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    14/06/2024, 10:33

General

  • Target

    2024-06-14_35d1fe284d252d28f54228f89533265d_goldeneye.exe

  • Size

    408KB

  • MD5

    35d1fe284d252d28f54228f89533265d

  • SHA1

    2608bf047c19ff47248b21f140b8c8e7e123fa24

  • SHA256

    bb6047a97ea1c5b1a2e13b80f098cf662edc63d3d9a9a86d2f9011d88728a04f

  • SHA512

    3321ae750f86adb2a9bb87177e89336e60f756dfeadbe430fd291b7126e7b581cf1c1bb205809e5a0f0eee6faebc30718561d41046a06bc613197fbdf4eaa088

  • SSDEEP

    3072:CEGh0odl3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEGTldOe2MUVg3vTeKcAEciTBqr3jy

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Modifies Installed Components in the registry 2 TTPs 22 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-14_35d1fe284d252d28f54228f89533265d_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-14_35d1fe284d252d28f54228f89533265d_goldeneye.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3008
    • C:\Windows\{570FFB51-02A7-4076-A7E9-841E54505851}.exe
      C:\Windows\{570FFB51-02A7-4076-A7E9-841E54505851}.exe
      2⤵
      • Modifies Installed Components in the registry
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2208
      • C:\Windows\{610BE5FE-B309-46ea-9390-BDEE1FE4A018}.exe
        C:\Windows\{610BE5FE-B309-46ea-9390-BDEE1FE4A018}.exe
        3⤵
        • Modifies Installed Components in the registry
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2652
        • C:\Windows\{035FCB0D-B574-4d88-B726-0E0EF40F148F}.exe
          C:\Windows\{035FCB0D-B574-4d88-B726-0E0EF40F148F}.exe
          4⤵
          • Modifies Installed Components in the registry
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2732
          • C:\Windows\{38EF0F6C-3B06-47b7-AE51-9A20B1A92174}.exe
            C:\Windows\{38EF0F6C-3B06-47b7-AE51-9A20B1A92174}.exe
            5⤵
            • Modifies Installed Components in the registry
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3024
            • C:\Windows\{8D6B6050-E21A-41a8-8F4B-2937446E9E55}.exe
              C:\Windows\{8D6B6050-E21A-41a8-8F4B-2937446E9E55}.exe
              6⤵
              • Modifies Installed Components in the registry
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2780
              • C:\Windows\{B4B6E13C-C912-4bfa-B034-DFB91B8F5A68}.exe
                C:\Windows\{B4B6E13C-C912-4bfa-B034-DFB91B8F5A68}.exe
                7⤵
                • Modifies Installed Components in the registry
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:800
                • C:\Windows\{EFD11312-D8CA-4958-B642-314473BA1145}.exe
                  C:\Windows\{EFD11312-D8CA-4958-B642-314473BA1145}.exe
                  8⤵
                  • Modifies Installed Components in the registry
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2308
                  • C:\Windows\{5ED2B9AB-3A5E-4a83-AF65-4580F32B3CA4}.exe
                    C:\Windows\{5ED2B9AB-3A5E-4a83-AF65-4580F32B3CA4}.exe
                    9⤵
                    • Modifies Installed Components in the registry
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2708
                    • C:\Windows\{978DC600-828A-40a1-9ACA-AFA6129A73A5}.exe
                      C:\Windows\{978DC600-828A-40a1-9ACA-AFA6129A73A5}.exe
                      10⤵
                      • Modifies Installed Components in the registry
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2300
                      • C:\Windows\{E7ECC38F-82A2-49f2-9068-4942F409FABD}.exe
                        C:\Windows\{E7ECC38F-82A2-49f2-9068-4942F409FABD}.exe
                        11⤵
                        • Modifies Installed Components in the registry
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1944
                        • C:\Windows\{8D1CEAB9-C42D-44fe-ACE0-4A811972399B}.exe
                          C:\Windows\{8D1CEAB9-C42D-44fe-ACE0-4A811972399B}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:648
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{E7ECC~1.EXE > nul
                          12⤵
                            PID:2240
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{978DC~1.EXE > nul
                          11⤵
                            PID:2848
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{5ED2B~1.EXE > nul
                          10⤵
                            PID:2520
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{EFD11~1.EXE > nul
                          9⤵
                            PID:1604
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{B4B6E~1.EXE > nul
                          8⤵
                            PID:1984
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{8D6B6~1.EXE > nul
                          7⤵
                            PID:1700
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{38EF0~1.EXE > nul
                          6⤵
                            PID:2820
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{035FC~1.EXE > nul
                          5⤵
                            PID:2264
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{610BE~1.EXE > nul
                          4⤵
                            PID:2704
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{570FF~1.EXE > nul
                          3⤵
                            PID:2576
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:2608

