Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    25/06/2024, 09:33

General

  • Target

    2024-06-25_86a0d93408eab1c6a012783fcc232055_goldeneye.exe

  • Size

    216KB

  • MD5

    86a0d93408eab1c6a012783fcc232055

  • SHA1

    f309a672aad041afe72203db6edc5795cc204108

  • SHA256

    78d87a793e6b8f021a43e672ff1df3a6212bccf69b9fcdb2b1118dee4d83222e

  • SHA512

    417a35ecc6c15339608b66b79f31ac2685df1a1e26e18c9d915897fa8a4cc9775f36942a2957d2350e982075c3390428bc40cfb54d9ea21e702fd7cf4220b95b

  • SSDEEP

    3072:jEGh0o2l+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMUy:jEG8lEeKcAEcGy

Score
9/10

Malware Config

Signatures

  • Auto-generated rule 11 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-06-25_86a0d93408eab1c6a012783fcc232055_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-06-25_86a0d93408eab1c6a012783fcc232055_goldeneye.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2924
    • C:\Windows\{F79EE706-DC8A-46dd-9EF8-821A194D257D}.exe
      C:\Windows\{F79EE706-DC8A-46dd-9EF8-821A194D257D}.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2684
      • C:\Windows\{295ED733-BF57-4203-9087-E90F2C765547}.exe
        C:\Windows\{295ED733-BF57-4203-9087-E90F2C765547}.exe
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2484
        • C:\Windows\{2111C850-8687-4e5c-B028-5B813843577B}.exe
          C:\Windows\{2111C850-8687-4e5c-B028-5B813843577B}.exe
          4⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2516
          • C:\Windows\{D623E16E-D65A-44cd-90BC-708CA7A82A49}.exe
            C:\Windows\{D623E16E-D65A-44cd-90BC-708CA7A82A49}.exe
            5⤵
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2472
            • C:\Windows\{79F0999F-9C0D-4a1b-BC3B-C704DD8DDC77}.exe
              C:\Windows\{79F0999F-9C0D-4a1b-BC3B-C704DD8DDC77}.exe
              6⤵
              • Boot or Logon Autostart Execution: Active Setup
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2692
              • C:\Windows\{7AAC515D-6035-4aa9-A5B9-39CAA73D21CF}.exe
                C:\Windows\{7AAC515D-6035-4aa9-A5B9-39CAA73D21CF}.exe
                7⤵
                • Boot or Logon Autostart Execution: Active Setup
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:356
                • C:\Windows\{5E61206F-2CE3-43cd-BC66-BA6700986716}.exe
                  C:\Windows\{5E61206F-2CE3-43cd-BC66-BA6700986716}.exe
                  8⤵
                  • Boot or Logon Autostart Execution: Active Setup
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2328
                  • C:\Windows\{B11920A7-2C9F-4bab-9978-8ADA1065B392}.exe
                    C:\Windows\{B11920A7-2C9F-4bab-9978-8ADA1065B392}.exe
                    9⤵
                    • Boot or Logon Autostart Execution: Active Setup
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1028
                    • C:\Windows\{1E539977-EDEA-437b-B134-914DB853F047}.exe
                      C:\Windows\{1E539977-EDEA-437b-B134-914DB853F047}.exe
                      10⤵
                      • Boot or Logon Autostart Execution: Active Setup
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2584
                      • C:\Windows\{021A8D98-428E-4513-9A10-7E6B16F855E2}.exe
                        C:\Windows\{021A8D98-428E-4513-9A10-7E6B16F855E2}.exe
                        11⤵
                        • Boot or Logon Autostart Execution: Active Setup
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2876
                        • C:\Windows\{358FB068-0EF9-423d-AB1F-AF791A9EEAA0}.exe
                          C:\Windows\{358FB068-0EF9-423d-AB1F-AF791A9EEAA0}.exe
                          12⤵
                          • Executes dropped EXE
                          PID:1424
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{021A8~1.EXE > nul
                          12⤵
                            PID:1220
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{1E539~1.EXE > nul
                          11⤵
                            PID:336
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{B1192~1.EXE > nul
                          10⤵
                            PID:2448
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{5E612~1.EXE > nul
                          9⤵
                            PID:2028
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{7AAC5~1.EXE > nul
                          8⤵
                            PID:1204
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{79F09~1.EXE > nul
                          7⤵
                            PID:1912
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{D623E~1.EXE > nul
                          6⤵
                            PID:848
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{2111C~1.EXE > nul
                          5⤵
                            PID:2932
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{295ED~1.EXE > nul
                          4⤵
                            PID:2416
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{F79EE~1.EXE > nul
                          3⤵
                            PID:2512
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                          2⤵
                          • Deletes itself
                          PID:2968

