Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
16/12/2022, 08:22
Static task
static1
Behavioral task
behavioral1
Sample
Scan20221216192254.exe
Resource
win7-20220812-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
Scan20221216192254.exe
Resource
win10v2004-20220812-en
6 signatures
150 seconds
General
-
Target
Scan20221216192254.exe
-
Size
1.4MB
-
MD5
876f5f878fc3f716cd877443ee68f7e3
-
SHA1
35a223eadf77e713de0f6a7951fdb32ec5a48973
-
SHA256
dfa31b84bc2fc462da90b7f1a13c30ef92965ceeb06db45879a5443ea0d99920
-
SHA512
3bc2f3a97613d054261086d0c1e83dab9237717142ac7d3ffe91ca5e918f73f0cf57b53e86aa1b4170c5bc4794c661fd079217d9e8150f7a942dde4e43dc6e83
-
SSDEEP
12288:OixF+mYOpvTDg1Hoz+JE2QsO4BeylBqN6hFfX05M1pDUQDoC+v5c+JQZ24146/PQ:rCEHsOzj4j85M1hUQDAxzJX4vgkW
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,C:\\Users\\Admin\\AppData\\Roaming\\Msacos\\Msacs.exe," reg.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 1640 PING.EXE 1160 PING.EXE 1812 PING.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1212 Scan20221216192254.exe 1212 Scan20221216192254.exe 1212 Scan20221216192254.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1212 Scan20221216192254.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1212 wrote to memory of 960 1212 Scan20221216192254.exe 28 PID 1212 wrote to memory of 960 1212 Scan20221216192254.exe 28 PID 1212 wrote to memory of 960 1212 Scan20221216192254.exe 28 PID 1212 wrote to memory of 960 1212 Scan20221216192254.exe 28 PID 960 wrote to memory of 1640 960 cmd.exe 30 PID 960 wrote to memory of 1640 960 cmd.exe 30 PID 960 wrote to memory of 1640 960 cmd.exe 30 PID 960 wrote to memory of 1640 960 cmd.exe 30 PID 1212 wrote to memory of 992 1212 Scan20221216192254.exe 31 PID 1212 wrote to memory of 992 1212 Scan20221216192254.exe 31 PID 1212 wrote to memory of 992 1212 Scan20221216192254.exe 31 PID 1212 wrote to memory of 992 1212 Scan20221216192254.exe 31 PID 992 wrote to memory of 1160 992 cmd.exe 33 PID 992 wrote to memory of 1160 992 cmd.exe 33 PID 992 wrote to memory of 1160 992 cmd.exe 33 PID 992 wrote to memory of 1160 992 cmd.exe 33 PID 960 wrote to memory of 636 960 cmd.exe 34 PID 960 wrote to memory of 636 960 cmd.exe 34 PID 960 wrote to memory of 636 960 cmd.exe 34 PID 960 wrote to memory of 636 960 cmd.exe 34 PID 992 wrote to memory of 1812 992 cmd.exe 35 PID 992 wrote to memory of 1812 992 cmd.exe 35 PID 992 wrote to memory of 1812 992 cmd.exe 35 PID 992 wrote to memory of 1812 992 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\Scan20221216192254.exe"C:\Users\Admin\AppData\Local\Temp\Scan20221216192254.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 36 > nul && REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\Msacos\Msacs.exe,"2⤵
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 363⤵
- Runs ping.exe
PID:1640
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\Msacos\Msacs.exe,"3⤵
- Modifies WinLogon for persistence
PID:636
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 42 > nul && copy "C:\Users\Admin\AppData\Local\Temp\Scan20221216192254.exe" "C:\Users\Admin\AppData\Roaming\Msacos\Msacs.exe" && ping 127.0.0.1 -n 42 > nul && "C:\Users\Admin\AppData\Roaming\Msacos\Msacs.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 423⤵
- Runs ping.exe
PID:1160
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 423⤵
- Runs ping.exe
PID:1812
-
-