Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    09/10/2024, 14:15 UTC

General

  • Target

    2024-10-09_978ab126b431bb83919a3bff477b9433_goldeneye.exe

  • Size

    344KB

  • MD5

    978ab126b431bb83919a3bff477b9433

  • SHA1

    ed385f772ab23bede85e42c8206b378913ba7e89

  • SHA256

    1f3017ebc849abe639130cf9d65c3ffd8bc52575face57e0047337f39e0ddfc0

  • SHA512

    cb6121643e2245a6df7be0c15897a3f91850525f7cd1d0bf7c2b07d6dfed94f38d6c9ce4acf7d12f88fedc4daa4998d22a7fc351da403c5eab91e8e900172830

  • SSDEEP

    3072:mEGh0ohlEOiDOe2MUVg3bHrH/HqOYGb+4QnZZIne+rcC4F0fJGRIS8Rfd7eQEcGL:mEGblqOe2MUVg3v2IneKcAEcA

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 23 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-09_978ab126b431bb83919a3bff477b9433_goldeneye.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-09_978ab126b431bb83919a3bff477b9433_goldeneye.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Windows\{74831560-5E99-4e45-AE0E-44C4A185F70B}.exe
      C:\Windows\{74831560-5E99-4e45-AE0E-44C4A185F70B}.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1636
      • C:\Windows\{BBE430F5-BEF5-4b59-B244-EB1BE93D8477}.exe
        C:\Windows\{BBE430F5-BEF5-4b59-B244-EB1BE93D8477}.exe
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2020
        • C:\Windows\{DB4DFC71-01CF-4eaa-B6D8-54FA24B0C62C}.exe
          C:\Windows\{DB4DFC71-01CF-4eaa-B6D8-54FA24B0C62C}.exe
          4⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1204
          • C:\Windows\{7E337938-4E75-4a84-BD51-273C79E36B17}.exe
            C:\Windows\{7E337938-4E75-4a84-BD51-273C79E36B17}.exe
            5⤵
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:772
            • C:\Windows\{FE1E783C-5DDA-4e76-AA98-8314E15A9365}.exe
              C:\Windows\{FE1E783C-5DDA-4e76-AA98-8314E15A9365}.exe
              6⤵
              • Boot or Logon Autostart Execution: Active Setup
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2676
              • C:\Windows\{C6124B36-D512-49bb-8FC3-B81860409F33}.exe
                C:\Windows\{C6124B36-D512-49bb-8FC3-B81860409F33}.exe
                7⤵
                • Boot or Logon Autostart Execution: Active Setup
                • Executes dropped EXE
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1964
                • C:\Windows\{44E2830B-2093-48b8-9C85-9790A255F8D7}.exe
                  C:\Windows\{44E2830B-2093-48b8-9C85-9790A255F8D7}.exe
                  8⤵
                  • Boot or Logon Autostart Execution: Active Setup
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2688
                  • C:\Windows\{383138AF-4155-455c-B0FE-FF2FFEB67847}.exe
                    C:\Windows\{383138AF-4155-455c-B0FE-FF2FFEB67847}.exe
                    9⤵
                    • Boot or Logon Autostart Execution: Active Setup
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2916
                    • C:\Windows\{26134B1E-C9FF-4f71-918C-78D7CAE0C849}.exe
                      C:\Windows\{26134B1E-C9FF-4f71-918C-78D7CAE0C849}.exe
                      10⤵
                      • Boot or Logon Autostart Execution: Active Setup
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3052
                      • C:\Windows\{426B16E0-2B01-4760-AC1A-A7A7EE76FC42}.exe
                        C:\Windows\{426B16E0-2B01-4760-AC1A-A7A7EE76FC42}.exe
                        11⤵
                        • Boot or Logon Autostart Execution: Active Setup
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2044
                        • C:\Windows\{BFD37B2F-3D11-45fc-95CD-7787DE8972EA}.exe
                          C:\Windows\{BFD37B2F-3D11-45fc-95CD-7787DE8972EA}.exe
                          12⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:2224
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{426B1~1.EXE > nul
                          12⤵
                          • System Location Discovery: System Language Discovery
                          PID:596
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c del C:\Windows\{26134~1.EXE > nul
                        11⤵
                        • System Location Discovery: System Language Discovery
                        PID:2316
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{38313~1.EXE > nul
                      10⤵
                      • System Location Discovery: System Language Discovery
                      PID:3004
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{44E28~1.EXE > nul
                    9⤵
                    • System Location Discovery: System Language Discovery
                    PID:2504
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{C6124~1.EXE > nul
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:3000
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c del C:\Windows\{FE1E7~1.EXE > nul
                7⤵
                • System Location Discovery: System Language Discovery
                PID:352
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c del C:\Windows\{7E337~1.EXE > nul
              6⤵
              • System Location Discovery: System Language Discovery
              PID:976
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{DB4DF~1.EXE > nul
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2648
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{BBE43~1.EXE > nul
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2716
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Windows\{74831~1.EXE > nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2748
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2024-1~1.EXE > nul
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\{26134B1E-C9FF-4f71-918C-78D7CAE0C849}.exe

