Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1199s -
max time network
996s -
platform
windows7_x64 -
resource
win7-en -
submitted
05/09/2021, 20:33
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.GenericKD.46929464.6664.11196.exe
Resource
win7-en
General
-
Target
SecuriteInfo.com.Trojan.GenericKD.46929464.6664.11196.exe
-
Size
188KB
-
MD5
590459b833a0d6846c570d35e7f3344d
-
SHA1
b095954830b51651520990b275220bf50cc89a4b
-
SHA256
57b2efd438bf6c7eb64a4a2d454f215361e2f96ac4bd50284b89c64742bc307a
-
SHA512
cac850af0eefa7d3aede5556f9b1d9ed0c70aebfd5518ac80a5966f7900cea32a76534ea303e6def62b1ec78a942622359be01562d7dbb9e44a7c74a2bac20c7
Malware Config
Signatures
-
Executes dropped EXE 20 IoCs
pid Process 1068 moduleName.exe 1904 moduleName.exe 1628 moduleName.exe 1760 moduleName.exe 1648 moduleName.exe 1292 moduleName.exe 1424 moduleName.exe 1196 moduleName.exe 1512 moduleName.exe 840 moduleName.exe 780 moduleName.exe 1660 moduleName.exe 1292 moduleName.exe 1916 moduleName.exe 1552 moduleName.exe 1548 moduleName.exe 912 moduleName.exe 1924 moduleName.exe 1472 moduleName.exe 320 moduleName.exe -
Loads dropped DLL 21 IoCs
pid Process 1076 SecuriteInfo.com.Trojan.GenericKD.46929464.6664.11196.exe 1068 moduleName.exe 1904 moduleName.exe 1628 moduleName.exe 1760 moduleName.exe 1648 moduleName.exe 1292 moduleName.exe 1424 moduleName.exe 1196 moduleName.exe 1512 moduleName.exe 840 moduleName.exe 780 moduleName.exe 1660 moduleName.exe 1292 moduleName.exe 1916 moduleName.exe 1552 moduleName.exe 1548 moduleName.exe 912 moduleName.exe 1924 moduleName.exe 1472 moduleName.exe 320 moduleName.exe -
Obfuscated with Agile.Net obfuscator 21 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/files/0x0001000000012f28-60.dat agile_net behavioral1/files/0x0001000000012f28-61.dat agile_net behavioral1/files/0x0001000000012f28-69.dat agile_net behavioral1/files/0x0001000000012f28-76.dat agile_net behavioral1/files/0x0001000000012f28-83.dat agile_net behavioral1/files/0x0001000000012f28-90.dat agile_net behavioral1/files/0x0001000000012f28-97.dat agile_net behavioral1/files/0x0001000000012f28-104.dat agile_net behavioral1/files/0x0001000000012f28-111.dat agile_net behavioral1/files/0x0001000000012f28-118.dat agile_net behavioral1/files/0x0001000000012f28-125.dat agile_net behavioral1/files/0x0001000000012f28-132.dat agile_net behavioral1/files/0x0001000000012f28-139.dat agile_net behavioral1/files/0x0001000000012f28-146.dat agile_net behavioral1/files/0x0001000000012f28-153.dat agile_net behavioral1/files/0x0001000000012f28-160.dat agile_net behavioral1/files/0x0001000000012f28-167.dat agile_net behavioral1/files/0x0001000000012f28-174.dat agile_net behavioral1/files/0x0001000000012f28-181.dat agile_net behavioral1/files/0x0001000000012f28-188.dat agile_net behavioral1/files/0x0001000000012f28-195.dat agile_net -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1720 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1076 SecuriteInfo.com.Trojan.GenericKD.46929464.6664.11196.exe 1076 SecuriteInfo.com.Trojan.GenericKD.46929464.6664.11196.exe 1076 SecuriteInfo.com.Trojan.GenericKD.46929464.6664.11196.exe 1076 