Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 11:19
Static task
static1
Behavioral task
behavioral1
Sample
ccdcc5e78106fdcc092061c5ec10ae13c7958b39144dc2615573cbb1e0bc524e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ccdcc5e78106fdcc092061c5ec10ae13c7958b39144dc2615573cbb1e0bc524e.exe
Resource
win10v2004-20220812-en
General
-
Target
ccdcc5e78106fdcc092061c5ec10ae13c7958b39144dc2615573cbb1e0bc524e.exe
-
Size
805KB
-
MD5
6496361e07db592c7d0d378664622d90
-
SHA1
f5b0462866f276e84ea8ce41246efc473fcc2503
-
SHA256
ccdcc5e78106fdcc092061c5ec10ae13c7958b39144dc2615573cbb1e0bc524e
-
SHA512
fd220ae18d4c5c4d095da33841cfee2c0b723fd66b2823a9246abbfd1d28feb2c174cd9123c890cb8f23fcc283ada04d9e2a25e34ef1726025c049158a1a4d6c
-
SSDEEP
24576:98ykJUXUi+Ic0AwEP6BXVwwrvWN44lIIA:98yk6XN+JFUwwa44lIr
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
10.0.0.10:4444
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum ccdcc5e78106fdcc092061c5ec10ae13c7958b39144dc2615573cbb1e0bc524e.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 ccdcc5e78106fdcc092061c5ec10ae13c7958b39144dc2615573cbb1e0bc524e.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 1728 ccdcc5e78106fdcc092061c5ec10ae13c7958b39144dc2615573cbb1e0bc524e.exe 1728 ccdcc5e78106fdcc092061c5ec10ae13c7958b39144dc2615573cbb1e0bc524e.exe 1728 ccdcc5e78106fdcc092061c5ec10ae13c7958b39144dc2615573cbb1e0bc524e.exe 1728 ccdcc5e78106fdcc092061c5ec10ae13c7958b39144dc2615573cbb1e0bc524e.exe 1728 ccdcc5e78106fdcc092061c5ec10ae13c7958b39144dc2615573cbb1e0bc524e.exe 1728 ccdcc5e78106fdcc092061c5ec10ae13c7958b39144dc2615573cbb1e0bc524e.exe 1728 ccdcc5e78106fdcc092061c5ec10ae13c7958b39144dc2615573cbb1e0bc524e.exe 1728 ccdcc5e78106fdcc092061c5ec10ae13c7958b39144dc2615573cbb1e0bc524e.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1904 set thread context of 1728 1904 ccdcc5e78106fdcc092061c5ec10ae13c7958b39144dc2615573cbb1e0bc524e.exe 27 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1904 ccdcc5e78106fdcc092061c5ec10ae13c7958b39144dc2615573cbb1e0bc524e.exe 1728 ccdcc5e78106fdcc092061c5ec10ae13c7958b39144dc2615573cbb1e0bc524e.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1904 wrote to memory of 1728 1904 ccdcc5e78106fdcc092061c5ec10ae13c7958b39144dc2615573cbb1e0bc524e.exe 27 PID 1904 wrote to memory of 1728 1904 ccdcc5e78106fdcc092061c5ec10ae13c7958b39144dc2615573cbb1e0bc524e.exe 27 PID 1904 wrote to memory of 1728 1904 ccdcc5e78106fdcc092061c5ec10ae13c7958b39144dc2615573cbb1e0bc524e.exe 27 PID 1904 wrote to memory of 1728 1904 ccdcc5e78106fdcc092061c5ec10ae13c7958b39144dc2615573cbb1e0bc524e.exe 27 PID 1904 wrote to memory of 1728 1904 ccdcc5e78106fdcc092061c5ec10ae13c7958b39144dc2615573cbb1e0bc524e.exe 27 PID 1904 wrote to memory of 1728 1904 ccdcc5e78106fdcc092061c5ec10ae13c7958b39144dc2615573cbb1e0bc524e.exe 27 PID 1904 wrote to memory of 1728 1904 ccdcc5e78106fdcc092061c5ec10ae13c7958b39144dc2615573cbb1e0bc524e.exe 27 PID 1904 wrote to memory of 1728 1904 ccdcc5e78106fdcc092061c5ec10ae13c7958b39144dc2615573cbb1e0bc524e.exe 27 PID 1904 wrote to memory of 1728 1904 ccdcc5e78106fdcc092061c5ec10ae13c7958b39144dc2615573cbb1e0bc524e.exe 27 PID 1904 wrote to memory of 1728 1904 ccdcc5e78106fdcc092061c5ec10ae13c7958b39144dc2615573cbb1e0bc524e.exe 27 PID 1904 wrote to memory of 1728 1904 ccdcc5e78106fdcc092061c5ec10ae13c7958b39144dc2615573cbb1e0bc524e.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccdcc5e78106fdcc092061c5ec10ae13c7958b39144dc2615573cbb1e0bc524e.exe"C:\Users\Admin\AppData\Local\Temp\ccdcc5e78106fdcc092061c5ec10ae13c7958b39144dc2615573cbb1e0bc524e.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\ccdcc5e78106fdcc092061c5ec10ae13c7958b39144dc2615573cbb1e0bc524e.exeC:\Users\Admin\AppData\Local\Temp\ccdcc5e78106fdcc092061c5ec10ae13c7958b39144dc2615573cbb1e0bc524e.exe2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:1728
-