Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
33s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
24/04/2023, 18:46
Static task
static1
Behavioral task
behavioral1
Sample
synapse.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
synapse.exe
Resource
win10v2004-20230220-en
General
-
Target
synapse.exe
-
Size
8KB
-
MD5
4506834ae8d565ab52b2809540835d45
-
SHA1
ba6f9abcbd5f26013499b254a389b365f53049fd
-
SHA256
278f0fc06d1e17fc3994304f6aa0304128a189f0ec68ec95853bc0b119206e59
-
SHA512
883af1ad6cac152f552674a679b25d88dea0d236aa7aac1371afd0bf3b768d496e8768c020a83423368e2994d3bc13bf79a811fb8b45d8a3397a040d60d15e53
-
SSDEEP
192:Q/Sg1iGoiZX9llYeM0arl/DcMcbK2m7oim5Y+eLbM:Q/Sg1Nvlljarl/6u2woiaA
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 icanhazip.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1272 324 WerFault.exe 25 -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1563773381-2037468142-1146002597-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1000 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 324 synapse.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 324 wrote to memory of 1272 324 synapse.exe 29 PID 324 wrote to memory of 1272 324 synapse.exe 29 PID 324 wrote to memory of 1272 324 synapse.exe 29 PID 324 wrote to memory of 1272 324 synapse.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\synapse.exe"C:\Users\Admin\AppData\Local\Temp\synapse.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 324 -s 14162⤵
- Program crash
PID:1272
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\InstallStep.pcx1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:1000