SecuriteInfo.com.Trojan.GenericKD.46929464.6664.11196.exe 1076 SecuriteInfo.com.Trojan.GenericKD.46929464.6664.11196.exe 1076 SecuriteInfo.com.Trojan.GenericKD.46929464.6664.11196.exe 1068 moduleName.exe 1068 moduleName.exe 1068 moduleName.exe 1068 moduleName.exe 1068 moduleName.exe 1068 moduleName.exe 1068 moduleName.exe 1904 moduleName.exe 1904 moduleName.exe 1904 moduleName.exe 1904 moduleName.exe 1904 moduleName.exe 1904 moduleName.exe 1628 moduleName.exe 1628 moduleName.exe 1628 moduleName.exe 1628 moduleName.exe 1628 moduleName.exe 1628 moduleName.exe 1628 moduleName.exe 1760 moduleName.exe 1760 moduleName.exe 1760 moduleName.exe 1760 moduleName.exe 1760 moduleName.exe 1760 moduleName.exe 1648 moduleName.exe 1648 moduleName.exe 1648 moduleName.exe 1648 moduleName.exe 1648 moduleName.exe 1648 moduleName.exe 1292 moduleName.exe 1292 moduleName.exe 1292 moduleName.exe 1292 moduleName.exe 1292 moduleName.exe 1292 moduleName.exe 1424 moduleName.exe 1424 moduleName.exe 1424 moduleName.exe 1424 moduleName.exe 1424 moduleName.exe 1424 moduleName.exe 1196 moduleName.exe 1196 moduleName.exe 1196 moduleName.exe 1196 moduleName.exe 1196 moduleName.exe 1196 moduleName.exe 1196 moduleName.exe 1512 moduleName.exe 1512 moduleName.exe 1512 moduleName.exe 1512 moduleName.exe 1512 moduleName.exe 1512 moduleName.exe 1512 moduleName.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 1076 SecuriteInfo.com.Trojan.GenericKD.46929464.6664.11196.exe Token: SeDebugPrivilege 1068 moduleName.exe Token: SeDebugPrivilege 1904 moduleName.exe Token: SeDebugPrivilege 1628 moduleName.exe Token: SeDebugPrivilege 1760 moduleName.exe Token: SeDebugPrivilege 1648 moduleName.exe Token: SeDebugPrivilege 1292 moduleName.exe Token: SeDebugPrivilege 1424 moduleName.exe Token: SeDebugPrivilege 1196 moduleName.exe Token: SeDebugPrivilege 1512 moduleName.exe Token: SeDebugPrivilege 840 moduleName.exe Token: SeDebugPrivilege 780 moduleName.exe Token: SeDebugPrivilege 1660 moduleName.exe Token: SeDebugPrivilege 1292 moduleName.exe Token: SeDebugPrivilege 1916 moduleName.exe Token: SeDebugPrivilege 1552 moduleName.exe Token: SeDebugPrivilege 1548 moduleName.exe Token: SeDebugPrivilege 912 moduleName.exe Token: SeDebugPrivilege 1924 moduleName.exe Token: SeDebugPrivilege 1472 moduleName.exe Token: SeDebugPrivilege 320 moduleName.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 1076 wrote to memory of 1720 1076 SecuriteInfo.com.Trojan.GenericKD.46929464.6664.11196.exe 26 PID 1076 wrote to memory of 1720 1076 SecuriteInfo.com.Trojan.GenericKD.46929464.6664.11196.exe 26 PID 1076 wrote to memory of 1720 1076 SecuriteInfo.com.Trojan.GenericKD.46929464.6664.11196.exe 26 PID 1184 wrote to memory of 1068 1184 taskeng.exe 33 PID 1184 wrote to memory of 1068 1184 taskeng.exe 33 PID 1184 wrote to memory of 1068 1184 taskeng.exe 33 PID 1184 wrote to memory of 1904 1184 taskeng.exe 34 PID 1184 wrote to memory of 1904 1184 taskeng.exe 34 PID 1184 wrote to memory of 1904 1184 taskeng.exe 34 PID 1184 wrote to memory of 1628 1184 taskeng.exe 35 PID 1184 wrote to memory of 1628 1184 taskeng.exe 35 PID 1184 wrote to memory of 1628 1184 taskeng.exe 35 PID 1184 wrote to memory of 1760 