Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
98s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2023, 20:58
Static task
static1
Behavioral task
behavioral1
Sample
client.windows.386.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
client.windows.386.exe
Resource
win10v2004-20230703-en
General
-
Target
client.windows.386.exe
-
Size
4.3MB
-
MD5
b55c1f114e2627e4ed912dce3f52cf4f
-
SHA1
17e64e6983f4e95b347529c688dd936a4f46f09d
-
SHA256
7b26ff94fbfdec8d00f71dd83d88a0d2b3caf4ea807d2fc02474b90283671a1f
-
SHA512
7075b3acb3afa3927bcf1ed70ec0fe4138afa19a5c502f1bef3e56ea4133361648fe6409e0592ce3131e3e2c1f8bae19728b39e8963219943b6b4c1079d8ca2a
-
SSDEEP
49152:PKsmZEsgm7zK8cluafG2VmFzNudjzD4nBYHjDUrjJqKm5OLitfHW+doG5F1ew2K:CJafckxmFAdjzUsDUD+2
Malware Config
Signatures
-
Contacts a large (114175) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates new service(s) 1 TTPs
-
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 760 sc.exe 3892 sc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2564 powershell.exe 2564 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2564 powershell.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3212 wrote to memory of 396 3212 client.windows.386.exe 82 PID 3212 wrote to memory of 396 3212 client.windows.386.exe 82 PID 3212 wrote to memory of 396 3212 client.windows.386.exe 82 PID 396 wrote to memory of 4428 396 client.windows.386.exe 83 PID 396 wrote to memory of 4428 396 client.windows.386.exe 83 PID 396 wrote to memory of 4428 396 client.windows.386.exe 83 PID 4428 wrote to memory of 760 4428 cmd.exe 86 PID 4428 wrote to memory of 760 4428 cmd.exe 86 PID 4428 wrote to memory of 760 4428 cmd.exe 86 PID 396 wrote to memory of 2564 396 client.windows.386.exe 87 PID 396 wrote to memory of 2564 396 client.windows.386.exe 87 PID 396 wrote to memory of 2564 396 client.windows.386.exe 87 PID 2564 wrote to memory of 3144 2564 powershell.exe 91 PID 2564 wrote to memory of 3144 2564 powershell.exe 91 PID 2564 wrote to memory of 3144 2564 powershell.exe 91 PID 3144 wrote to memory of 3892 3144 cmd.exe 92 PID 3144 wrote to memory of 3892 3144 cmd.exe 92 PID 3144 wrote to memory of 3892 3144 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\client.windows.386.exe"C:\Users\Admin\AppData\Local\Temp\client.windows.386.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\client.windows.386.exeC:\Users\Admin\AppData\Local\Temp\client.windows.386.exe -f2⤵
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\cmd.execmd.exe /C sc qc netserv3⤵
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\sc.exesc qc netserv4⤵
- Launches sc.exe
PID:760
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -encodedCommand YwBtAGQALgBlAHgAZQAgAC8AYwAgAHMAYwAgAGMAcgBlAGEAdABlACAAbgBlAHQAcwBlAHIAdgAgAGIAaQBuAFAAYQB0AGgAPQAgACIAQwA6AFwAVQBzAGUAcgBzAFwAQQBkAG0AaQBuAFwAQQBwAHAARABhAHQAYQBcAEwAbwBjAGEAbABcAFQAZQBtAHAAXABDAEwASQBFAE4AVAB+ADEALgBFAFgARQAiACAAdAB5AHAAZQA9ACAAbwB3AG4AIABzAHQAYQByAHQAPQAgAGEAdQB0AG8A3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c sc create netserv binPath= C:\Users\Admin\AppData\Local\Temp\CLIENT~1.EXE type= own start= auto4⤵
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\SysWOW64\sc.exesc create netserv binPath= C:\Users\Admin\AppData\Local\Temp\CLIENT~1.EXE type= own start= auto5⤵
- Launches sc.exe
PID:3892
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82