Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    1s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2022, 03:58

Errors

Reason
Reading agent response: read tcp 10.127.0.1:54628->10.127.0.141:8000: read: connection reset by peer

General

  • Target

    26eb19c1184a586bb3e0798c855f2d35444550cf995a22896150fd55cf2470cf.exe

  • Size

    100KB

  • MD5

    febab24a047e2fb8aae0484ff78e8eac

  • SHA1

    b0038379bcffce15bf3470a94bc049c7ef19ca94

  • SHA256

    26eb19c1184a586bb3e0798c855f2d35444550cf995a22896150fd55cf2470cf

  • SHA512

    5f7ab73200ba9ede941d4bee805d1b1699cbd3599ebcbcf88e31130bd7f40052bc7c68c051715ebff8c285cc1ba7936b767251e50dbaa17480b49f7dbc0375d2

  • SSDEEP

    1536:h6khS0G4iVa/59LJlVQ8CRkjsCLpG/dfDqHApEPYTAx8MAPgefoAZ0Dob8qte:hg4iVi59lQ8CGBGlfOgmX8vzoA+Dobt

Score
8/10

Malware Config

Signatures

  • Modifies AppInit DLL entries 2 TTPs
  • Drops file in System32 directory 1 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\26eb19c1184a586bb3e0798c855f2d35444550cf995a22896150fd55cf2470cf.exe
    "C:\Users\Admin\AppData\Local\Temp\26eb19c1184a586bb3e0798c855f2d35444550cf995a22896150fd55cf2470cf.exe"
    1⤵
    • Drops file in System32 directory
    • NTFS ADS
    • Suspicious use of AdjustPrivilegeToken
    PID:1760
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:888

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/888-56-0x000007FEFB741000-0x000007FEFB743000-memory.dmp

      Filesize

      8KB

    • memory/1760-54-0x0000000001000000-0x000000000101A000-memory.dmp

      Filesize

      104KB

    • memory/1760-55-0x0000000075281000-0x0000000075283000-memory.dmp

      Filesize

      8KB

    • memory/1760-57-0x0000000001000000-0x000000000101A000-memory.dmp

      Filesize

      104KB