Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
166s -
max time network
56s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 22:42
Static task
static1
Behavioral task
behavioral1
Sample
64929a535c0745e37e4952f82a4a383d7a5dd13b9fbd31c8979378959169594f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
64929a535c0745e37e4952f82a4a383d7a5dd13b9fbd31c8979378959169594f.exe
Resource
win10v2004-20220812-en
General
-
Target
64929a535c0745e37e4952f82a4a383d7a5dd13b9fbd31c8979378959169594f.exe
-
Size
47KB
-
MD5
90aecba4ccafea3fccecaea76b579260
-
SHA1
9cbcd1f4f2ded454d3dd7a925b357a6c1976079d
-
SHA256
64929a535c0745e37e4952f82a4a383d7a5dd13b9fbd31c8979378959169594f
-
SHA512
6cdb1ff552f9100b53b12522bd15dd3414bbd36fdd2b6d348d4368f7ff89a35167c2945ff0fe49983a335a00e5f411d74ae2d877692bc79f97e897b9ff3c920e
-
SSDEEP
768:V9XQtkO8Zxuq43gxre8fvT/g+rLNljZOWvSq49tUtlE2japO0fUWaqDHBV70c4KJ:VdSE75xre8fvT/fPjZOW6162Mp07uy7f
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1220 lsass.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe 64929a535c0745e37e4952f82a4a383d7a5dd13b9fbd31c8979378959169594f.exe -
Loads dropped DLL 2 IoCs
pid Process 1076 64929a535c0745e37e4952f82a4a383d7a5dd13b9fbd31c8979378959169594f.exe 1076 64929a535c0745e37e4952f82a4a383d7a5dd13b9fbd31c8979378959169594f.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1296 Process not Found 1296 Process not Found -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 1220 lsass.exe 1412 explorer.exe 1296 Process not Found 1296 Process not Found -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1076 64929a535c0745e37e4952f82a4a383d7a5dd13b9fbd31c8979378959169594f.exe Token: SeDebugPrivilege 1220 lsass.exe Token: SeDebugPrivilege 1296 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1296 Process not Found 1296 Process not Found -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1296 Process not Found 1296 Process not Found -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1076 wrote to memory of 1220 1076 64929a535c0745e37e4952f82a4a383d7a5dd13b9fbd31c8979378959169594f.exe 27 PID 1076 wrote to memory of 1220 1076 64929a535c0745e37e4952f82a4a383d7a5dd13b9fbd31c8979378959169594f.exe 27 PID 1076 wrote to memory of 1220 1076 64929a535c0745e37e4952f82a4a383d7a5dd13b9fbd31c8979378959169594f.exe 27 PID 1076 wrote to memory of 1220 1076 64929a535c0745e37e4952f82a4a383d7a5dd13b9fbd31c8979378959169594f.exe 27 PID 1220 wrote to memory of 1412 1220 lsass.exe 28 PID 1220 wrote to memory of 1412 1220 lsass.exe 28 PID 1220 wrote to memory of 1412 1220 lsass.exe 28 PID 1220 wrote to memory of 1412 1220 lsass.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\64929a535c0745e37e4952f82a4a383d7a5dd13b9fbd31c8979378959169594f.exe"C:\Users\Admin\AppData\Local\Temp\64929a535c0745e37e4952f82a4a383d7a5dd13b9fbd31c8979378959169594f.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\explorer.exeC:\Windows\explorer.exe3⤵
- Suspicious behavior: MapViewOfSection
PID:1412
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD590aecba4ccafea3fccecaea76b579260
SHA19cbcd1f4f2ded454d3dd7a925b357a6c1976079d
SHA25664929a535c0745e37e4952f82a4a383d7a5dd13b9fbd31c8979378959169594f
SHA5126cdb1ff552f9100b53b12522bd15dd3414bbd36fdd2b6d348d4368f7ff89a35167c2945ff0fe49983a335a00e5f411d74ae2d877692bc79f97e897b9ff3c920e
-
Filesize
47KB
MD590aecba4ccafea3fccecaea76b579260
SHA19cbcd1f4f2ded454d3dd7a925b357a6c1976079d
SHA25664929a535c0745e37e4952f82a4a383d7a5dd13b9fbd31c8979378959169594f
SHA5126cdb1ff552f9100b53b12522bd15dd3414bbd36fdd2b6d348d4368f7ff89a35167c2945ff0fe49983a335a00e5f411d74ae2d877692bc79f97e897b9ff3c920e
-
Filesize
47KB
MD590aecba4ccafea3fccecaea76b579260
SHA19cbcd1f4f2ded454d3dd7a925b357a6c1976079d
SHA25664929a535c0745e37e4952f82a4a383d7a5dd13b9fbd31c8979378959169594f
SHA5126cdb1ff552f9100b53b12522bd15dd3414bbd36fdd2b6d348d4368f7ff89a35167c2945ff0fe49983a335a00e5f411d74ae2d877692bc79f97e897b9ff3c920e