1184 taskeng.exe 36 PID 1184 wrote to memory of 1760 1184 taskeng.exe 36 PID 1184 wrote to memory of 1760 1184 taskeng.exe 36 PID 1184 wrote to memory of 1648 1184 taskeng.exe 37 PID 1184 wrote to memory of 1648 1184 taskeng.exe 37 PID 1184 wrote to memory of 1648 1184 taskeng.exe 37 PID 1184 wrote to memory of 1292 1184 taskeng.exe 38 PID 1184 wrote to memory of 1292 1184 taskeng.exe 38 PID 1184 wrote to memory of 1292 1184 taskeng.exe 38 PID 1184 wrote to memory of 1424 1184 taskeng.exe 39 PID 1184 wrote to memory of 1424 1184 taskeng.exe 39 PID 1184 wrote to memory of 1424 1184 taskeng.exe 39 PID 1184 wrote to memory of 1196 1184 taskeng.exe 40 PID 1184 wrote to memory of 1196 1184 taskeng.exe 40 PID 1184 wrote to memory of 1196 1184 taskeng.exe 40 PID 1184 wrote to memory of 1512 1184 taskeng.exe 41 PID 1184 wrote to memory of 1512 1184 taskeng.exe 41 PID 1184 wrote to memory of 1512 1184 taskeng.exe 41 PID 1184 wrote to memory of 840 1184 taskeng.exe 42 PID 1184 wrote to memory of 840 1184 taskeng.exe 42 PID 1184 wrote to memory of 840 1184 taskeng.exe 42 PID 1184 wrote to memory of 780 1184 taskeng.exe 43 PID 1184 wrote to memory of 780 1184 taskeng.exe 43 PID 1184 wrote to memory of 780 1184 taskeng.exe 43 PID 1184 wrote to memory of 1660 1184 taskeng.exe 44 PID 1184 wrote to memory of 1660 1184 taskeng.exe 44 PID 1184 wrote to memory of 1660 1184 taskeng.exe 44 PID 1184 wrote to memory of 1292 1184 taskeng.exe 45 PID 1184 wrote to memory of 1292 1184 taskeng.exe 45 PID 1184 wrote to memory of 1292 1184 taskeng.exe 45 PID 1184 wrote to memory of 1916 1184 taskeng.exe 46 PID 1184 wrote to memory of 1916 1184 taskeng.exe 46 PID 1184 wrote to memory of 1916 1184 taskeng.exe 46 PID 1184 wrote to memory of 1552 1184 taskeng.exe 47 PID 1184 wrote to memory of 1552 1184 taskeng.exe 47 PID 1184 wrote to memory of 1552 1184 taskeng.exe 47 PID 1184 wrote to memory of 1548 1184 taskeng.exe 48 PID 1184 wrote to memory of 1548 1184 taskeng.exe 48 PID 1184 wrote to memory of 1548 1184 taskeng.exe 48 PID 1184 wrote to memory of 912 1184 taskeng.exe 49 PID 1184 wrote to memory of 912 1184 taskeng.exe 49 PID 1184 wrote to memory of 912 1184 taskeng.exe 49 PID 1184 wrote to memory of 1924 1184 taskeng.exe 50 PID 1184 wrote to memory of 1924 1184 taskeng.exe 50 PID 1184 wrote to memory of 1924 1184 taskeng.exe 50 PID 1184 wrote to memory of 1472 1184 taskeng.exe 51 PID 1184 wrote to memory of 1472 1184 taskeng.exe 51 PID 1184 wrote to memory of 1472 1184 taskeng.exe 51 PID 1184 wrote to memory of 320 1184 taskeng.exe 52 PID 1184 wrote to memory of 320 1184 taskeng.exe 52 PID 1184 wrote to memory of 320 1184 taskeng.exe 52
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46929464.6664.11196.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.46929464.6664.11196.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN Windows\Framework\MicrosoftSecurityEssentials /XML "C:\ProgramData\BC100BA15203137C9F10\task"2⤵
- Creates scheduled task(s)
PID:1720
