Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/09/2024, 08:41

General

  • Target

    2024-09-30_26e975bec91a0df81506da4aa3abe222_goldeneye.exe

  • Size

    408KB

  • MD5

    26e975bec91a0df81506da4aa3abe222

  • SHA1

    aa42716b91cd3d8f5c6ad12c49a73a04830de962

  • SHA256

    bb1083acc6049b71b281fbbff5ebbc0683515826d3dc2fadfce821e5562aea11

  • SHA512

    b30f30b008fe05aeec4577264a82597e77f2bafb8f56179903fa620903fb3d849dfc9cb205de89bbdbaace1e5000a7ed5dd471398a6bd704e418309398048edc

  • SSDEEP

    3072:CEGh0o4l3OiNOe2MUVg3bHrH/HqOYGte+rcC4F0fJGRIS8Rfd7eQEcGcrTutTBf3:CEGqldOe2MUVg3vTeKcAEciTBqr3jy

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 24 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 25 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-09-30_26e975bec91a0df81506da4aa3abe222_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-09-30_26e975bec91a0df81506da4aa3abe222_goldeneye.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3444
    • C:\Windows\{DAB7939D-2246-4951-B87B-EE026DE51788}.exe
      C:\Windows\{DAB7939D-2246-4951-B87B-EE026DE51788}.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2124
      • C:\Windows\{D5A52997-E75D-4df5-9209-CFD123BDBD42}.exe
        C:\Windows\{D5A52997-E75D-4df5-9209-CFD123BDBD42}.exe
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:640
        • C:\Windows\{50F1782E-AA3B-471e-872B-BC3DE4D47C84}.exe
          C:\Windows\{50F1782E-AA3B-471e-872B-BC3DE4D47C84}.exe
          4⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2736
          • C:\Windows\{9002ACE1-CD08-49d8-9EA9-B71188C44143}.exe
            C:\Windows\{9002ACE1-CD08-49d8-9EA9-B71188C44143}.exe
            5⤵
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4012
            • C:\Windows\{D46330C1-9425-4177-934E-29F6A7398F80}.exe
              C:\Windows\{D46330C1-9425-4177-934E-29F6A7398F80}.exe
              6⤵
              • Boot or Logon Autostart Execution: Active Setup
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1248
              • C:\Windows\{E838AD28-C1B5-4c23-9534-D8B3BA44D113}.exe
                C:\Windows\{E838AD28-C1B5-4c23-9534-D8B3BA44D113}.exe
                7⤵
                • Boot or Logon Autostart Execution: Active Setup
                • Executes dropped EXE
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:116
                • C:\Windows\{2BC2942A-7A91-4fbb-A217-9AF6253E3CC2}.exe
                  C:\Windows\{2BC2942A-7A91-4fbb-A217-9AF6253E3CC2}.exe
                  8⤵
                  • Boot or Logon Autostart Execution: Active Setup
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:4804
                  • C:\Windows\{114851DE-5B37-458a-89E7-D626368FE3C3}.exe
                    C:\Windows\{114851DE-5B37-458a-89E7-D626368FE3C3}.exe
                    9⤵
                    • Boot or Logon Autostart Execution: Active Setup
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:1136
                    • C:\Windows\{036B04B3-DCA9-452e-9F84-43B7FC287095}.exe
                      C:\Windows\{036B04B3-DCA9-452e-9F84-43B7FC287095}.exe
                      10⤵
                      • Boot or Logon Autostart Execution: Active Setup
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:4392
                      • C:\Windows\{EDC17175-4202-4c65-9038-6C8515E3F175}.exe
                        C:\Windows\{EDC17175-4202-4c65-9038-6C8515E3F175}.exe
                        11⤵
                        • Boot or Logon Autostart Execution: Active Setup
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:2368
                        • C:\Windows\{4FBF029D-58A5-41c5-8BC5-C22E76A7532B}.exe
                          C:\Windows\{4FBF029D-58A5-41c5-8BC5-C22E76A7532B}.exe
                          12⤵
                          • Boot or Logon Autostart Execution: Active Setup
                          • Drops file in Windows directory
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:432
                          • C:\Windows\{0AADCCEB-D567-4c64-AE99-1B92A90B5BF5}.exe
                            C:\Windows\{0AADCCEB-D567-4c64-AE99-1B92A90B5BF5}.exe
                            13⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:1292
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c del C:\Windows\{4FBF0~1.EXE > nul
                            13⤵
                            • System Location Discovery: System Language Discovery
                            PID:3100
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{EDC17~1.EXE > nul
                          12⤵
                          • System Location Discovery: System Language Discovery
                          PID:1244
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c del C:\Windows\{036B0~1.EXE > nul
                        11⤵
                        • System Location Discovery: System Language Discovery
                        PID:2868
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{11485~1.EXE > nul
                      10⤵
                      • System Location Discovery: System Language Discovery
                      PID:1488
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{2BC29~1.EXE > nul
                    9⤵
                    • System Location Discovery: System Language Discovery
                    PID:3968
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{E838A~1.EXE > nul
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:5028
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c del C:\Windows\{D4633~1.EXE > nul
                7⤵
                • System Location Discovery: System Language Discovery
                PID:2912
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c del C:\Windows\{9002A~1.EXE > nul
              6⤵
              • System Location Discovery: System Language Discovery
              PID:976
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{50F17~1.EXE > nul
            5⤵
            • System Location Discovery: System Language Discovery
            PID:4424
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{D5A52~1.EXE > nul
          4⤵
          • System Location Discovery: System Language Discovery
          PID:5088
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Windows\{DAB79~1.EXE > nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1560
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-0~1.EXE > nul
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\{036B04B3-DCA9-452e-9F84-43B7FC287095}.exe

