Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
22/07/2023, 18:05
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230712-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230703-en
6 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
306KB
-
MD5
f9f7e4b734d555814439256a4550a9dd
-
SHA1
110f36964c9ad34d35e7afeb48215764500d37cd
-
SHA256
97261fee3b80f8396ae8c4c2522d7613b69b41644e5c8e03948aedf6778c3e42
-
SHA512
5d80924fe621eeb456e213812efabd545b156adcd13d83068ce76572bb199d9f10f606efd8d9c2fb0fff4b3318cde384b390b8e94cd8dc82955718cf62ea691e
-
SSDEEP
6144:ZaA+l9nqPU0wLpfAWGWrF4pXkgJFF1kCsOPF/TbL8LahOlosA:ZJ+l9sUxpUiF4lksFmCr/TbLAaAlo
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3408354897-1169622894-3874090110-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Roaming\\ViperFolder\\FiperA.exe\"," tmp.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2796 set thread context of 2992 2796 tmp.exe 32 -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2992 RegAsm.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2796 tmp.exe 2796 tmp.exe 2796 tmp.exe 2796 tmp.exe 2796 tmp.exe 2796 tmp.exe 2796 tmp.exe 2796 tmp.exe 2796 tmp.exe 2796 tmp.exe 2796 tmp.exe 2796 tmp.exe 2796 tmp.exe 2796 tmp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2796 tmp.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2796 wrote to memory of 2820 2796 tmp.exe 29 PID 2796 wrote to memory of 2820 2796 tmp.exe 29 PID 2796 wrote to memory of 2820 2796 tmp.exe 29 PID 2796 wrote to memory of 2820 2796 tmp.exe 29 PID 2796 wrote to memory of 2820 2796 tmp.exe 29 PID 2796 wrote to memory of 2820 2796 tmp.exe 29 PID 2796 wrote to memory of 2820 2796 tmp.exe 29 PID 2796 wrote to memory of 3012 2796 tmp.exe 30 PID 2796 wrote to memory of 3012 2796 tmp.exe 30 PID 2796 wrote to memory of 3012 2796 tmp.exe 30 PID 2796 wrote to memory of 3012 2796 tmp.exe 30 PID 2796 wrote to memory of 3012 2796 tmp.exe 30 PID 2796 wrote to memory of 3012 2796 tmp.exe 30 PID 2796 wrote to memory of 3012 2796 tmp.exe 30 PID 2796 wrote to memory of 2988 2796 tmp.exe 31 PID 2796 wrote to memory of 2988 2796 tmp.exe 31 PID 2796 wrote to memory of 2988 2796 tmp.exe 31 PID 2796 wrote to memory of 2988 2796 tmp.exe 31 PID 2796 wrote to memory of 2988 2796 tmp.exe 31 PID 2796 wrote to memory of 2988 2796 tmp.exe 31 PID 2796 wrote to memory of 2988 2796 tmp.exe 31 PID 2796 wrote to memory of 2992 2796 tmp.exe 32 PID 2796 wrote to memory of 2992 2796 tmp.exe 32 PID 2796 wrote to memory of 2992 2796 tmp.exe 32 PID 2796 wrote to memory of 2992 2796 tmp.exe 32 PID 2796 wrote to memory of 2992 2796 tmp.exe 32 PID 2796 wrote to memory of 2992 2796 tmp.exe 32 PID 2796 wrote to memory of 2992 2796 tmp.exe 32 PID 2796 wrote to memory of 2992 2796 tmp.exe 32 PID 2796 wrote to memory of 2992 2796 tmp.exe 32 PID 2796 wrote to memory of 2992 2796 tmp.exe 32 PID 2796 wrote to memory of 2992 2796 tmp.exe 32 PID 2796 wrote to memory of 2992 2796 tmp.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Modifies WinLogon for persistence
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe2⤵PID:2820
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe2⤵PID:3012
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe2⤵PID:2988
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe2⤵
- Suspicious behavior: AddClipboardFormatListener
PID:2992
-