Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2022, 00:04
Static task
static1
Behavioral task
behavioral1
Sample
d24c468dd320f4be33f4ccf13839955b4100208c40628135335aabd8491a9249.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d24c468dd320f4be33f4ccf13839955b4100208c40628135335aabd8491a9249.exe
Resource
win10v2004-20220812-en
General
-
Target
d24c468dd320f4be33f4ccf13839955b4100208c40628135335aabd8491a9249.exe
-
Size
259KB
-
MD5
0124d024d73f2757a8ed6d7ff60e1c60
-
SHA1
9485d27c7c4ae77c1fb234bc852cdecfffb1bcc5
-
SHA256
d24c468dd320f4be33f4ccf13839955b4100208c40628135335aabd8491a9249
-
SHA512
c8e211ab803a467e2152c4e1e6a2dc65ba6af93d45d7be288c278a8eb886aa45cbfd4d14362ae2f4bbcfd3239eadc07a986104b4edc48a56df2914cefa1ceb57
-
SSDEEP
6144:QyK4+vW9EnkxPWu9oYUkZYeLoerbZP4sdA9hmEPpW5rpH:3K99kPWqBU0LDrNgsdA9hFPW9
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\D24C46~1.EXE," d24c468dd320f4be33f4ccf13839955b4100208c40628135335aabd8491a9249.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\userinit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\D24C46~1.EXE" d24c468dd320f4be33f4ccf13839955b4100208c40628135335aabd8491a9249.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\e9fa1c48 = "µ\x12AêAˆ¸þ«iÃ'&›ùo\u008f„4MpæŒ\u00901\x1b„sq)P€Ê\x1cqLã¹ó&&1\x1b½\f|b\x01øÑv}\vbÞ1HósE\u0081>LMÛšF~j%5¸\u00ad!!z®Bj\u008d\x04ø\x01„‹\x19Cp¦\x15žÝ$ìÇ\x1f™óÀ\u0081•ý½øm¥öŒÖÇ-\"Ú4L¤…µ×õâí¢u’˜èü¯–ú⤴}š5ý½\x05\f\x1a45&u\x1a§ú }¸ˆèÒ€Š\x02\x02\x1fÆ\u0090°ïý÷\x18\x1aĵ‚ÚÆe’*2ð/žunª†*úŠŠŽ?ý\u008dm°œ\x02Õ\nÍ*\x0fýd¢Üà\x1c*\x02\x1dúZ\u009d<¶…ºb××Z.$ºO5eMŽE}\x05Ú.¬Ü\u00a06\x05\x157\"ßþ\u009d\x0evb¿ß×\u0090õ\x12\x10\u009dWÍ\"\u009d" d24c468dd320f4be33f4ccf13839955b4100208c40628135335aabd8491a9249.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\D24C46~1.EXE" d24c468dd320f4be33f4ccf13839955b4100208c40628135335aabd8491a9249.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 408 d24c468dd320f4be33f4ccf13839955b4100208c40628135335aabd8491a9249.exe 408 d24c468dd320f4be33f4ccf13839955b4100208c40628135335aabd8491a9249.exe 408 d24c468dd320f4be33f4ccf13839955b4100208c40628135335aabd8491a9249.exe 408 d24c468dd320f4be33f4ccf13839955b4100208c40628135335aabd8491a9249.exe 408 d24c468dd320f4be33f4ccf13839955b4100208c40628135335aabd8491a9249.exe 408 d24c468dd320f4be33f4ccf13839955b4100208c40628135335aabd8491a9249.exe 408 d24c468dd320f4be33f4ccf13839955b4100208c40628135335aabd8491a9249.exe 408 d24c468dd320f4be33f4ccf13839955b4100208c40628135335aabd8491a9249.exe 408 d24c468dd320f4be33f4ccf13839955b4100208c40628135335aabd8491a9249.exe 408 d24c468dd320f4be33f4ccf13839955b4100208c40628135335aabd8491a9249.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 408 d24c468dd320f4be33f4ccf13839955b4100208c40628135335aabd8491a9249.exe Token: SeSecurityPrivilege 408 d24c468dd320f4be33f4ccf13839955b4100208c40628135335aabd8491a9249.exe Token: SeSecurityPrivilege 408 d24c468dd320f4be33f4ccf13839955b4100208c40628135335aabd8491a9249.exe Token: SeSecurityPrivilege 408 d24c468dd320f4be33f4ccf13839955b4100208c40628135335aabd8491a9249.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d24c468dd320f4be33f4ccf13839955b4100208c40628135335aabd8491a9249.exe"C:\Users\Admin\AppData\Local\Temp\d24c468dd320f4be33f4ccf13839955b4100208c40628135335aabd8491a9249.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:408