    Filesize

    408KB

    MD5

    0b85fadb4b1df58f2cfd8bc6541ca330

    SHA1

    4edf25add8e27ffeacebbd4884a0bd7cd527bba7

    SHA256

    02e2b4061e44286d6572f69fbc08f47a244c69d892e75334857271f68b261507

    SHA512

    eec845c8b0f8c6abe1dac44183d9cb99dfec96f121dd3697c2fa633c9fb1ecf0b9eb476e83621c471eea53d94381dc40fb429345eeb4372077f48ad4b1413c77

  • C:\Windows\{0AADCCEB-D567-4c64-AE99-1B92A90B5BF5}.exe

    Filesize

    408KB

    MD5

    d868a8cd0b38d91f41acd4fbbc08f14e

    SHA1

    21211d21da3a641531c6ee8fa102c36951530590

    SHA256

    8e7a78fdcfff3fc8c72be69b8653ae42960d58eba12f0a855f1b2983fa77b093

    SHA512

    b0659686aa3bf1c79d36460154ec244c5f0d60aba940f2b1b14c3618b914352acba7b922b89e4d5bea5cca8b57bbddbec3fd04f84894bf5dbdf782982e5c103e

  • C:\Windows\{114851DE-5B37-458a-89E7-D626368FE3C3}.exe

    Filesize

    408KB

    MD5

    4e6c741dd345ed4629013898e65ac8db

    SHA1

    4f40254c8cbfdc0ad30e57e0b63d6339a12c2f69

    SHA256

    fc3e950826b0a8ed4ec75b54ec32244832ab9394592b03f4ca780a1f6f61d8e4

    SHA512

    4fb9d1b5bf665c35c0a6c8a0307a5c9e8bfe741c52130c1d51fb0d3d503853e73c655c240f475d2e44131e596a5817663c292731deb88072d316c10c666b3307

  • C:\Windows\{2BC2942A-7A91-4fbb-A217-9AF6253E3CC2}.exe

    Filesize

    408KB

    MD5

    8a46bdbc93e6d789b0af8f94ed5096db

    SHA1

    714ff12baacb43983e2a62214784e8dc629337e8

    SHA256

    9bced21478f565b2f567ab2b8cba40d39f75da65d8af33b029d64748ed5eed51

    SHA512

    b19c4f77b840b338e4bdea4bba6dad04440e9af71d3ea7df1c1e29ec12f86889f31d837b5aaa8b1a2c57220c2556347b326f78d14763c35312f5bd5d42ebe04f