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\{035FCB0D-B574-4d88-B726-0E0EF40F148F}.exe

                        Filesize

                        408KB

                        MD5

                        57a161b0d6c8bb3ed55079bfb0a2a13c

                        SHA1

                        5e03a13656f3fb80b55a7daba75a02fb4b23655a

                        SHA256

                        ba06dbd09c4facd879879bbc8acbbfd8c7931f2e7f0053836da342b4af63d70c

                        SHA512

                        bd665570b4be089c9a695639da26f6e802b64b5bf9e119827ad8826a5bab68ab6a5f480388dfe73255c238caca77493f42391ac382b02f3e7e4b610f50f5543f

                      • C:\Windows\{38EF0F6C-3B06-47b7-AE51-9A20B1A92174}.exe

                        Filesize

                        408KB

                        MD5

                        47945ada1ec433f36cc02c25c9c218e9

                        SHA1

                        b8e76e514ed50a89c9bb9104fe39c9d341e95697

                        SHA256

                        8182e0ce7146cffbeada87714b14e95a2cf4729972054bfa78a72b22e951a541

                        SHA512

                        65171f32b2eeaa76a68d44415e098b52e6a908abe590c225ffd366e2b4503f915a20cd4f18f1b2b94bb104b507bcdd574cb1860c134d8e26e7e986b4210352b9

                      • C:\Windows\{570FFB51-02A7-4076-A7E9-841E54505851}.exe

                        Filesize

                        408KB

                        MD5

                        0f3dfd64c6af04e1cd48a0541c8c67a5

                        SHA1

                        8ee70e072cd8b585c943fb2b4dc169153b17fd0d

                        SHA256

                        e3708b2368d924a09c3cdd85b22a13893d8ce5c4acddde431e5d783c0d7d9d72

                        SHA512

                        347437961a479ab091112d7907a8182cac4e074f899cd3da871160e9a0b4de943d2e9fba1b10f30aa4a13f03c5e66e3d0a4b93c73b6d43750bc4efc8804755f9

                      • C:\Windows\{5ED2B9AB-3A5E-4a83-AF65-4580F32B3CA4}.exe

                        Filesize

                        408KB

                        MD5

                        f50085e97fd01b17bca9fef69385fbfe

                        SHA1

                        7a837111f1e14c4106420331177ee37db91243be

                        SHA256

                        6633ccdb5d8dd10840fe57d467d143ee9d73dad5c1592e0fff4c3d7451527d18

                        SHA512

                        6dc58c55a01fb1f653217ea87185fc6950916210de798d0019fdbf09798c95d9c3eac648c296a5cf85d4f6127021fbc7265b25bf2607d93f13169328cf7b7fa1

                      • C:\Windows\{610BE5FE-B309-46ea-9390-BDEE1FE4A018}.exe

                        Filesize

                        408KB

                        MD5

                        39c45f314aec281ee4b211e9c0c61ca5

                        SHA1

                        b2edde503af10b647b316a7efff1d5e46a41a43c

                        SHA256

                        f9b482c800e382d2c6e3d9f99c1435f6586eaac4667f0bdb15195cbcb4ba5094

                        SHA512

                        c288b982ce5279697d2bc4942daec5c4e517706e2fe338f84e159adf19d9406195a6672805ca3f80057aa48d7730d7b41f5c3a1224e52eb9b71d6f1c323e6c1f