    Filesize

    344KB

    MD5

    13f722ae5f2b3153842bd9d23473507a

    SHA1

    c65398d5b2612a443cd247056ec2b75833284370

    SHA256

    522434d2fbbdeedcccb70beab326cca5ba207b9b48645092ceaccaf0a87b8896

    SHA512

    bfd9efbc9d8d9689ff58479fbaef1b394de09506adaf648e0ecaad7bb5834ed82b8d4a449366edfe3b9ef6195368353ad90cedeabbdb1688560649258a1c5e0d

  • C:\Windows\{383138AF-4155-455c-B0FE-FF2FFEB67847}.exe

    Filesize

    344KB

    MD5

    42599caf58eda3a65dc8fe5839dbc60f

    SHA1

    ae5b77e08bb1952853b0df61a720a1061bb4722c

    SHA256

    d028581c15889ec891bc9070824b42d58dca10e50d443b3e9197ead635c577ed

    SHA512

    54e9a6594d091cc9c65bfbed188850152a0be0168a93419f51cf5dd69faa617fececbc8b9838d16cd69e4489b7de6b8acc2f77094e8dbbf5903eb409972f77fa

  • C:\Windows\{426B16E0-2B01-4760-AC1A-A7A7EE76FC42}.exe

    Filesize

    344KB

    MD5

    3ed95947051172d97e0185f411857974

    SHA1

    f2438222cce478c89f7a23470036138c01a55fb6

    SHA256

    29da51f53509a210538c9be88fe0ab689902a7b73e0c57074bb15628ac53dcf0

    SHA512

    89b8ae4f5f102cfb2801890067e21f5a91c4b11da011d8bd33431328ca3601b168483b379b4aaafe7555dad79019d944248eec2de8e396ad27f5c295c6266e01

  • C:\Windows\{44E2830B-2093-48b8-9C85-9790A255F8D7}.exe

    Filesize

    344KB

    MD5

    00ec79f74058c502848147d42edc5d15

    SHA1

    3b9a3b6688ae31061ea64f93f892bea038b59806

    SHA256

    ffe1e6023a767a54456922e2b52c9bed5321e97b64bc9a01455cbe727ce6ef9c

    SHA512

    2f1d811cb0706b02c0c1211b10fc9fe50cba92cf40e41157ac73aceb2b54df6708b3e50f756275b3c0b6b74d0a4ef735fcb092a6f4654b6b71d8cc7b023e38b9

  • C:\Windows\{74831560-5E99-4e45-AE0E-44C4A185F70B}.exe

    Filesize

    344KB

    MD5

    9ef2b9bea2db7a4c0809b283e57f80a8

    SHA1

    6eb9f39adba36f8ce881da47ac237260c697d9d2

    SHA256

    8f4e9b119435f0005e09c17bd5263140206a94e2e0e1fe2412784cc28390ef0c

    SHA512

    a21b3530de93bdf4680bb7596aabeb3561b7b711c5afdd5ea5530573a8cc3b6a5b0865048f0223ff2871b583e5125ee4a62b49c9bf5c8c6914c08eff38b1f089