  • C:\Windows\{50F1782E-AA3B-471e-872B-BC3DE4D47C84}.exe

    Filesize

    408KB

    MD5

    64de1007bd7594055e0277d5a694aed7

    SHA1

    490c5ba26c9bea002be042540e836f7c02327729

    SHA256

    b0f1e6d64c01f46dc5bd34439858d7f49e40bc82db3530e323e5aa603f3069af

    SHA512

    b0058d4dbbdd822c365528c68146a0ab386170353a08b7c45644b6bd02c2a1a9a98fbb64268291dd812335f149e22ccc2029aecb69356954048eacfe9ef2d7c6

  • C:\Windows\{9002ACE1-CD08-49d8-9EA9-B71188C44143}.exe

    Filesize

    408KB

    MD5

    c59cf485f26005afcd3a4dfa73691f6a

    SHA1

    8b960f4ed8b86347ed08e0090bed55f0b5f3c572

    SHA256

    329303bbaa0b96ae3d03ac24341cf0ec8e50599ce2b95d70c3a78223607dfa6b

    SHA512

    a4c749b6671b1b5b1e12a200ee42c214bef514a17898a5e8fb4bd86cce7a80007124c1785fff4a3262b8f599c6a00d4293b326f998a0a3504140e06972ef4f92

  • C:\Windows\{D46330C1-9425-4177-934E-29F6A7398F80}.exe

    Filesize

    408KB

    MD5

    397dfdfa4c0f3c038c4ad6406718c519

    SHA1

    696e491ae285e02afc32666c3569002303874b64

    SHA256

    6ca22f9d7c68e1ae47d2020aba13d5a116334d08083c08bf06fa4d488c3b8845

    SHA512

    8ae5e6924e1acf6eb36440e55ddcfb976d2fbaa25e560f9638c6eaae293131aadbb5688ddbfec02ffa8ab0729ddce566ef107aba8f2f769aab615fbc47c4a52f

  • C:\Windows\{D5A52997-E75D-4df5-9209-CFD123BDBD42}.exe

    Filesize

    408KB

    MD5

    d65cd1fc98f04edde7ac1055a6831662

    SHA1

    1f174340decfad3619e4f24f2c40a5a8bc2a0f27

    SHA256

    1a7bd3d4a41bc96e9e9bb70f36aa5b37f87b31666e5f701acbdf0bff1dd0d1bb

    SHA512

    d0cf4e9f73f6c6c95324abc4ed483a2c2aa2e2fa53772b6802334641068aa2484ca1036d24f0ac8fb49adf4d840d5dd36bc9341ff93a6d1c490623e5699c0766

  • C:\Windows\{DAB7939D-2246-4951-B87B-EE026DE51788}.exe

    Filesize

    408KB

    MD5

    1b9157238186d38285d53ca96d24ebba

    SHA1

    48d037b7a2329442aeadad92a0c9e2189411d1c2

    SHA256

    124fddf6eecdcf3bf9a610258bb9d2326976fcf44d92b025c7c16f827d044fba

    SHA512

    f70567f600f7731670d03c01d1859c6a0864bed361fb47d527546619e42906aa59babe8299312455b577a6e5698879ce35305cd93bb3205346746afef0dfa8ea

  • C:\Windows\{E838AD28-C1B5-4c23-9534-D8B3BA44D113}.exe

    Filesize

    408KB

    MD5

    35822e0da20aa1f28ed25ea4209b15bb

    SHA1

    013707424a5e777a9d1fd385b399665846ad4832

    SHA256

    d0704ab4271cdf46307f3bf57fef9ccdb4a0ad36453b4ab2e74431e1ff6feab2

    SHA512

    cf89316dd7b4ef20ba63853457fd328379a296eb94e0b1b70a55c376786c4f564675935d0e982cc1c00b633762199c459a4b3a609ad8d249a244d5d408087118

  • C:\Windows\{EDC17175-4202-4c65-9038-6C8515E3F175}.exe

    Filesize

    408KB

    MD5

    725cd4135c52318f499bb73b0f6ca37f

    SHA1

    6e5a7dee1d80f37f67b513c24744a689770ed560

    SHA256

    39ead751512e9e5cf3de3aae5230e5405b3e5f600851f19862be5edc62df3714

    SHA512

    ac8d246e37ff2bcb80f719294fe6af99f12ad09542d7ade7349f4620bc9eeea900feb23378b5cd1275c4daeac40fea117cba911023d42d6e374dcbaaf2c52fdb