Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2023, 07:56
Behavioral task
behavioral1
Sample
23ac69eb0388a0fc0828c9e41b769201.exe
Resource
win7-20230703-en
5 signatures
150 seconds
General
-
Target
23ac69eb0388a0fc0828c9e41b769201.exe
-
Size
23KB
-
MD5
23ac69eb0388a0fc0828c9e41b769201
-
SHA1
f61ed517f92b306df0ff2f185c0ab097c5dbf46d
-
SHA256
7a78f5f7471015b05f36a45b9d53d05224e8b4796240c709c3a7067bd44bc543
-
SHA512
84925b643e6613cf698d78d68235d3469969a6f3d4d1f640aa80926de2ce38d42e211bb2efa651d6528050ced0d96fd3d07bba433a057eaac8aa1d4be44d8e90
-
SSDEEP
384:9dMK6b2GZsx/Yr1+liORH1kciFQ6Lg9gSOYRr9mRvR6JZlbw8hqIusZzZkz:9+b9glF51MRpcnul
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 404 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b32bd74f2549d11fe61eb231dbe9f728.exe 23ac69eb0388a0fc0828c9e41b769201.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\b32bd74f2549d11fe61eb231dbe9f728.exe 23ac69eb0388a0fc0828c9e41b769201.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeDebugPrivilege 4580 23ac69eb0388a0fc0828c9e41b769201.exe Token: 33 4580 23ac69eb0388a0fc0828c9e41b769201.exe Token: SeIncBasePriorityPrivilege 4580 23ac69eb0388a0fc0828c9e41b769201.exe Token: 33 4580 23ac69eb0388a0fc0828c9e41b769201.exe Token: SeIncBasePriorityPrivilege 4580 23ac69eb0388a0fc0828c9e41b769201.exe Token: 33 4580 23ac69eb0388a0fc0828c9e41b769201.exe Token: SeIncBasePriorityPrivilege 4580 23ac69eb0388a0fc0828c9e41b769201.exe Token: 33 4580 23ac69eb0388a0fc0828c9e41b769201.exe Token: SeIncBasePriorityPrivilege 4580 23ac69eb0388a0fc0828c9e41b769201.exe Token: 33 4580 23ac69eb0388a0fc0828c9e41b769201.exe Token: SeIncBasePriorityPrivilege 4580 23ac69eb0388a0fc0828c9e41b769201.exe Token: 33 4580 23ac69eb0388a0fc0828c9e41b769201.exe Token: SeIncBasePriorityPrivilege 4580 23ac69eb0388a0fc0828c9e41b769201.exe Token: 33 4580 23ac69eb0388a0fc0828c9e41b769201.exe Token: SeIncBasePriorityPrivilege 4580 23ac69eb0388a0fc0828c9e41b769201.exe Token: 33 4580 23ac69eb0388a0fc0828c9e41b769201.exe Token: SeIncBasePriorityPrivilege 4580 23ac69eb0388a0fc0828c9e41b769201.exe Token: 33 4580 23ac69eb0388a0fc0828c9e41b769201.exe Token: SeIncBasePriorityPrivilege 4580 23ac69eb0388a0fc0828c9e41b769201.exe Token: 33 4580 23ac69eb0388a0fc0828c9e41b769201.exe Token: SeIncBasePriorityPrivilege 4580 23ac69eb0388a0fc0828c9e41b769201.exe Token: 33 4580 23ac69eb0388a0fc0828c9e41b769201.exe Token: SeIncBasePriorityPrivilege 4580 23ac69eb0388a0fc0828c9e41b769201.exe Token: 33 4580 23ac69eb0388a0fc0828c9e41b769201.exe Token: SeIncBasePriorityPrivilege 4580 23ac69eb0388a0fc0828c9e41b769201.exe Token: 33 4580 23ac69eb0388a0fc0828c9e41b769201.exe Token: SeIncBasePriorityPrivilege 4580 23ac69eb0388a0fc0828c9e41b769201.exe Token: 33 4580 23ac69eb0388a0fc0828c9e41b769201.exe Token: SeIncBasePriorityPrivilege 4580 23ac69eb0388a0fc0828c9e41b769201.exe Token: 33 4580 23ac69eb0388a0fc0828c9e41b769201.exe Token: SeIncBasePriorityPrivilege 4580 23ac69eb0388a0fc0828c9e41b769201.exe Token: 33 4580 23ac69eb0388a0fc0828c9e41b769201.exe Token: SeIncBasePriorityPrivilege 4580 23ac69eb0388a0fc0828c9e41b769201.exe Token: 33 4580 23ac69eb0388a0fc0828c9e41b769201.exe Token: SeIncBasePriorityPrivilege 4580 23ac69eb0388a0fc0828c9e41b769201.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4580 wrote to memory of 404 4580 23ac69eb0388a0fc0828c9e41b769201.exe 90 PID 4580 wrote to memory of 404 4580 23ac69eb0388a0fc0828c9e41b769201.exe 90 PID 4580 wrote to memory of 404 4580 23ac69eb0388a0fc0828c9e41b769201.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\23ac69eb0388a0fc0828c9e41b769201.exe"C:\Users\Admin\AppData\Local\Temp\23ac69eb0388a0fc0828c9e41b769201.exe"1⤵
- Drops startup file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\23ac69eb0388a0fc0828c9e41b769201.exe" "23ac69eb0388a0fc0828c9e41b769201.exe" ENABLE2⤵
- Modifies Windows Firewall
PID:404
-