Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/07/2024, 11:56

General

  • Target

    2024-07-05_f629a8a7e8a4ef5329ad1c3b798fcdd4_goldeneye.exe

  • Size

    197KB

  • MD5

    f629a8a7e8a4ef5329ad1c3b798fcdd4

  • SHA1

    0da522f7c7e2dbdca6ea39cabcaadfab51ff85e4

  • SHA256

    c48c0159af432af892cebaf6b043e9fcf5abef2924e2c11606f21ebca4b439d8

  • SHA512

    a9ed68579b02df9fecfd803902dce50804847abb4b0a427a66300430c79b8b726eeec66bbf475dad2c6a32363a06114285acc9ed4d79adef789ecc8f30ca030a

  • SSDEEP

    3072:jEGh0o6l+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEGAlEeKcAEca

Score
8/10

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-07-05_f629a8a7e8a4ef5329ad1c3b798fcdd4_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-07-05_f629a8a7e8a4ef5329ad1c3b798fcdd4_goldeneye.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1512
    • C:\Windows\{E9A9D0F4-C254-41ac-9069-5ABD284F1DCD}.exe
      C:\Windows\{E9A9D0F4-C254-41ac-9069-5ABD284F1DCD}.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3532
      • C:\Windows\{40B77A09-FDAF-45ce-A75B-E8E95E1D2B0D}.exe
        C:\Windows\{40B77A09-FDAF-45ce-A75B-E8E95E1D2B0D}.exe
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2956
        • C:\Windows\{76046877-DA23-4b8c-BDA3-9ACAC3876546}.exe
          C:\Windows\{76046877-DA23-4b8c-BDA3-9ACAC3876546}.exe
          4⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Drops file in Windows directory
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2256
          • C:\Windows\{2ADF1354-0587-4a2f-B6A5-6AD868F84806}.exe
            C:\Windows\{2ADF1354-0587-4a2f-B6A5-6AD868F84806}.exe
            5⤵
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Drops file in Windows directory
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3388
            • C:\Windows\{FC75C890-F888-4031-9097-DC7BC916B433}.exe
              C:\Windows\{FC75C890-F888-4031-9097-DC7BC916B433}.exe
              6⤵
              • Boot or Logon Autostart Execution: Active Setup
              • Executes dropped EXE
              • Drops file in Windows directory
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3668
              • C:\Windows\{AD1260A1-74DC-4ff9-832D-6F84BB2178D6}.exe
                C:\Windows\{AD1260A1-74DC-4ff9-832D-6F84BB2178D6}.exe
                7⤵
                • Boot or Logon Autostart Execution: Active Setup
                • Executes dropped EXE
                • Drops file in Windows directory
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1072
                • C:\Windows\{57CF434B-0544-4d85-83AF-0E64CC40806A}.exe
                  C:\Windows\{57CF434B-0544-4d85-83AF-0E64CC40806A}.exe
                  8⤵
                  • Boot or Logon Autostart Execution: Active Setup
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:4740
                  • C:\Windows\{00C6382F-680F-4457-AD93-B97708319DED}.exe
                    C:\Windows\{00C6382F-680F-4457-AD93-B97708319DED}.exe
                    9⤵
                    • Boot or Logon Autostart Execution: Active Setup
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2332
                    • C:\Windows\{4940D852-8CDB-4e03-A62B-4D2873891613}.exe
                      C:\Windows\{4940D852-8CDB-4e03-A62B-4D2873891613}.exe
                      10⤵
                      • Boot or Logon Autostart Execution: Active Setup
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:3704
                      • C:\Windows\{710D5E2F-424E-4bfa-A4B9-44FC92696C0E}.exe
                        C:\Windows\{710D5E2F-424E-4bfa-A4B9-44FC92696C0E}.exe
                        11⤵
                        • Boot or Logon Autostart Execution: Active Setup
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:2776
                        • C:\Windows\{C875DC02-11EB-4387-A8B7-6F61C7871DCB}.exe
                          C:\Windows\{C875DC02-11EB-4387-A8B7-6F61C7871DCB}.exe
                          12⤵
                          • Boot or Logon Autostart Execution: Active Setup
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2484
                          • C:\Windows\{54289DD9-D3A4-4949-A8AA-5F14A3AA27A1}.exe
                            C:\Windows\{54289DD9-D3A4-4949-A8AA-5F14A3AA27A1}.exe
                            13⤵
                            • Executes dropped EXE
                            PID:1088
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{C875D~1.EXE > nul
                            13⤵
                              PID:552
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{710D5~1.EXE > nul
                            12⤵
                              PID:1740
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{4940D~1.EXE > nul
                            11⤵
                              PID:788
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{00C63~1.EXE > nul
                            10⤵
                              PID:3596
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{57CF4~1.EXE > nul
                            9⤵
                              PID:3324
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{AD126~1.EXE > nul
                            8⤵
                              PID:2520
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{FC75C~1.EXE > nul
                            7⤵
                              PID:1256
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{2ADF1~1.EXE > nul
                            6⤵
                              PID:1804
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{76046~1.EXE > nul
                            5⤵
                              PID:4692
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{40B77~1.EXE > nul
                            4⤵
                              PID:264
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{E9A9D~1.EXE > nul
                            3⤵
                              PID:1016
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
                            2⤵
                              PID:3484

