Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
187s -
max time network
192s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 22:28
Static task
static1
Behavioral task
behavioral1
Sample
7d3df5a6c2962471a684c771d9469bd2305517f518f1639d76ea8e3c753c133b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7d3df5a6c2962471a684c771d9469bd2305517f518f1639d76ea8e3c753c133b.exe
Resource
win10v2004-20221111-en
General
-
Target
7d3df5a6c2962471a684c771d9469bd2305517f518f1639d76ea8e3c753c133b.exe
-
Size
263KB
-
MD5
095b70ebc9664087574c65165dc5536a
-
SHA1
e82a32af30e8847b3629f07af373428964e7f732
-
SHA256
7d3df5a6c2962471a684c771d9469bd2305517f518f1639d76ea8e3c753c133b
-
SHA512
d4578df8124246cf91db2a88e204097719af269d43fcb199e553779d52c8d6311fa0adacb22644317972b51d07ed7e8d2399f8c0e62319b4425695855531bef9
-
SSDEEP
3072:mwa0FSXxkcY93I6xeRSS05Im/vm8ud2U/ivJM7EATL5Bc9RuP6369u8cNzj:10XxEJARSS0tpa5/iiAATrARAp08czj
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\7D3DF5~1.EXE," 7d3df5a6c2962471a684c771d9469bd2305517f518f1639d76ea8e3c753c133b.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\userinit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7D3DF5~1.EXE" 7d3df5a6c2962471a684c771d9469bd2305517f518f1639d76ea8e3c753c133b.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\d29a8e7c = "£–}Aÿ~ó?\x0eÉ×áK\x02\x1cérL(5Ÿ9¤\u00a0–ù˜\x1cOÜ™Á¬/ç\bÚ`.\t\u0081º{öKJ¦¸#Ý¥jdX\tŒ¥Ønñ¥š-@À\u00a0Êø¡\x7fE#N¬\x1a\x12Âu\riÁ 3z§\x15#©SHgÁéÈíoqά&Té\\Œt\fÄÙÁô|œ°HDD˲ð;¬tB(É£º€é©‹ôdäk²,\\Ä\x13a$ÓÛKLÊ£Äcü\x04Qø´;rÜ(˜L!ñ{ʘ!û0€È\x13œ[àä³²\x13\x03dܼɻ‹\x1bÄt$¬|DÑ©ë,»¤¬T#Šú\v’äÒ‹„4‹ ôSŒ\x1c#Ä`<IHä@ñB#´ó`\u0090ü\x020Ãl4kÓù+|\x02[\u0090\x01Ðä›”ÚT”\x13¤\u00a0\u0090ÄX" 7d3df5a6c2962471a684c771d9469bd2305517f518f1639d76ea8e3c753c133b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7D3DF5~1.EXE" 7d3df5a6c2962471a684c771d9469bd2305517f518f1639d76ea8e3c753c133b.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2020 7d3df5a6c2962471a684c771d9469bd2305517f518f1639d76ea8e3c753c133b.exe 2020 7d3df5a6c2962471a684c771d9469bd2305517f518f1639d76ea8e3c753c133b.exe 2020 7d3df5a6c2962471a684c771d9469bd2305517f518f1639d76ea8e3c753c133b.exe 2020 7d3df5a6c2962471a684c771d9469bd2305517f518f1639d76ea8e3c753c133b.exe 2020 7d3df5a6c2962471a684c771d9469bd2305517f518f1639d76ea8e3c753c133b.exe 2020 7d3df5a6c2962471a684c771d9469bd2305517f518f1639d76ea8e3c753c133b.exe 2020 7d3df5a6c2962471a684c771d9469bd2305517f518f1639d76ea8e3c753c133b.exe 2020 7d3df5a6c2962471a684c771d9469bd2305517f518f1639d76ea8e3c753c133b.exe 2020 7d3df5a6c2962471a684c771d9469bd2305517f518f1639d76ea8e3c753c133b.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 2020 7d3df5a6c2962471a684c771d9469bd2305517f518f1639d76ea8e3c753c133b.exe Token: SeSecurityPrivilege 2020 7d3df5a6c2962471a684c771d9469bd2305517f518f1639d76ea8e3c753c133b.exe Token: SeSecurityPrivilege 2020 7d3df5a6c2962471a684c771d9469bd2305517f518f1639d76ea8e3c753c133b.exe Token: SeSecurityPrivilege 2020 7d3df5a6c2962471a684c771d9469bd2305517f518f1639d76ea8e3c753c133b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d3df5a6c2962471a684c771d9469bd2305517f518f1639d76ea8e3c753c133b.exe"C:\Users\Admin\AppData\Local\Temp\7d3df5a6c2962471a684c771d9469bd2305517f518f1639d76ea8e3c753c133b.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2020