Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
242s -
max time network
336s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 16:17
Static task
static1
Behavioral task
behavioral1
Sample
ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe
Resource
win10v2004-20220812-en
General
-
Target
ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe
-
Size
285KB
-
MD5
9eedb1ecd7402bd1bf70598d122304e7
-
SHA1
b644283b50af9ec9cf2830e01e9a3679b6c3af6f
-
SHA256
ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673
-
SHA512
60c0814452f246732750397b00e170a66f5ad242a388fc34fcb0bd3751e321755f3040dca1285a12140d72433e899e3bf9473536b1d27167285bd71c896cc845
-
SSDEEP
3072:k+8D+0oVzMVCqEAgcDRKqZmv8oMTHVgNdo1eQXDosPKNM+DgENeOGq+F3uT/xqpq:JZ1XAgcDaEoOHY6JcoKpxlTJ49u3md
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\EE8E82~1.EXE," ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\userinit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EE8E82~1.EXE" ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\73cc3e8 = "\x13Z™6_oŽÀ\fF\\=¥\x02ñ\x14†\x16S¤|\x10\x1bÅ-\x0fDŠ.?ƒ\x06jéÈ\x18ÊU\x1a×ÔÕÝ\u00a01\u008dw%@×ud6P躥)êi\r•ìè\r\x110" ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EE8E82~1.EXE" ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1348 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1348 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1348 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1348 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1348 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1348 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1348 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 1348 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe Token: SeSecurityPrivilege 1348 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe Token: SeSecurityPrivilege 1348 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe Token: SeSecurityPrivilege 1348 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe"C:\Users\Admin\AppData\Local\Temp\ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1348