Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
214s -
max time network
236s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 13:18
Static task
static1
Behavioral task
behavioral1
Sample
a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f.exe
Resource
win10v2004-20221111-en
General
-
Target
a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f.exe
-
Size
53KB
-
MD5
8400820fbbc384feaec5e28558139052
-
SHA1
806a60eca38e7932acd2d9995a29512f0f2ce5e3
-
SHA256
a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f
-
SHA512
da0d598607a8f30b45075936afcb527afc76cc089a21c9ee1a82022ab0d9f91990017ce45f4f19a9301350972b8d54205e55dea7fe23876e92b90beb76a80bd3
-
SSDEEP
768:745U2Bvzx4n8l6LqAAMAZnjFy91QxEpXts3l11ecrAG726jdpI9GHDe28X9:745BuHAzZyTFVqIAAuL7DW9
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\msnmgr.exe" a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f.exe -
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f.exe:*:Enabled:Userinit" a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f.exe -
Executes dropped EXE 2 IoCs
pid Process 1508 msnmgr.exe 64 msnmgr.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5028 set thread context of 2192 5028 a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f.exe 81 PID 1508 set thread context of 64 1508 msnmgr.exe 83 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\msnmgr.exe a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f.exe File opened for modification C:\Windows\msnmgr.exe a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 5028 wrote to memory of 2192 5028 a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f.exe 81 PID 5028 wrote to memory of 2192 5028 a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f.exe 81 PID 5028 wrote to memory of 2192 5028 a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f.exe 81 PID 5028 wrote to memory of 2192 5028 a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f.exe 81 PID 5028 wrote to memory of 2192 5028 a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f.exe 81 PID 5028 wrote to memory of 2192 5028 a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f.exe 81 PID 5028 wrote to memory of 2192 5028 a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f.exe 81 PID 5028 wrote to memory of 2192 5028 a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f.exe 81 PID 5028 wrote to memory of 2192 5028 a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f.exe 81 PID 2192 wrote to memory of 1508 2192 a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f.exe 82 PID 2192 wrote to memory of 1508 2192 a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f.exe 82 PID 2192 wrote to memory of 1508 2192 a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f.exe 82 PID 1508 wrote to memory of 64 1508 msnmgr.exe 83 PID 1508 wrote to memory of 64 1508 msnmgr.exe 83 PID 1508 wrote to memory of 64 1508 msnmgr.exe 83 PID 1508 wrote to memory of 64 1508 msnmgr.exe 83 PID 1508 wrote to memory of 64 1508 msnmgr.exe 83 PID 1508 wrote to memory of 64 1508 msnmgr.exe 83 PID 1508 wrote to memory of 64 1508 msnmgr.exe 83 PID 1508 wrote to memory of 64 1508 msnmgr.exe 83 PID 1508 wrote to memory of 64 1508 msnmgr.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f.exe"C:\Users\Admin\AppData\Local\Temp\a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f.exe"C:\Users\Admin\AppData\Local\Temp\a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f.exe"2⤵
- Modifies WinLogon for persistence
- Modifies firewall policy service
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\msnmgr.exe"C:\Windows\msnmgr.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\msnmgr.exe"C:\Windows\msnmgr.exe"4⤵
- Executes dropped EXE
PID:64
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD58400820fbbc384feaec5e28558139052
SHA1806a60eca38e7932acd2d9995a29512f0f2ce5e3
SHA256a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f
SHA512da0d598607a8f30b45075936afcb527afc76cc089a21c9ee1a82022ab0d9f91990017ce45f4f19a9301350972b8d54205e55dea7fe23876e92b90beb76a80bd3
-
Filesize
53KB
MD58400820fbbc384feaec5e28558139052
SHA1806a60eca38e7932acd2d9995a29512f0f2ce5e3
SHA256a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f
SHA512da0d598607a8f30b45075936afcb527afc76cc089a21c9ee1a82022ab0d9f91990017ce45f4f19a9301350972b8d54205e55dea7fe23876e92b90beb76a80bd3
-
Filesize
53KB
MD58400820fbbc384feaec5e28558139052
SHA1806a60eca38e7932acd2d9995a29512f0f2ce5e3
SHA256a89aa325dd9cab012b6507d0b5d3ef4d5a037d6db170350df93c5f704dfab95f
SHA512da0d598607a8f30b45075936afcb527afc76cc089a21c9ee1a82022ab0d9f91990017ce45f4f19a9301350972b8d54205e55dea7fe23876e92b90beb76a80bd3