Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
22/05/2023, 10:31
230522-mkghkaad6t 322/05/2023, 10:00
230522-l1xdaafe75 322/05/2023, 09:58
230522-lzv4tsfe72 322/05/2023, 09:57
230522-lyz2dsac5z 3Analysis
-
max time kernel
30s -
max time network
32s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2023, 09:57
Static task
static1
Behavioral task
behavioral1
Sample
winHTTP.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
winHTTP.exe
Resource
win10v2004-20230220-en
General
-
Target
winHTTP.exe
-
Size
71KB
-
MD5
42350d934e950efe84485f138baea04a
-
SHA1
365e36db858e8d07fecf25a437386180b3a8e3ec
-
SHA256
cc3530b39340965530cb06d3cf7c100cc03542dbb988830b86490f0d26934fb3
-
SHA512
1406c9620c2a2bb2cd4d16f4968f24a0f494aed50f179c5f283f00e75c818d1ee1f35e0a5e81c2bfa415e9071980dfb03fdf801e4e87068b608eb8ddcfbd8471
-
SSDEEP
768:F6+27TkhNSsp9b2mNCK66vBWvBNLEaLt:FN2naSgkmUK66pWvBNYe
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2668 taskmgr.exe Token: SeSystemProfilePrivilege 2668 taskmgr.exe Token: SeCreateGlobalPrivilege 2668 taskmgr.exe -
Suspicious use of FindShellTrayWindow 19 IoCs
pid Process 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe 2668 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\winHTTP.exe"C:\Users\Admin\AppData\Local\Temp\winHTTP.exe"1⤵PID:1192
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2668