Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/09/2024, 02:52

General

  • Target

    2024-09-08_85dbf2af3a820608c506266b00567e84_goldeneye.exe

  • Size

    197KB

  • MD5

    85dbf2af3a820608c506266b00567e84

  • SHA1

    4d531e9d3134939b23b3adfc3fee364a68ba17df

  • SHA256

    ee8aef9c0827580f22cce5bddd68c91daf0427ac9d071ea4addf13d217e36f04

  • SHA512

    c1ce7bf0cd65a738dad56fc36781f3b0ffaa9b3710707f013435bda91c8747743e6f457ac0d197012c8bf680ad6ef61968f1b433a7ddfc2f80e937b56c9536e6

  • SSDEEP

    3072:jEGh0oIl+Oso7ie+rcC4F0fJGRIS8Rfd7eQEcGcrcMQ:jEG2lEeKcAEca

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 12 IoCs
  • Drops file in Windows directory 12 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 25 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-08_85dbf2af3a820608c506266b00567e84_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-08_85dbf2af3a820608c506266b00567e84_goldeneye.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1308
    • C:\Windows\{F8AB8B40-275F-4178-B1B1-10890B11578A}.exe
      C:\Windows\{F8AB8B40-275F-4178-B1B1-10890B11578A}.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1680
      • C:\Windows\{522DF91F-9104-48c2-89EB-E95C51E9C3F5}.exe
        C:\Windows\{522DF91F-9104-48c2-89EB-E95C51E9C3F5}.exe
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2164
        • C:\Windows\{D0D6DFC5-8014-45dc-921D-41CF10CAAE53}.exe
          C:\Windows\{D0D6DFC5-8014-45dc-921D-41CF10CAAE53}.exe
          4⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3208
          • C:\Windows\{12FCD9F6-9DD0-4a99-BF50-43F86D8B9377}.exe
            C:\Windows\{12FCD9F6-9DD0-4a99-BF50-43F86D8B9377}.exe
            5⤵
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4380
            • C:\Windows\{54DA7A9B-9A02-4736-AB13-5672F71E45F9}.exe
              C:\Windows\{54DA7A9B-9A02-4736-AB13-5672F71E45F9}.exe
              6⤵
              • Boot or Logon Autostart Execution: Active Setup
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1116
              • C:\Windows\{0883385D-E695-492c-8ECA-3EDE04238299}.exe
                C:\Windows\{0883385D-E695-492c-8ECA-3EDE04238299}.exe
                7⤵
                • Boot or Logon Autostart Execution: Active Setup
                • Executes dropped EXE
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4960
                • C:\Windows\{45DCF796-2ED1-4af8-9969-52FAEB08E5BE}.exe
                  C:\Windows\{45DCF796-2ED1-4af8-9969-52FAEB08E5BE}.exe
                  8⤵
                  • Boot or Logon Autostart Execution: Active Setup
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:5104
                  • C:\Windows\{B60E729A-E400-4e84-9DEB-E27ACF83559E}.exe
                    C:\Windows\{B60E729A-E400-4e84-9DEB-E27ACF83559E}.exe
                    9⤵
                    • Boot or Logon Autostart Execution: Active Setup
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:3036
                    • C:\Windows\{9B9ED9ED-101C-4b9a-9203-49C7884BBB20}.exe
                      C:\Windows\{9B9ED9ED-101C-4b9a-9203-49C7884BBB20}.exe
                      10⤵
                      • Boot or Logon Autostart Execution: Active Setup
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:3940
                      • C:\Windows\{7E0BA144-C3C5-401c-A968-4723AB243856}.exe
                        C:\Windows\{7E0BA144-C3C5-401c-A968-4723AB243856}.exe
                        11⤵
                        • Boot or Logon Autostart Execution: Active Setup
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:2688
                        • C:\Windows\{8CAF9C79-6C08-4124-914F-C880BB527977}.exe
                          C:\Windows\{8CAF9C79-6C08-4124-914F-C880BB527977}.exe
                          12⤵
                          • Boot or Logon Autostart Execution: Active Setup
                          • Executes dropped EXE
                          • Drops file in Windows directory
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4368
                          • C:\Windows\{1D663020-02D7-4002-AE95-C3D326F981B0}.exe
                            C:\Windows\{1D663020-02D7-4002-AE95-C3D326F981B0}.exe
                            13⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:4456
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{8CAF9~1.EXE > nul
                            13⤵
                            • System Location Discovery: System Language Discovery
                            PID:2544
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{7E0BA~1.EXE > nul
                          12⤵
                          • System Location Discovery: System Language Discovery
                          PID:3508
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c del C:\Windows\{9B9ED~1.EXE > nul
                        11⤵
                        • System Location Discovery: System Language Discovery
                        PID:3656
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{B60E7~1.EXE > nul
                      10⤵
                      • System Location Discovery: System Language Discovery
                      PID:1352
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{45DCF~1.EXE > nul
                    9⤵
                    • System Location Discovery: System Language Discovery
                    PID:2860
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{08833~1.EXE > nul
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:3160
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c del C:\Windows\{54DA7~1.EXE > nul
                7⤵
                • System Location Discovery: System Language Discovery
                PID:2308
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c del C:\Windows\{12FCD~1.EXE > nul
              6⤵
              • System Location Discovery: System Language Discovery
              PID:4800
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{D0D6D~1.EXE > nul
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2204
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{522DF~1.EXE > nul
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1608
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Windows\{F8AB8~1.EXE > nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:784
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2332