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {78B61454-0668-4532-A0B1-ECAB56C48B8C} S-1-5-21-1669990088-476967504-438132596-1000:KJUCCLUP\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\ProgramData\BC100BA15203137C9F10\moduleName.exeC:\ProgramData\BC100BA15203137C9F10\moduleName.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1068
-
-
C:\ProgramData\BC100BA15203137C9F10\moduleName.exeC:\ProgramData\BC100BA15203137C9F10\moduleName.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
-
C:\ProgramData\BC100BA15203137C9F10\moduleName.exeC:\ProgramData\BC100BA15203137C9F10\moduleName.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
-
C:\ProgramData\BC100BA15203137C9F10\moduleName.exeC:\ProgramData\BC100BA15203137C9F10\moduleName.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1760
-
-
C:\ProgramData\BC100BA15203137C9F10\moduleName.exeC:\ProgramData\BC100BA15203137C9F10\moduleName.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1648
-
-
C:\ProgramData\BC100BA15203137C9F10\moduleName.exeC:\ProgramData\BC100BA15203137C9F10\moduleName.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1292
-
-
C:\ProgramData\BC100BA15203137C9F10\moduleName.exeC:\ProgramData\BC100BA15203137C9F10\moduleName.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1424
-
-
C:\ProgramData\BC100BA15203137C9F10\moduleName.exeC:\ProgramData\BC100BA15203137C9F10\moduleName.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1196
-
-
C:\ProgramData\BC100BA15203137C9F10\moduleName.exeC:\ProgramData\BC100BA15203137C9F10\moduleName.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
-
C:\ProgramData\BC100BA15203137C9F10\moduleName.exeC:\ProgramData\BC100BA15203137C9F10\moduleName.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:840
-
-
C:\ProgramData\BC100BA15203137C9F10\moduleName.exeC:\ProgramData\BC100BA15203137C9F10\moduleName.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:780
-
-
C:\ProgramData\BC100BA15203137C9F10\moduleName.exeC:\ProgramData\BC100BA15203137C9F10\moduleName.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1660
-
-
C:\ProgramData\BC100BA15203137C9F10\moduleName.exeC:\ProgramData\BC100BA15203137C9F10\moduleName.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1292
-
-
C:\ProgramData\BC100BA15203137C9F10\moduleName.exeC:\ProgramData\BC100BA15203137C9F10\moduleName.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1916
-
-
C:\ProgramData\BC100BA15203137C9F10\moduleName.exeC:\ProgramData\BC100BA15203137C9F10\moduleName.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1552
-
-
C:\ProgramData\BC100BA15203137C9F10\moduleName.exeC:\ProgramData\BC100BA15203137C9F10\moduleName.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
-
C:\ProgramData\BC100BA15203137C9F10\moduleName.exeC:\ProgramData\BC100BA15203137C9F10\moduleName.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:912
-
-
C:\ProgramData\BC100BA15203137C9F10\moduleName.exeC:\ProgramData\BC100BA15203137C9F10\moduleName.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1924
-
-
C:\ProgramData\BC100BA15203137C9F10\moduleName.exeC:\ProgramData\BC100BA15203137C9F10\moduleName.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
-
C:\ProgramData\BC100BA15203137C9F10\moduleName.exeC:\ProgramData\BC100BA15203137C9F10\moduleName.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:320
-