                      • C:\Windows\{8D1CEAB9-C42D-44fe-ACE0-4A811972399B}.exe

                        Filesize

                        408KB

                        MD5

                        4039d13e9df9286ace18440623f653dc

                        SHA1

                        e425c6641ad6e573ead6fe14f12f162574374a09

                        SHA256

                        73e3f4db346f45cd5c4b4d023339cbc107768b5662c989d4bf3afd062c03ad03

                        SHA512

                        ca68bb52f6fcedd7eef54b881482943f4aa1f4c73946960348f4b356d3cdbaf2384d65b41bd3c7062dd0b7785ba881b03fa3dc7ffbe55d32431084cdaefa00e7

                      • C:\Windows\{8D6B6050-E21A-41a8-8F4B-2937446E9E55}.exe

                        Filesize

                        408KB

                        MD5

                        91ab1b54220a7cb109b21ec342c62ac9

                        SHA1

                        71bfd12eaffe7e1aa60c78f6f7a202c2d2ca3d25

                        SHA256

                        0b87d3449f060f295f6f85b9d68864cb9944f5c7c9dc6fa23c153a82c8cf32cf

                        SHA512

                        7370fedfc2d506e71ffa20d59ec1b55d929ffd4a8f7159e6a49d4c89868a28228100e81f578fc32c8c22e1c5c580f090f2590fedbb91a99d3716a6333fdc6ffb

                      • C:\Windows\{978DC600-828A-40a1-9ACA-AFA6129A73A5}.exe

                        Filesize

                        408KB

                        MD5

                        6fde59c8295fc9a33493bd2178ab2d77

                        SHA1

                        8c13eec49fe4fb280ee64c683b00c55e22d3d92a

                        SHA256

                        332c601713681a943d4257ee81ef8f65a4011074ad53e47716982901d76b341f

                        SHA512

                        4729d114a1f305dda127c23805d4e697b5ad4f33b90409ffa736228818caa430d50a05fdd9a77d8755ce30763206ab40d9b65e6cf218b84816a0efef3b4e8f06

                      • C:\Windows\{B4B6E13C-C912-4bfa-B034-DFB91B8F5A68}.exe

                        Filesize

                        408KB

                        MD5

                        3f508b170f7944874ac7679af498dfe8

                        SHA1

                        194355782a17624763c741be99decb6f57d1b4f8

                        SHA256

                        ad42df1b9ac058d5aff7e2c477bfc8f8480c8562a87efcd686465eda75f7168e

                        SHA512

                        dddf30a36608bb94c0767e7aa9de6dcdbad2dfb5eabee3fdec6f1c1eaba2719eac9d2dad626d82d3e3ef4024b4bfa956aab1f4001cd8c89e8beb8ff46c6d62d2

                      • C:\Windows\{E7ECC38F-82A2-49f2-9068-4942F409FABD}.exe

                        Filesize

                        408KB

                        MD5

                        2d5d7de64832c7b20f8aabcd40a569ba

                        SHA1

                        d56d51ee09535c86042247e45384164c3d350d08

                        SHA256

                        a063b8693a02e52e47822d692b3d7cfc3b556c63f68c360334f593357a273fc6

                        SHA512

                        af1ad0dd36597e0407288051c2627be4b00bc0a525740c6a7b3b056f667fa025fc56598d4ad330314ccb1a2adeeae7617fe30e834cfc282ed547d9c12f79e4c1

                      • C:\Windows\{EFD11312-D8CA-4958-B642-314473BA1145}.exe

                        Filesize

                        408KB

                        MD5

                        f3f4ccdc41b701f468388eaf7e10cc55

                        SHA1

                        2be069ef923678888fead133b82c43e01d0039e8

                        SHA256

                        6b261080b4fda57de76bebbe0724a962373041f8acee9f8d6cc5d20abf19441d

                        SHA512

                        d28756178d46bc44047a5321964ed7b36ecd66b6e642cfa1b822c1abdff4092ac1d4a9bed0489cacd3739000caaf05a60e6fe67ec2d3bc5fdf05054e802a55f6