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\{0883385D-E695-492c-8ECA-3EDE04238299}.exe

    Filesize

    197KB

    MD5

    13eedc3b128b1dbe5921f33c134a865c

    SHA1

    3b65e1d9096bee7693603d67171c8e6f1732ac2d

    SHA256

    fe59af41d07524a0844d8f4a2bc7f1b1faf4e8c38a9fe003fe5a7cf8dc20564b

    SHA512

    faaa6ed5e030ef17ab5c1580c1e33e6461b6442f55cd20c7139648fe838eb308c0c8af3f7c2e18d6cf0cd70047a6cb6a7ad40a3ee37ee68ca6621ab8ef652361

  • C:\Windows\{12FCD9F6-9DD0-4a99-BF50-43F86D8B9377}.exe

    Filesize

    197KB

    MD5

    8cd3d76ea9f376ae5733c16ec9a9c583

    SHA1

    fd6e3f73e1fb9bdc21e3138f9d081d9f275ca2f4

    SHA256

    0054d30961d1f07e018d27743952146b0ed01bfe17b64b74e52d0fda3a33fa34

    SHA512

    f361fa816be5366d6bcc26d8774a42d19ebd16707774bff563d83b32b49d6e2deec1ca0ee2eafa74f89a83b65b685d713b7037a9babc73e8c6d42d9ecfa8b288

  • C:\Windows\{1D663020-02D7-4002-AE95-C3D326F981B0}.exe

    Filesize

    197KB

    MD5

    e9797da078afb2f1062ee30b591cf39d

    SHA1

    b0041c73ffc857a530e78607752ddee1340854aa

    SHA256

    b4d9d0d9cb476378cfb5dbbf5f96e2f6ddfd8274136f115b6e7b9116511295ec

    SHA512

    03b103eb7cdae2e22ef4070f8a939c4cb7156dae189fdc0c56eeaee2dc1f7b7b5a1ca830d386f7fb6b6a2f08a7d3be9fa7be6307c1f650a2cf231e81c9a679ed

  • C:\Windows\{45DCF796-2ED1-4af8-9969-52FAEB08E5BE}.exe

    Filesize

    197KB

    MD5

    5a25d74d9261f5d310596c1707d5cff3

    SHA1

    2eeaf289505746cee08727d25a8f0a4118a96031

    SHA256

    acac22643ba36800d2d42da9535c78f5a98e70cdefaff5cbd6e4c10718be95ec

    SHA512

    bc0d8172e8f6732765142f77db32ae99240afc2affd4639f9737fd29cbc79af75b2249839ee4070d26004463f81c8df9c12bb68ccefcbd2a5fd8fcb2e4407788

  • C:\Windows\{522DF91F-9104-48c2-89EB-E95C51E9C3F5}.exe

    Filesize

    197KB

    MD5

    4bca793315fcb8cb84465a1d380d79d2

    SHA1

    33da4128cddab44d28fe5d96516c810047c4db28

    SHA256

    ffcca781a61357f1289cc278335fad8778da29e57f469ae03eb3c4179394d69d

    SHA512

    8e966d728b42835e7f955302bbdd6582e1c8562ff30544a57f8d7726bce1fa35fd01a33e6f2934b4b6edfa4939c455ba2c267c7db6b86a580879fbba0c8fa877

