Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
43s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23/11/2022, 19:39
Static task
static1
Behavioral task
behavioral1
Sample
transact_store/transact_e5ebfdsd6211.exe
Resource
win7-20220812-en
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
transact_store/transact_e5ebfdsd6211.exe
Resource
win10v2004-20220812-en
2 signatures
150 seconds
General
-
Target
transact_store/transact_e5ebfdsd6211.exe
-
Size
58KB
-
MD5
182ee0f73cd9743985ceb3248400fd44
-
SHA1
a3be64e08d2190fc54c3732090e4888a2162578c
-
SHA256
8a23558f6b59c714495ad9753609f359bd025b6bb205b8ac00a7a84ed1372589
-
SHA512
6e0135ce9c715e95e3b3e4328d50a8b4822e9cde36d4e60b7c370dcb3892dfe4e08d6b201f4d60c3e33f37514179bf747fa37a475f4589e5b15280ac657fc262
-
SSDEEP
1536:cQCQKXujec19h2F0plccw9ZFvXR2dowZypaXTNSLO6:lFsh2pEdXR2IV
Score
10/10
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" msiexec.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" msiexec.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\3755341674 = "C:\\PROGRA~3\\msagbgp.exe" msiexec.exe -
Blocklisted process makes network request 5 IoCs
flow pid Process 1 1120 msiexec.exe 2 1120 msiexec.exe 3 1120 msiexec.exe 4 1120 msiexec.exe 5 1120 msiexec.exe -
Disables taskbar notifications via registry modification
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1980 set thread context of 1452 1980 transact_e5ebfdsd6211.exe 28 -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\PROGRA~3\msagbgp.exe msiexec.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1452 transact_e5ebfdsd6211.exe 1120 msiexec.exe 1120 msiexec.exe -
Suspicious behavior: MapViewOfSection 26 IoCs
pid Process 1452 transact_e5ebfdsd6211.exe 1452 transact_e5ebfdsd6211.exe 1120 msiexec.exe 1120 msiexec.exe 1120 msiexec.exe 1120 msiexec.exe 1120 msiexec.exe 1120 msiexec.exe 1120 msiexec.exe 1120 msiexec.exe 1120 msiexec.exe 1120 msiexec.exe 1120 msiexec.exe 1120 msiexec.exe 1120 msiexec.exe 1120 msiexec.exe 1120 msiexec.exe 1120 msiexec.exe 1120 msiexec.exe 1120 msiexec.exe 1120 msiexec.exe 1120 msiexec.exe 1120 msiexec.exe 1120 msiexec.exe 1120 msiexec.exe 1120 msiexec.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1120 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1452 transact_e5ebfdsd6211.exe Token: SeBackupPrivilege 1452 transact_e5ebfdsd6211.exe Token: SeRestorePrivilege 1452 transact_e5ebfdsd6211.exe Token: SeDebugPrivilege 1120 msiexec.exe Token: SeBackupPrivilege 1120 msiexec.exe Token: SeRestorePrivilege 1120 msiexec.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1980 wrote to memory of 1452 1980 transact_e5ebfdsd6211.exe 28 PID 1980 wrote to memory of 1452 1980 transact_e5ebfdsd6211.exe 28 PID 1980 wrote to memory of 1452 1980 transact_e5ebfdsd6211.exe 28 PID 1980 wrote to memory of 1452 1980 transact_e5ebfdsd6211.exe 28 PID 1980 wrote to memory of 1452 1980 transact_e5ebfdsd6211.exe 28 PID 1980 wrote to memory of 1452 1980 transact_e5ebfdsd6211.exe 28 PID 1980 wrote to memory of 1452 1980 transact_e5ebfdsd6211.exe 28 PID 1980 wrote to memory of 1452 1980 transact_e5ebfdsd6211.exe 28 PID 1452 wrote to memory of 1120 1452 transact_e5ebfdsd6211.exe 29 PID 1452 wrote to memory of 1120 1452 transact_e5ebfdsd6211.exe 29 PID 1452 wrote to memory of 1120 1452 transact_e5ebfdsd6211.exe 29 PID 1452 wrote to memory of 1120 1452 transact_e5ebfdsd6211.exe 29 PID 1452 wrote to memory of 1120 1452 transact_e5ebfdsd6211.exe 29 PID 1452 wrote to memory of 1120 1452 transact_e5ebfdsd6211.exe 29 PID 1452 wrote to memory of 1120 1452 transact_e5ebfdsd6211.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\transact_store\transact_e5ebfdsd6211.exe"C:\Users\Admin\AppData\Local\Temp\transact_store\transact_e5ebfdsd6211.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\transact_store\transact_e5ebfdsd6211.exe"C:\Users\Admin\AppData\Local\Temp\transact_store\transact_e5ebfdsd6211.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\SysWOW64\msiexec.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Adds policy Run key to start application
- Blocklisted process makes network request
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
PID:1120
-
-