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Windows\{00C6382F-680F-4457-AD93-B97708319DED}.exe

                            Filesize

                            197KB

                            MD5

                            49f43e77da1864c5c9665619b473ce4a

                            SHA1

                            2c2e1e14ec5d82e1436116ce7cf7a99771d53769

                            SHA256

                            0e9cd3ff983636e6bc10bcb802f9dcb3ab0c0bf5075190a4db6e9f784d8e449e

                            SHA512

                            3a2c41bf10f101603c86f9c32145e07672933b70e7ac9ddc4e21aa73e9570f137e54c8e1799f88fc7e930d6b4d3b477ae97ecaa48b8b3985661be30da5dd5af8

                          • C:\Windows\{2ADF1354-0587-4a2f-B6A5-6AD868F84806}.exe

                            Filesize

                            197KB

                            MD5

                            2a1145bd66bc592cbb234376198f72d9

                            SHA1

                            a3b8eedc10ae7f63c0122f937d505a378ae53bd0

                            SHA256

                            71827318e0d51308bc1ba86623001bc9c9b3615fc557404a7f3ea7c220393622

                            SHA512

                            7f5c7a0f7d9dbd48e9653123a0d1af209ed6752e768fffce0179d663d97c91027660c33a070caadf3dd42e6b762b4405991f22737e8593c16e2c040b5484d5a8

                          • C:\Windows\{40B77A09-FDAF-45ce-A75B-E8E95E1D2B0D}.exe

                            Filesize

                            197KB

                            MD5

                            9ae03fb0c9e3be4fa64ea9cc50d5e984

                            SHA1

                            1c62954e1da6b85e2ef17522e0309f24c25aa755

                            SHA256

                            554fb7766f19225d0ef44a83f62372c21c88d6c8f85de87646006f26b5173314

                            SHA512

                            bab7dbc19f66255936398e4ab4b8dd1dd4abc0ffbf1fbc247202b9bc56efabf2c5565f96fdc782366a8256846a82706c7af82fe9833497fba4d2151d0004750c

                          • C:\Windows\{4940D852-8CDB-4e03-A62B-4D2873891613}.exe

                            Filesize

                            197KB

                            MD5

                            f5ca4b66567d127767fe597e35f8d2d9

                            SHA1

                            6013831b7c87f1150f50046d5069f416db78a583

                            SHA256

                            7b1b5fadfe6ce09c062fdec5f8e6e0c22191abb189b5f8606bdd4e8c6720f616

                            SHA512

                            439d4e1a9ceadbbf32140303a75aca9fdfee6100671b4eab2016d016b56e524f180f660ce7ae7134ef7709a3a5b1eb6274790ac188fd54142232beece4da7475

                          • C:\Windows\{54289DD9-D3A4-4949-A8AA-5F14A3AA27A1}.exe

                            Filesize

                            197KB

                            MD5

                            abd48e4775de5d75ebc4d8d0ac50ebfb

                            SHA1

                            a8a565587dd596b05911617d4ebb6bfaf0d5b86c

                            SHA256

                            27a485156f3a4e05adbf72a634d357b067baebaa27f2ab3df1367a8965354383

                            SHA512

                            9398e82bceea785b9acccbaf9450d4f31c67a2712eafe7be4f159bd5ed7c4cc5d8aa3799d7122e8bf57b87969030f64d215ff931955d6d7aab723a5ba0c40fa7

