Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2022, 22:25
Static task
static1
Behavioral task
behavioral1
Sample
9f33ff385ce2315a281f55ff7dc05b526092fd7d86f8e907c11ff4f3ed6f027f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9f33ff385ce2315a281f55ff7dc05b526092fd7d86f8e907c11ff4f3ed6f027f.exe
Resource
win10v2004-20220812-en
General
-
Target
9f33ff385ce2315a281f55ff7dc05b526092fd7d86f8e907c11ff4f3ed6f027f.exe
-
Size
145KB
-
MD5
67e83f630b500efa98813545b22e54ec
-
SHA1
e7e1d8e199d126a3fd3131b2ba8d7f97b2e24591
-
SHA256
9f33ff385ce2315a281f55ff7dc05b526092fd7d86f8e907c11ff4f3ed6f027f
-
SHA512
01a7be00ec350196b8722df2ecb498980240614e45854bb46128f1173352a26a57636db2f4f784861f2c75de745c098c8c32fc8d2df4c056d37454789dd23d04
-
SSDEEP
3072:My4EaMs3jcx3y5ao3DEEj8s8a0hE/uyoXEkfuTfvQYNlQWZmENuFjw61AI:Mfxt3Q35Ej83XQgYRuN
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1136 cmd.exe -
Unexpected DNS network traffic destination 6 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 85.114.128.127 Destination IP 85.114.128.127 Destination IP 85.114.128.127 Destination IP 85.114.128.127 Destination IP 85.114.128.127 Destination IP 85.114.128.127 -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows\CurrentVersion\Run 9f33ff385ce2315a281f55ff7dc05b526092fd7d86f8e907c11ff4f3ed6f027f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google Update = "\"C:\\Users\\Admin\\AppData\\Local\\Google\\Desktop\\Install\\{8dceb85e-8508-ee5b-cccc-98a6b145e6ef}\\❤≸⋙\\Ⱒ☠⍨\\\u202eﯹ๛\\{8dceb85e-8508-ee5b-cccc-98a6b145e6ef}\\GoogleUpdate.exe\" >" 9f33ff385ce2315a281f55ff7dc05b526092fd7d86f8e907c11ff4f3ed6f027f.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2700 set thread context of 1136 2700 9f33ff385ce2315a281f55ff7dc05b526092fd7d86f8e907c11ff4f3ed6f027f.exe 82 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2700 9f33ff385ce2315a281f55ff7dc05b526092fd7d86f8e907c11ff4f3ed6f027f.exe 2700 9f33ff385ce2315a281f55ff7dc05b526092fd7d86f8e907c11ff4f3ed6f027f.exe 2700 9f33ff385ce2315a281f55ff7dc05b526092fd7d86f8e907c11ff4f3ed6f027f.exe 2700 9f33ff385ce2315a281f55ff7dc05b526092fd7d86f8e907c11ff4f3ed6f027f.exe 376 Process not Found 376 Process not Found -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 376 Process not Found -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2700 9f33ff385ce2315a281f55ff7dc05b526092fd7d86f8e907c11ff4f3ed6f027f.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 2700 9f33ff385ce2315a281f55ff7dc05b526092fd7d86f8e907c11ff4f3ed6f027f.exe Token: SeDebugPrivilege 2700 9f33ff385ce2315a281f55ff7dc05b526092fd7d86f8e907c11ff4f3ed6f027f.exe Token: SeDebugPrivilege 2700 9f33ff385ce2315a281f55ff7dc05b526092fd7d86f8e907c11ff4f3ed6f027f.exe Token: SeDebugPrivilege 376 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 376 Process not Found -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2700 wrote to memory of 1136 2700 9f33ff385ce2315a281f55ff7dc05b526092fd7d86f8e907c11ff4f3ed6f027f.exe 82 PID 2700 wrote to memory of 1136 2700 9f33ff385ce2315a281f55ff7dc05b526092fd7d86f8e907c11ff4f3ed6f027f.exe 82 PID 2700 wrote to memory of 1136 2700 9f33ff385ce2315a281f55ff7dc05b526092fd7d86f8e907c11ff4f3ed6f027f.exe 82 PID 2700 wrote to memory of 1136 2700 9f33ff385ce2315a281f55ff7dc05b526092fd7d86f8e907c11ff4f3ed6f027f.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f33ff385ce2315a281f55ff7dc05b526092fd7d86f8e907c11ff4f3ed6f027f.exe"C:\Users\Admin\AppData\Local\Temp\9f33ff385ce2315a281f55ff7dc05b526092fd7d86f8e907c11ff4f3ed6f027f.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Deletes itself
PID:1136
-