Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
11/07/2023, 07:56 UTC
Behavioral task
behavioral1
Sample
23ac69eb0388a0fc0828c9e41b769201.exe
Resource
win7-20230703-en
5 signatures
150 seconds
General
-
Target
23ac69eb0388a0fc0828c9e41b769201.exe
-
Size
23KB
-
MD5
23ac69eb0388a0fc0828c9e41b769201
-
SHA1
f61ed517f92b306df0ff2f185c0ab097c5dbf46d
-
SHA256
7a78f5f7471015b05f36a45b9d53d05224e8b4796240c709c3a7067bd44bc543
-
SHA512
84925b643e6613cf698d78d68235d3469969a6f3d4d1f640aa80926de2ce38d42e211bb2efa651d6528050ced0d96fd3d07bba433a057eaac8aa1d4be44d8e90
-
SSDEEP
384:9dMK6b2GZsx/Yr1+liORH1kciFQ6Lg9gSOYRr9mRvR6JZlbw8hqIusZzZkz:9+b9glF51MRpcnul
Score
8/10
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1256 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b32bd74f2549d11fe61eb231dbe9f728.exe 23ac69eb0388a0fc0828c9e41b769201.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b32bd74f2549d11fe61eb231dbe9f728.exe 23ac69eb0388a0fc0828c9e41b769201.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 2256 23ac69eb0388a0fc0828c9e41b769201.exe Token: 33 2256 23ac69eb0388a0fc0828c9e41b769201.exe Token: SeIncBasePriorityPrivilege 2256 23ac69eb0388a0fc0828c9e41b769201.exe Token: 33 2256 23ac69eb0388a0fc0828c9e41b769201.exe Token: SeIncBasePriorityPrivilege 2256 23ac69eb0388a0fc0828c9e41b769201.exe Token: 33 2256 23ac69eb0388a0fc0828c9e41b769201.exe Token: SeIncBasePriorityPrivilege 2256 23ac69eb0388a0fc0828c9e41b769201.exe Token: 33 2256 23ac69eb0388a0fc0828c9e41b769201.exe Token: SeIncBasePriorityPrivilege 2256 23ac69eb0388a0fc0828c9e41b769201.exe Token: 33 2256 23ac69eb0388a0fc0828c9e41b769201.exe Token: SeIncBasePriorityPrivilege 2256 23ac69eb0388a0fc0828c9e41b769201.exe Token: 33 2256 23ac69eb0388a0fc0828c9e41b769201.exe Token: SeIncBasePriorityPrivilege 2256 23ac69eb0388a0fc0828c9e41b769201.exe Token: 33 2256 23ac69eb0388a0fc0828c9e41b769201.exe Token: SeIncBasePriorityPrivilege 2256 23ac69eb0388a0fc0828c9e41b769201.exe Token: 33 2256 23ac69eb0388a0fc0828c9e41b769201.exe Token: SeIncBasePriorityPrivilege 2256 23ac69eb0388a0fc0828c9e41b769201.exe Token: 33 2256 23ac69eb0388a0fc0828c9e41b769201.exe Token: SeIncBasePriorityPrivilege 2256 23ac69eb0388a0fc0828c9e41b769201.exe Token: 33 2256 23ac69eb0388a0fc0828c9e41b769201.exe Token: SeIncBasePriorityPrivilege 2256 23ac69eb0388a0fc0828c9e41b769201.exe Token: 33 2256 23ac69eb0388a0fc0828c9e41b769201.exe Token: SeIncBasePriorityPrivilege 2256 23ac69eb0388a0fc0828c9e41b769201.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2256 wrote to memory of 1256 2256 23ac69eb0388a0fc0828c9e41b769201.exe 28 PID 2256 wrote to memory of 1256 2256 23ac69eb0388a0fc0828c9e41b769201.exe 28 PID 2256 wrote to memory of 1256 2256 23ac69eb0388a0fc0828c9e41b769201.exe 28 PID 2256 wrote to memory of 1256 2256 23ac69eb0388a0fc0828c9e41b769201.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\23ac69eb0388a0fc0828c9e41b769201.exe"C:\Users\Admin\AppData\Local\Temp\23ac69eb0388a0fc0828c9e41b769201.exe"1⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\23ac69eb0388a0fc0828c9e41b769201.exe" "23ac69eb0388a0fc0828c9e41b769201.exe" ENABLE2⤵
- Modifies Windows Firewall
PID:1256
-
Network
-
Remote address:8.8.8.8:53Request0.tcp.sa.ngrok.ioIN AResponse0.tcp.sa.ngrok.ioIN A18.228.115.60
-
Remote address:8.8.8.8:53Request0.tcp.sa.ngrok.ioIN AResponse0.tcp.sa.ngrok.ioIN A18.229.248.167
-
Remote address:8.8.8.8:53Request0.tcp.sa.ngrok.ioIN AResponse0.tcp.sa.ngrok.ioIN A18.231.93.153
-
Remote address:8.8.8.8:53Request0.tcp.sa.ngrok.ioIN AResponse0.tcp.sa.ngrok.ioIN A18.231.93.153
-
528 B 367 B 5 5
-
528 B 367 B 5 5
-
528 B 367 B 5 5
-
528 B 367 B 5 5
-
528 B 367 B 5 5
-
528 B 367 B 5 5
-
528 B 367 B 5 5
-
528 B 367 B 5 5
-
528 B 367 B 5 5
-
528 B 367 B 5 5
-
528 B 367 B 5 5
-
528 B 367 B 5 5
-
528 B 367 B 5 5
-
528 B 367 B 5 5
-
528 B 367 B 5 5
-
528 B 367 B 5 5
-
528 B 367 B 5 5
-
528 B 367 B 5 5
-
528 B 367 B 5 5
-
528 B 367 B 5 5
-
528 B 367 B 5 5
-
528 B 367 B 5 5
-
528 B 367 B 5 5
-
528 B 367 B 5 5
-
528 B 367 B 5 5
-
528 B 367 B 5 5
-
528 B 367 B 5 5
-
528 B 354 B 5 5
-
528 B 354 B 5 5
-
528 B 354 B 5 5
-
528 B 354 B 5 5
-
528 B 354 B 5 5
-
528 B 354 B 5 5
-
528 B 354 B 5 5
-
528 B 354 B 5 5
-
528 B 354 B 5 5
-
528 B 354 B 5 5
-
482 B 354 B 4 5
-
528 B 354 B 5 5
-
528 B 354 B 5 5
-
528 B 354 B 5 5
-
528 B 354 B 5 5
-
528 B 354 B 5 5
-
528 B 354 B 5 5
-
528 B 354 B 5 5
-
528 B 354 B 5 5
-
-
63 B 79 B 1 1
DNS Request
0.tcp.sa.ngrok.io
DNS Response
18.228.115.60
-
63 B 79 B 1 1
DNS Request
0.tcp.sa.ngrok.io
DNS Response
18.229.248.167
-
63 B 79 B 1 1
DNS Request
0.tcp.sa.ngrok.io
DNS Response
18.231.93.153
-
63 B 79 B 1 1
DNS Request
0.tcp.sa.ngrok.io
DNS Response
18.231.93.153