                          • C:\Windows\{57CF434B-0544-4d85-83AF-0E64CC40806A}.exe

                            Filesize

                            197KB

                            MD5

                            f16df74f220a159f01c1b0e727fa7979

                            SHA1

                            008c57ed7cde4bf80cb75adb8e3cc7073635d820

                            SHA256

                            ebeb8fccf9f6bab8182c27763b34ce478f350d13306da11c05845bb25416efb7

                            SHA512

                            1242737e34adad9dfa12a9e2f8d8d16a2c3cec0c4f871c6258f7caceba6fdf6e2ef75b5d6f0e9849483aa38d7bbd02261a4e331cafcec4a70819ef7291715691

                          • C:\Windows\{710D5E2F-424E-4bfa-A4B9-44FC92696C0E}.exe

                            Filesize

                            197KB

                            MD5

                            c0e7ca8dbea511661fa7e0e291b30ae4

                            SHA1

                            95b63e0f7779d65e8a76b34b06fd17f301fe0977

                            SHA256

                            b647d688bcc554bb5989f78c24e633bb404a1f1244223d0e5a8ee888e0f6c315

                            SHA512

                            e2ac599e8bc38e003515b5b48d2c9021487f0bbbb9c427f9a802c0fb9918c96fd399014d040b05cef96911a3b5c6b1d4c23eba646ce998a3f1be4c3815e5b457

                          • C:\Windows\{76046877-DA23-4b8c-BDA3-9ACAC3876546}.exe

                            Filesize

                            197KB

                            MD5

                            330cb777352d88c94687d10715500732

                            SHA1

                            18ad6bc019ea4f9765aaae92d407af734aed3d03

                            SHA256

                            9ee7fcfc2b642825e8012cf28d697b0f4f102e432bf4088fdfb87aae9ee1472c

                            SHA512

                            fdc9503375e0e21378d88fd2356b25b7ddbb8d34cef6949e93fa33a0fbb049570816dea4ce6e90651aa39a636e6540b4870bc276f2683889c0bf04cefb159df5

                          • C:\Windows\{AD1260A1-74DC-4ff9-832D-6F84BB2178D6}.exe

                            Filesize

                            197KB

                            MD5

                            ac5acac109d51b61903fb532ca51f5a5

                            SHA1

                            f9fba7afd30a28319b07e5eb88bd18e445470caf

                            SHA256

                            87348360f92ede381a7f1e2c52c95d632066db801fb93596a45063d0d80956bb

                            SHA512

                            6d044b2636e251a5e65af98cbaf38a4a42da1a589b07a9e395cb5a5ac9ec8232898429ac0b20eec94c5ff7ea5be0ae6a6d332a4630327c522f0735d4994bc4c9

                          • C:\Windows\{C875DC02-11EB-4387-A8B7-6F61C7871DCB}.exe

                            Filesize

                            197KB

                            MD5

                            9f86a946bceb78d5a2348c28e77afdb3

                            SHA1

                            5c8df99c1a10911aecce1d42a55c5f9656f783b5

                            SHA256

                            a213fad896c9903b13985671c55e58969d3d8dfbeea4f6172d3960ceed69ab36

                            SHA512

                            4876909adf2011f7e6f462157eca1f5850e16718898d69496536032222057cd2cae1d10d3b8b2b8098bb2dab755c8f239dfd8ad91562bbc3670af3ec733d3a6f

                          • C:\Windows\{E9A9D0F4-C254-41ac-9069-5ABD284F1DCD}.exe

                            Filesize

                            197KB

                            MD5

                            d3d0bad481bd0dc8fd87cc9f81921c94

                            SHA1

                            e0553a4725ff4a5a3a66c2dc90fbfe9e71c2e01e

                            SHA256

                            ad6f5830103e1858a2070595d7ddde1fe3bb08b1c90a14c284440d5e810bea6b

                            SHA512

                            212fa96387f5d2f2753441b8c8fd1ab61af2cdb7e5e1cd7c65c05a05b9f424b12c63c4648c396b338adc19a5bb742191c145b178ebf09053be5c5527ba4e353f

                          • C:\Windows\{FC75C890-F888-4031-9097-DC7BC916B433}.exe

                            Filesize

                            197KB

                            MD5

                            dcb1f2e069d24b205372dd1cba0150f4

                            SHA1

                            17bc2e3dfb67ad30e37426120d60105a2521f2d1

                            SHA256

                            44f247c6ab2466c7b73e412b742dfaf25794a1ffcccb130f6295c60ba06d81de

                            SHA512

                            6c391b3ffd6745267d1324c80f4582d5c646b5454b58c0f565dd222047484d54199371e8e4fb27bf8d25b040a43fa68a0fe7e6a185c394d943ae32aa5ee9b1a2