Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
195s -
max time network
219s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 19:22
Static task
static1
Behavioral task
behavioral1
Sample
c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe
Resource
win7-20221111-en
10 signatures
150 seconds
General
-
Target
c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe
-
Size
2.1MB
-
MD5
1207c3fa6aca6423d82843958c6b566b
-
SHA1
67a6ee64f744ab9df86bbc74132934a9a6613dfc
-
SHA256
c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a
-
SHA512
6e463b9db32dbc1a78fc5f202a56f3ca259cba4e7c868912b686d666a8347dd8e289ada3bdea22449f9ccd07ae1537832c74b8f321bdf15d825aef57272b52d5
-
SSDEEP
24576:LmY2FUYkUQXYuHnvrCRpeVTWPHW5ER43ZpjnN/3W8HON1h:KUU8YuHT7TWPH+ERuznN/3WH1h
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 216 netsh.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "0" c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4900 set thread context of 2604 4900 c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe 85 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeBackupPrivilege 4900 c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4900 c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4900 wrote to memory of 3516 4900 c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe 83 PID 4900 wrote to memory of 3516 4900 c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe 83 PID 4900 wrote to memory of 3516 4900 c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe 83 PID 4900 wrote to memory of 2604 4900 c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe 85 PID 4900 wrote to memory of 2604 4900 c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe 85 PID 4900 wrote to memory of 2604 4900 c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe 85 PID 4900 wrote to memory of 2604 4900 c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe 85 PID 4900 wrote to memory of 2604 4900 c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe 85 PID 3516 wrote to memory of 216 3516 cmd.exe 86 PID 3516 wrote to memory of 216 3516 cmd.exe 86 PID 3516 wrote to memory of 216 3516 cmd.exe 86 PID 4900 wrote to memory of 2604 4900 c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe 85 PID 4900 wrote to memory of 2604 4900 c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe 85 PID 4900 wrote to memory of 2604 4900 c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe 85 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe"C:\Users\Admin\AppData\Local\Temp\c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe"1⤵
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4900 -
C:\Windows\SysWOW64\cmd.execmd.exe /c netsh firewall set opmode disable2⤵
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode disable3⤵
- Modifies Windows Firewall
PID:216
-
-
-
C:\Users\Admin\AppData\Local\Temp\c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exeC:\Users\Admin\AppData\Local\Temp\c725dbb766baae01124069b08f50e7fc9cb528cd589787fadd8cbb02d49b6a1a.exe2⤵PID:2604
-