Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
13/09/2022, 11:25
Static task
static1
Behavioral task
behavioral1
Sample
5.exe
Resource
win7-20220812-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
5.exe
Resource
win10v2004-20220812-en
6 signatures
150 seconds
General
-
Target
5.exe
-
Size
722KB
-
MD5
fe0194467e3ecfecf01cec42ce795e44
-
SHA1
17b93e4dd17d4d83b28c7eb42591813084066ae1
-
SHA256
6d64ccd1e87189818fd18725919496b4a8a8f1d561c9eddd876a07a684d86e23
-
SHA512
a32603d19e33f1c998fe5cbec177e20f150ff2db69f1caee157e2ca206b151bdbfb4abd8ea06853797354b136f3b5746c822303046f2e3b6bdfef1d4892fdcba
-
SSDEEP
12288:TYtiUtSIfqvYBSqlA8gDR3lRsvBwrWbKACaJD8gFh1:GiUtPqABSqijDFMBwar4gFh1
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\dfghjhgfddfghjhg = "C:\\Users\\Admin\\Documents\\Inw)9876567849-4976456478.exe" reg.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 1740 PING.EXE 1912 PING.EXE 1436 PING.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 752 5.exe 752 5.exe 752 5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 752 5.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 752 wrote to memory of 2000 752 5.exe 28 PID 752 wrote to memory of 2000 752 5.exe 28 PID 752 wrote to memory of 2000 752 5.exe 28 PID 752 wrote to memory of 2000 752 5.exe 28 PID 2000 wrote to memory of 1740 2000 cmd.exe 30 PID 2000 wrote to memory of 1740 2000 cmd.exe 30 PID 2000 wrote to memory of 1740 2000 cmd.exe 30 PID 2000 wrote to memory of 1740 2000 cmd.exe 30 PID 752 wrote to memory of 1764 752 5.exe 31 PID 752 wrote to memory of 1764 752 5.exe 31 PID 752 wrote to memory of 1764 752 5.exe 31 PID 752 wrote to memory of 1764 752 5.exe 31 PID 1764 wrote to memory of 1912 1764 cmd.exe 33 PID 1764 wrote to memory of 1912 1764 cmd.exe 33 PID 1764 wrote to memory of 1912 1764 cmd.exe 33 PID 1764 wrote to memory of 1912 1764 cmd.exe 33 PID 2000 wrote to memory of 1132 2000 cmd.exe 34 PID 2000 wrote to memory of 1132 2000 cmd.exe 34 PID 2000 wrote to memory of 1132 2000 cmd.exe 34 PID 2000 wrote to memory of 1132 2000 cmd.exe 34 PID 1764 wrote to memory of 1436 1764 cmd.exe 35 PID 1764 wrote to memory of 1436 1764 cmd.exe 35 PID 1764 wrote to memory of 1436 1764 cmd.exe 35 PID 1764 wrote to memory of 1436 1764 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\5.exe"C:\Users\Admin\AppData\Local\Temp\5.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 38 > nul && REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "dfghjhgfddfghjhg" /t REG_SZ /d "C:\Users\Admin\Documents\Inw)9876567849-4976456478.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 383⤵
- Runs ping.exe
PID:1740
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "dfghjhgfddfghjhg" /t REG_SZ /d "C:\Users\Admin\Documents\Inw)9876567849-4976456478.exe"3⤵
- Adds Run key to start application
PID:1132
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 44 > nul && copy "C:\Users\Admin\AppData\Local\Temp\5.exe" "C:\Users\Admin\Documents\Inw)9876567849-4976456478.exe" && ping 127.0.0.1 -n 44 > nul && "C:\Users\Admin\Documents\Inw)9876567849-4976456478.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 443⤵
- Runs ping.exe
PID:1912
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 443⤵
- Runs ping.exe
PID:1436
-
-