Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 15:14
Static task
static1
Behavioral task
behavioral1
Sample
b0486f70c8a4d086617fe54a81f8c2ddecfc4c57311d8c1b9190397eccb6c9bf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b0486f70c8a4d086617fe54a81f8c2ddecfc4c57311d8c1b9190397eccb6c9bf.exe
Resource
win10v2004-20220812-en
General
-
Target
b0486f70c8a4d086617fe54a81f8c2ddecfc4c57311d8c1b9190397eccb6c9bf.exe
-
Size
321KB
-
MD5
00bfc15b5527777f676022553d8a4fd6
-
SHA1
cf71f0be3d4f39df06a1e592354546e6fb0327b8
-
SHA256
b0486f70c8a4d086617fe54a81f8c2ddecfc4c57311d8c1b9190397eccb6c9bf
-
SHA512
40b83b00d2277e349419900c4f4ddcb62b4193b8d2c3ccb1f529185ce22cc5286a8306b2c1a63b629d586333ebe2fbe3be685dfd90fce72d0118268595b00e0a
-
SSDEEP
6144:MTFvhumXZoYt+8wBGUErC36rFd8ya010nvhrTugoYtGg92Iv:GhuG+Tw06rFd8c10nUgoKdz
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\B0486F~1.EXE," b0486f70c8a4d086617fe54a81f8c2ddecfc4c57311d8c1b9190397eccb6c9bf.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\userinit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\B0486F~1.EXE" b0486f70c8a4d086617fe54a81f8c2ddecfc4c57311d8c1b9190397eccb6c9bf.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\B0486F~1.EXE" b0486f70c8a4d086617fe54a81f8c2ddecfc4c57311d8c1b9190397eccb6c9bf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\eda62f2 = "š\x06¤ëê(¸}ð9\x1a\f³~\b¥\x15ªÊ\x1e\x05ˆ\x01ò¤ÇÔœ\nQ»\x7fÒ•«7¨63ÿ\x19tq~\fX\x7fµÇ1\x16–q/>”\x1aªú}ûå¥J\x7f•îDúxW>”¿°„£c\x12šbUQš\u008fy[™ëHØǾ8pð\x12Ÿç7ÎΖk.Â\x12Î\fea6F>cÝÜéÉ÷Z&¼•Ë\x12\x12\a±Gž7\x15]6¼ˆ_>ZÂÞ®¾™åM<ÓwÜ•àéá‡F¾‡’¤¢_m«T\x1b—\x10\f)f\x0e]ó‘œ5ƒj]E‹h–O&…¡øD¢Tù<Ùv°\x12Çœö1í‚F\u009dm…ÞSøÍï\x7f’7&eý¾P?ŸÄ\u00a0ãwÉ\x0e#v±Ä¶xRý „Ëcÿ–6\ræaËfÆ¢|’Æt„’•" b0486f70c8a4d086617fe54a81f8c2ddecfc4c57311d8c1b9190397eccb6c9bf.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 756 b0486f70c8a4d086617fe54a81f8c2ddecfc4c57311d8c1b9190397eccb6c9bf.exe 756 b0486f70c8a4d086617fe54a81f8c2ddecfc4c57311d8c1b9190397eccb6c9bf.exe 756 b0486f70c8a4d086617fe54a81f8c2ddecfc4c57311d8c1b9190397eccb6c9bf.exe 756 b0486f70c8a4d086617fe54a81f8c2ddecfc4c57311d8c1b9190397eccb6c9bf.exe 756 b0486f70c8a4d086617fe54a81f8c2ddecfc4c57311d8c1b9190397eccb6c9bf.exe 756 b0486f70c8a4d086617fe54a81f8c2ddecfc4c57311d8c1b9190397eccb6c9bf.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 756 b0486f70c8a4d086617fe54a81f8c2ddecfc4c57311d8c1b9190397eccb6c9bf.exe Token: SeSecurityPrivilege 756 b0486f70c8a4d086617fe54a81f8c2ddecfc4c57311d8c1b9190397eccb6c9bf.exe Token: SeSecurityPrivilege 756 b0486f70c8a4d086617fe54a81f8c2ddecfc4c57311d8c1b9190397eccb6c9bf.exe Token: SeSecurityPrivilege 756 b0486f70c8a4d086617fe54a81f8c2ddecfc4c57311d8c1b9190397eccb6c9bf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0486f70c8a4d086617fe54a81f8c2ddecfc4c57311d8c1b9190397eccb6c9bf.exe"C:\Users\Admin\AppData\Local\Temp\b0486f70c8a4d086617fe54a81f8c2ddecfc4c57311d8c1b9190397eccb6c9bf.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:756