Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
173s -
max time network
174s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
14/10/2022, 19:02
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
General
-
Target
tmp.exe
-
Size
1.0MB
-
MD5
da04d6b7b1499842ee15fd06f0753a7b
-
SHA1
51ab26f7074d2836ea4e1c3b9f0a9e8eb6b57929
-
SHA256
1046455f39dbe56dc8cc160ebc53b5b32315021af4a871c06235a5257e02f123
-
SHA512
6023ed14d7abdbcd734050ba46162024fd7b39eddad5973e7bdf5de7b1bdc233822c1a4f6027b99f3cebafeb46a41c5fdc82c693beaaa335065316cfdb382852
-
SSDEEP
12288:NyqF7UsDy+vMCt3kzBXDanOmitbih4Lb/aUIYfa7N2NZiuEQDFFAQSQy4At:NJF0UD3kNTcJhmzPZWwAtQy4A
Malware Config
Extracted
formbook
s8gw
b/iFndOEL2rKvw==
HK7quAepCJH6CkNgpH2cDYx1
YEayMA+cR1WQ0Qw/lQ==
kPVNVkAC6pEPHVFQnzCxsA==
yLE1wrE7kf1KRGRm5a95qQ==
D6ktQZWoaOJGopmOlg==
98rmMok6y5e47YvCCMQNPaqM6qf+7PsEAQ==
7Po3fdN1NNtop0X5Ryv9PnUrSLQ=
+vk1DU92V465rf1+gFhdWMFoAsAY
AuhZ6jw45aHmPdzGVilx
/9ln8smKekiYzqePkA==
7+gsdtTlpqcSL0/GVilx
6pXLEOumjAfvK8Y=
inT5kfC0FBmcw/hw7NYua819
wb/qKZCjfrEiKFz9Vyn9chrZxA==
Pil1K4a6ruUXJ2fPD5qXo+2pNMn5VdCREA==
mxo3/mBm1hMSWd8=
8ltzwIsdiPpJXbK30JecDYx1
BmrK2y9G+VyimqzrK9YtmYY=
jPP9Q/IqWt3JQSZtvqI1jb9oAsAY
xWzxa9GO6uM2f8ZremM=
81ZOUHEixtUIVv6NlIycDYx1
x3TwA2aHOqP09Rlz967tvg==
YcGkK4ptotZo
rRGPhtHpxhA5vg1ye2E=
s0nEUS76+DG4N0jCxIuMCH5s
sww09+l42RMSWd8=
nxSyL4EzoozGUpBZhw==
uyCPelMDq3XHVZFL
vctY16I47LsuQmtZV/z7PBzNzA==
E2OPZ4qidzKSyJNN
D6dFPTDUg8kaLmUmd0ldWMJoAsAY
Hfxr+EtmR3rHVZFL
GHz5DGiEOpXU1RopdxGnqQ==
vkyMO5bIjgF3jazpQxN7rCkLjaWsutEg
yCa7yRAQa3bHVZFL
IKm4cOp321WOog==
I3XZ+15s2tImMUjGVilx
x/Jd3b8EpiJXqemg4rgrchrZxA==
4mC1PjLusl2XzqePkA==
tYbmbDzOglrJ4zt2u61ws56J3tPwebg=
DuxD/09nTPBbkjfcIAAIB3QpxWbK3rA=
HHuuqojxl4TAA5Jf
C17m7sNUuc5hra6AeHQ=
vgw+g9qBRjWM3Ik7mA==
GGODX7tmIuDHVZFL
KH6t4TE6FtX+T+PT05shjfFoAsAY
nwWYlWch9TA3hqlW
bXb0fcySIOTHVZFL
aPlXnvfBsGj7O5hRUSQnGI4=
Zpznw5MtmI3HVZFL
19Zg6zNnTPgWPmPM0qicDYx1
kgAZh+ZmxRMSWd8=
f2gI+k/SivxGUIFve1MFSHUrSLQ=
IShqS5bKxWbWFU6N5rNJPRG+W5SWLQ==
67fiJ39totZo
0+kxCeKnjAfvK8Y=
xJoBjOzyVM4zNDhpwpcuchrZxA==
oIoetRFMRHP1M2jDwZmcDYx1
J3OgdY4S7Sg=
fBJLDHKdTs5VZHdiWTH9RXUrSLQ=
kHi1PIBtotZo
cFOqg9WHL2rKvw==
wi6VpX8DXHHHVZFL
aeneontrue.com
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Control Panel\International\Geo\Nation tmp.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1448 set thread context of 1288 1448 tmp.exe 27 PID 1288 set thread context of 1420 1288 tmp.exe 14 PID 1756 set thread context of 1420 1756 cmd.exe 14 -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1288 tmp.exe 1288 tmp.exe 1288 tmp.exe 1288 tmp.exe 1756 cmd.exe 1756 cmd.exe 1756 cmd.exe 1756 cmd.exe 1756 cmd.exe 1756 cmd.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1288 tmp.exe 1288 tmp.exe 1288 tmp.exe 1756 cmd.exe 1756 cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1288 tmp.exe Token: SeDebugPrivilege 1756 cmd.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1420 Explorer.EXE 1420 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1420 Explorer.EXE 1420 Explorer.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1448 wrote to memory of 1288 1448 tmp.exe 27 PID 1448 wrote to memory of 1288 1448 tmp.exe 27 PID 1448 wrote to memory of 1288 1448 tmp.exe 27 PID 1448 wrote to memory of 1288 1448 tmp.exe 27 PID 1448 wrote to memory of 1288 1448 tmp.exe 27 PID 1448 wrote to memory of 1288 1448 tmp.exe 27 PID 1448 wrote to memory of 1288 1448 tmp.exe 27 PID 1420 wrote to memory of 1756 1420 Explorer.EXE 28 PID 1420 wrote to memory of 1756 1420 Explorer.EXE 28 PID 1420 wrote to memory of 1756 1420 Explorer.EXE 28 PID 1420 wrote to memory of 1756 1420 Explorer.EXE 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1288
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1756
-