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Windows\{021A8D98-428E-4513-9A10-7E6B16F855E2}.exe

                        Filesize

                        216KB

                        MD5

                        8b8770c7442807ac08cc49af33c800aa

                        SHA1

                        157686a81a6386d52e54be398201d9b59b240a47

                        SHA256

                        59ddcf3b39773fe000586614cf0622b81aaf1b083c9873fbcf2f31b8ef08d655

                        SHA512

                        b681fab01a9973e5f1c2816914c31b2de1028e269532ec1ae6158adb3ac9339f865fcd1869765e32591512a4c397fe25409001fab62baae031723e833742302e

                      • C:\Windows\{1E539977-EDEA-437b-B134-914DB853F047}.exe

                        Filesize

                        216KB

                        MD5

                        ca6754c57c3638b503e98a4d70662dfe

                        SHA1

                        97a5f51d88508f09837eb2f68c3d1e71d30df332

                        SHA256

                        7e6c0e2f51b22b22826218f332abda1bea3774219c4f345ae97a33ad86adc197

                        SHA512

                        8594c188733777000810ccf60cef46eb56bb45cddb1a8b425f6f2536fe0e73ac5f4bcdaabf973f3c5dbc8e9912f552112b26f596a3f0f0a235baee8606cf13bd

                      • C:\Windows\{2111C850-8687-4e5c-B028-5B813843577B}.exe

                        Filesize

                        216KB

                        MD5

                        d0c108e68446e0b7de98e6e185fbe605

                        SHA1

                        cf774cbb1cf293e9b80af8ec75900750b4f60692

                        SHA256

                        a1a0dc0dbd9d8ffacce339a268fe7bede4fbddb34aeaf45691c1811c959d158a

                        SHA512

                        7c61d2e7577ceac3521f7b152000ee217314bca5aec4c9912ebf853c4755eae34495ae37e34952c076b81d44cf27da97057282aa528dbef693a4974ed175252e

                      • C:\Windows\{295ED733-BF57-4203-9087-E90F2C765547}.exe

                        Filesize

                        216KB

                        MD5

                        510a449424c14a9a1db09a3a02f6906c

                        SHA1

                        f3ffc99e22723c34f3318a47d839f47694a45b2b

                        SHA256

                        5b8575dd0e9ed9c32728862cdb0fa4ca68f72cda3123cbe441b6b46e4390d56e

                        SHA512

                        0ed86267fb6d5564f057d1c0a37de1c70ab648ec661d0863ec60c25d77e23e244e0d7245311f7f67c32195a2529ef4f31da6ad3a7f617b0bb46caf34ef2f941b

                      • C:\Windows\{358FB068-0EF9-423d-AB1F-AF791A9EEAA0}.exe

                        Filesize

                        216KB

                        MD5

                        07974f9cc960b4920b5863f83c0c4564

                        SHA1

                        7d220448cd7403f271698c43d6a4d89f7013368b

                        SHA256

                        1d5a9b61a9edbd83506fda9d3959ae6be62973a0ad2278e08016b603cf7ff4a8

                        SHA512

                        3bdb3dd00da7430c907adbbd46144adc4424177772be13555b9e82bac25cf1f85f576b19f4090294a4b905bac19dc2b612f5d1ca8fcd5f7717c63999f537740e

