Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
226s -
max time network
287s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
10/02/2023, 15:07
Static task
static1
Behavioral task
behavioral1
Sample
entry001/CounterTool.exe
Resource
win7-20221111-en
0 signatures
300 seconds
Behavioral task
behavioral2
Sample
entry001/CounterTool.exe
Resource
win10v2004-20221111-en
7 signatures
300 seconds
General
-
Target
entry001/CounterTool.exe
-
Size
32KB
-
MD5
93822650a6ce5e6e7625418360ecc935
-
SHA1
b58bf01e0ce32cda243c2491e5fd8a7a6c3ca02c
-
SHA256
ec84be66200d09941945109056e1ead8c8dc91f37de9e4e66c4f3539c4a273c5
-
SHA512
3abb336e3816937130ca57dc4feed8e322d6ac04503302ef9158efb70dc00de4f525f7ff3c02bdb28eab5b2dc2cb64aca1af5596822639213d13dc064b78369b
-
SSDEEP
768:LygDnGgojdLxOQPpMtwOuPszMEZIQR1O:L8Ct4GM+U
Score
8/10
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchApp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchApp.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings\MuiCache SearchApp.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2971393436-602173351-1645505021-1000\{A00C5FD3-FB97-43D5-96BA-C32EC8751944} explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 4312 explorer.exe Token: SeCreatePagefilePrivilege 4312 explorer.exe Token: SeShutdownPrivilege 4312 explorer.exe Token: SeCreatePagefilePrivilege 4312 explorer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4312 explorer.exe 4312 explorer.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4312 explorer.exe 4312 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2408 SearchApp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\entry001\CounterTool.exe"C:\Users\Admin\AppData\Local\Temp\entry001\CounterTool.exe"1⤵PID:3648
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:2924
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2408
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4312