  • C:\Windows\{54DA7A9B-9A02-4736-AB13-5672F71E45F9}.exe

    Filesize

    197KB

    MD5

    112bfde6d4de735aef3f60fdc18c24a2

    SHA1

    1c9e18fdda4c1a7a0dc93e0b97baef54eda8da21

    SHA256

    f8d5ab6fecad1b84819f385eb9315dc912b4b8f5b581502ebcb5d3a51bd582e2

    SHA512

    87076c3b31d22ce19f1f800e15dccee1fa67961fc329fb8ee113b61e4a22d5a82408889fecc4abe33df98e5f3ccd5be2f02ecac3da1eca7700ad4751f7da482b

  • C:\Windows\{7E0BA144-C3C5-401c-A968-4723AB243856}.exe

    Filesize

    197KB

    MD5

    68acc6fd88007e4446b4500580038429

    SHA1

    b8c3d0ecaebb363040f759d60ef3abda6c0eb095

    SHA256

    8a5936a25f7721dfcee33a721b74c9e7ecebc2f97ada89ff00f8c3ef13e252c3

    SHA512

    963b5853a84acdc590d37d02a626bece2b27c179024a44a97dd25a1a42a76fbc5ccd1f8bba7618d48c4dee4c277e42597c167845b2225afec2062673b366a2ac

  • C:\Windows\{8CAF9C79-6C08-4124-914F-C880BB527977}.exe

    Filesize

    197KB

    MD5

    da7b11dd0d1e1e26a0b9f9c4d362a189

    SHA1

    80975a38fc69514d623f9870877a9ded467bd061

    SHA256

    f77392a6064cbdd3d982be924c571b08a6585a4f9175ef497e08816ed6a7ec34

    SHA512

    5ed6540548881ef824832d497b062d49be475b094281d7f681c06cffaa0838f408f6b19b23131bcb75d9fa142cb41329c54e0eef64ea5d2cb8daaa2785f7beb8

  • C:\Windows\{9B9ED9ED-101C-4b9a-9203-49C7884BBB20}.exe

    Filesize

    197KB

    MD5

    b325bdbb69b3d240fefbca1559574cb1

    SHA1

    54eaac93587ad12405ea35b48a590aeaa22b9618

    SHA256

    7ce64d06df737fb003a791976c74e554361e60309ee14825d2737f149a07dd22

    SHA512

    8889b930bb51eed2634b68318edcad5c4efe84239c3ea35640ac57ecef353169351cef1dd0c0f1c9b167cd24d72e58edff6d00514b2ad00a84c107aba4463f3a

  • C:\Windows\{B60E729A-E400-4e84-9DEB-E27ACF83559E}.exe

    Filesize

    197KB

    MD5

    9288d8eee73cb00fcf3077f910ca9580

    SHA1

    721030e3c27c5819430365509ad4ba43fda03309

    SHA256

    0bfada96081022280e8c2e6fae4bea2b2dbf1f8eb4106071f343731b1131e198

    SHA512

    111e983f13ee4bda91028779084f02a901ef10495d236b84bc0fd4f3c66a4b54848c47b875fcf79172b765d75966d40a30d36f298ed58ae365562e611fc4dc39

  • C:\Windows\{D0D6DFC5-8014-45dc-921D-41CF10CAAE53}.exe

    Filesize

    197KB

    MD5

    14ea3463fe5a0ede12cf362acd9aa3f0

    SHA1

    2c33f20cc8f961f93c4f483371b9cd5a423742f9

    SHA256

    cc0e581755eed1c575b5443b3ed02e0365e329a2577938a6bfdfab2ecd0bdc22

    SHA512

    2ce901f09e4c9d994f16858fe43fa250b15f2d78ddcf3ba8b5694a6ad3ea5b1a5aa074757a7c5261450fcc4d2925b4cb2aedd77b75fc79526d37440243fde21e

  • C:\Windows\{F8AB8B40-275F-4178-B1B1-10890B11578A}.exe

    Filesize

    197KB

    MD5

    314f3848a18ae00db7ae65c535a03617

    SHA1

    1151ba4b77fe932c003d43c77ddc8f5e9cc8b1ac

    SHA256

    7b18847ffadd83ab473c9cc026cf5170d7226ced491ce7f6dfb18fc0b711a1ac

    SHA512

    d8bacfcf64767f559278d67362eaec6b093d6a801007c428515495e48b1ccb2c1b14e811dccc5758440924f27cd436b24ce7cdd70a1776f1889cc9aa2a8b1ab3