Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
180s -
max time network
195s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 12:05
Static task
static1
Behavioral task
behavioral1
Sample
de56575a24381395ca9bb074e7830fdd0a64f368caa0200eab60b3de1266d856.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
de56575a24381395ca9bb074e7830fdd0a64f368caa0200eab60b3de1266d856.exe
Resource
win10v2004-20220812-en
General
-
Target
de56575a24381395ca9bb074e7830fdd0a64f368caa0200eab60b3de1266d856.exe
-
Size
252KB
-
MD5
3381a8362587384e210c87989baf1c63
-
SHA1
7629ab5fb235793248f5574d81f0e0f53113dd4d
-
SHA256
de56575a24381395ca9bb074e7830fdd0a64f368caa0200eab60b3de1266d856
-
SHA512
905f0b211370f604d9c9c5b6844c68dd4a4c9b151482201afbf1241ee4941f887afe0bb4642d429ac03f6f3df0459fe41d86fe9a67c2cad23b5c79732fbf49fd
-
SSDEEP
6144:E1rwii7st1Y+S6pYQCR+gs74dVGwG+oISthMZzLkV:ET+sH4wgsLMFkV
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\DE5657~1.EXE," de56575a24381395ca9bb074e7830fdd0a64f368caa0200eab60b3de1266d856.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\userinit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\DE5657~1.EXE" de56575a24381395ca9bb074e7830fdd0a64f368caa0200eab60b3de1266d856.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\DE5657~1.EXE" de56575a24381395ca9bb074e7830fdd0a64f368caa0200eab60b3de1266d856.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\22d540d9 = "H\x19DÇv\x05\b㎉’\b\x17ÀœÏK^Äñ\x1aÛ®¦4“’zÚÜMóÝŽ¢ð\u00a0”…\x19ÀZz\x1e}‚\v\x05ÒË.×\x19ÌxZé”'9~+¸à·êØ?í”\\Q³¾ÙÏ÷ž‰â\"ßñ/¬Ê¼E1S7Ÿ\r>¯æ\x06ü\u0090ÇÂ/@v¶fJҮꃽ½¦Ujº0Z{»Úˆê}þÐ^ÆŽ==îšnØ{5U«h\x02þv2XÚ«\x10îãàöÖÓ»ÎS=:\u00adµz\búpõ®>ªˆ2ò\x15v26ŽÈòh2¨£›®S=fÖö~ØVb®ÖÚ–jx¶\x12~ÖØžS\x02RÍŃ\u009d²¢«.&\u00a0êKÃ;榈ø²>þ.\u0090ÞbŽ`\x1dÚõCòÖÀ~ž\x10’í†\x12¦ÒÐã\"J抖" de56575a24381395ca9bb074e7830fdd0a64f368caa0200eab60b3de1266d856.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1140 de56575a24381395ca9bb074e7830fdd0a64f368caa0200eab60b3de1266d856.exe 1140 de56575a24381395ca9bb074e7830fdd0a64f368caa0200eab60b3de1266d856.exe 1140 de56575a24381395ca9bb074e7830fdd0a64f368caa0200eab60b3de1266d856.exe 1140 de56575a24381395ca9bb074e7830fdd0a64f368caa0200eab60b3de1266d856.exe 1140 de56575a24381395ca9bb074e7830fdd0a64f368caa0200eab60b3de1266d856.exe 1140 de56575a24381395ca9bb074e7830fdd0a64f368caa0200eab60b3de1266d856.exe 1140 de56575a24381395ca9bb074e7830fdd0a64f368caa0200eab60b3de1266d856.exe 1140 de56575a24381395ca9bb074e7830fdd0a64f368caa0200eab60b3de1266d856.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 1140 de56575a24381395ca9bb074e7830fdd0a64f368caa0200eab60b3de1266d856.exe Token: SeSecurityPrivilege 1140 de56575a24381395ca9bb074e7830fdd0a64f368caa0200eab60b3de1266d856.exe Token: SeSecurityPrivilege 1140 de56575a24381395ca9bb074e7830fdd0a64f368caa0200eab60b3de1266d856.exe Token: SeSecurityPrivilege 1140 de56575a24381395ca9bb074e7830fdd0a64f368caa0200eab60b3de1266d856.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\de56575a24381395ca9bb074e7830fdd0a64f368caa0200eab60b3de1266d856.exe"C:\Users\Admin\AppData\Local\Temp\de56575a24381395ca9bb074e7830fdd0a64f368caa0200eab60b3de1266d856.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1140