Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
184s -
max time network
187s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 16:17
Static task
static1
Behavioral task
behavioral1
Sample
ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe
Resource
win10v2004-20220812-en
General
-
Target
ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe
-
Size
285KB
-
MD5
9eedb1ecd7402bd1bf70598d122304e7
-
SHA1
b644283b50af9ec9cf2830e01e9a3679b6c3af6f
-
SHA256
ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673
-
SHA512
60c0814452f246732750397b00e170a66f5ad242a388fc34fcb0bd3751e321755f3040dca1285a12140d72433e899e3bf9473536b1d27167285bd71c896cc845
-
SSDEEP
3072:k+8D+0oVzMVCqEAgcDRKqZmv8oMTHVgNdo1eQXDosPKNM+DgENeOGq+F3uT/xqpq:JZ1XAgcDaEoOHY6JcoKpxlTJ49u3md
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\EE8E82~1.EXE," ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\userinit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EE8E82~1.EXE" ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\9d19a2de = "ž\u008fs‡V\x17\x17Áö\x1e\vÿȬÖ,;zÞ³¶Lþ©-ñ›q¶É\x7f\x18¢{§·‰7…\u0090îR™vNÂXX¿\x16'CaÆËcçê®=\\³\x1aå\aD”ì‡\u0081ŸR̤K¾\bm/\fK‰Ž\x12\bsÎ\x13WøG’\u008f̆)z\nãH³°s\ví÷Jm\x01å\x02\v³£ŠáIʢ߳ÁÝ\v’Ûû/MwŠgmÿRzC-rrõY³ú\x1bŠ…Ê…¥}…â\x13Ú\n‹Í¢ë'á\x12\":Â’“Z¡µê…Ê2â²Ë\x02OéºÇª/Ý\tšÿ\u0081òR2*Ríy\u0081¥¥Eåú¥êÝ-j\n\x12\x1a\x15_aé2\u0081\añB:\u008dÿ\v\x15yE9mww\x1dÂûÊ:mßÉç\x0f7*õÅs‘í}ròê\n½ÝU±â¢" ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\EE8E82~1.EXE" ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe Token: SeSecurityPrivilege 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe Token: SeSecurityPrivilege 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe Token: SeSecurityPrivilege 1512 ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe"C:\Users\Admin\AppData\Local\Temp\ee8e8238f4d825095bf390b8c766080c6ff623fffdc2eaf4c071e8b920bf3673.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1512