  • C:\Windows\{7E337938-4E75-4a84-BD51-273C79E36B17}.exe

    Filesize

    344KB

    MD5

    28c597168af330c365c1b1cf7b3f6f17

    SHA1

    9d91a63244ec9d81d66c1228ee98ed8dbd91174f

    SHA256

    db385d6b1dd2172eaa6ff6fd882c3cc9da1fc68f53bda8442edc3d333bf4b487

    SHA512

    6114b6c2b0f267951596743060784d0bb06893f043c8c8c2d816e15e9802d6e9ee9ae74954ebb2b1833a84520265857e9bbf0788deca6dfbccdd4f3e055b2aa5

  • C:\Windows\{BBE430F5-BEF5-4b59-B244-EB1BE93D8477}.exe

    Filesize

    344KB

    MD5

    c692e934ab59f575b2087cbc54a0fde5

    SHA1

    3b703caa235087d820f074bd6b1dcdafadd37b26

    SHA256

    f482ffea79688fd6e24732feb0d34c5f5d4d621e74ae730b15cd83933f0ff47c

    SHA512

    75224ccf69563b2e6138ce7dce42e6665561ff98d10685803a0f7bffb105a07a592342362e949ab08264703d42b14eff4eb5206f820de5a553c5a3355445b934

  • C:\Windows\{BFD37B2F-3D11-45fc-95CD-7787DE8972EA}.exe

    Filesize

    344KB

    MD5

    0fa98a5cf7a6c330d3183bddf4ea3484

    SHA1

    5efb526b22ad0f0c685337436231d96bbd287287

    SHA256

    8bba611dd6875456778e37675fdbba00a7e0a2641f8532bee3d865cb57f079eb

    SHA512

    d9943c41ef37f2720b3db6627f7eed6e6971b7049f46d4365fd48ca3f9b17b49790a8d0d21e4ac451e1d98ce59fcdd6b623acd6076c6868ee5ae1ff23a8d310d

  • C:\Windows\{C6124B36-D512-49bb-8FC3-B81860409F33}.exe

    Filesize

    344KB

    MD5

    8cb583370a377a7de99a9e99e0b93d8b

    SHA1

    d51b06aac14930bae6c1a2a55f714e75d04d5cb0

    SHA256

    2e8b557a431a06019ad223e329b12c99f6065c735e79021c4dc59d5d7de58544

    SHA512

    adf7bade473bc8466ba5d245766d8761d176bb99ffcd875730a94641e8d8ae4e6b4d0635b14d933f7d355eccda148896385cec4f83911727b78b1d2c4c718b48

  • C:\Windows\{DB4DFC71-01CF-4eaa-B6D8-54FA24B0C62C}.exe

    Filesize

    344KB

    MD5

    646ea7e7297e2b742d64b2a64603712c

    SHA1

    422a6fdcfd1260544d1d37aa40f226f591244746

    SHA256

    eadee29c3da56d682f2ac3dd3f1be67a93007351e292fa203e038aeb567b9df7

    SHA512

    f3bf44dafec6e1b25f91a063cb8d6720804271f1e1516195522fcfb575f9ef44127b12513d09caf0faf388d2386291f2d656d01e7e0aeda77d008e2427f8ffa8

  • C:\Windows\{FE1E783C-5DDA-4e76-AA98-8314E15A9365}.exe

    Filesize

    344KB

    MD5

    c8c2ff92e4ecaa9cd8e55382d815950d

    SHA1

    7f9eea3bfb0e4fd5da88c5d45ee87f5a03357984

    SHA256

    b2bd88f69a0d3d62546e8549082825568a4019bed1b22771166b8bd9b5d31b64

    SHA512

    fd35ae06a46c05ed7fa45c81a511b2d085606f449961162ba8fa0bfc655b1253cea77a6b1d0370a51fec90d8355e2c186caac8d76e72d2a3fe20c2ee02a397a5

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.