                      • C:\Windows\{5E61206F-2CE3-43cd-BC66-BA6700986716}.exe

                        Filesize

                        216KB

                        MD5

                        cd4a59b07df4c13d84530294e0dafc6c

                        SHA1

                        21108ea529af201c37eb36f082bb676e139aeee4

                        SHA256

                        26416ee5bc09fb91e4d29a572df2ea39c062c6b1f48c5332a6c909ec6b5a6581

                        SHA512

                        941915d2b67241d734e64c57d21ab6052feadb2647e61d8d9ebcb0b3f0aa8c25977572ec101fc5624f6f619782bf850e328620425f37e02d872aacc9fe7f7c33

                      • C:\Windows\{79F0999F-9C0D-4a1b-BC3B-C704DD8DDC77}.exe

                        Filesize

                        216KB

                        MD5

                        db90076eba97991ea6d2b31e42ec115f

                        SHA1

                        f5d98c6f30b180ade142586136fe304fe59b37d7

                        SHA256

                        da402e49ae23aad8a850ee03aa1179f6f5434cfcd39bf7a62396669d5036973c

                        SHA512

                        9fe815d74cf4997b1fdf60cab1004d7f194289aa7e4f0459e5146667ca2669d3e128b122c32acced57fc83ec9486b81a6336cb36ef662d531862d2c9f6a93685

                      • C:\Windows\{7AAC515D-6035-4aa9-A5B9-39CAA73D21CF}.exe

                        Filesize

                        216KB

                        MD5

                        e081eaaa80666521037573761e976451

                        SHA1

                        17e3ca22bf2adcba0a41d2f14a2ffb13dd8b5b69

                        SHA256

                        5384ea17238b08006b51912770ba8433c81f1fe2d0f968efea49ecac082e7787

                        SHA512

                        58a3386a77691986682716b6d5ce1a2dde7f6d39a43f7c2f1e127977c8520babc7d66c4f8cbd22ac4aa0c9b38eaf1e8f2b6bb68ccb6c04190e4dae2fa9f7e0e3

                      • C:\Windows\{B11920A7-2C9F-4bab-9978-8ADA1065B392}.exe

                        Filesize

                        216KB

                        MD5

                        89e03ed701d12fb7bff6620448fc252d

                        SHA1

                        45ba63d64aa69abc984fa743f3a552a4b6b5e4e1

                        SHA256

                        315083e3242fedbdfab8b9f9700f2d61086825108d510b8f5e20eee4dc678ab4

                        SHA512

                        b761e51a28dbdcf4eeb01eb7b95ea0d06d457de3b3d659eb1234409823a268158579b76a87e1adec44248d9864caf96259ef4d12edbbb4c102d4868d868f3111

                      • C:\Windows\{D623E16E-D65A-44cd-90BC-708CA7A82A49}.exe

                        Filesize

                        216KB

                        MD5

                        fbf139aa45ee026888b06ff17edc117f

                        SHA1

                        1adb697835431114c6b6898e22e818ad5d01da6a

                        SHA256

                        488be3d124062bd4fae564e1e1fedee84cad6be997de7f6f501f605bbfd64f1d

                        SHA512

                        4cc31219e7a0e1e45fb6f1a1e687c0a51e6f8561a9ff3e1a558c6ffff62e979004c9512dc49ce9ef6f8dab652fea5723c38444349161296a269aeb98a16717eb

                      • C:\Windows\{F79EE706-DC8A-46dd-9EF8-821A194D257D}.exe

                        Filesize

                        216KB

                        MD5

                        99fec3f4a31e8e43643fd8bb542240de

                        SHA1

                        1e9526f22cd6e17593746be5594b16775dbf1c67

                        SHA256

                        b1459479a8e93c02d889045d2fadd58a665502a664452ceb1eac8a073e898f44

                        SHA512

                        b15a363eaae292a056abc3304be1a5481c5fb3cd2a59b43dda9a09a0d93dc174b61bfd5f56c94095904909d5f973e36c80f67a94d906e616018fdf4df287ff89