Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
18/08/2023, 16:06
Static task
static1
Behavioral task
behavioral1
Sample
e8c39e32103acb730241925227d55b3dbb1fb8088c741ca592ea0c9a868f604a.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
e8c39e32103acb730241925227d55b3dbb1fb8088c741ca592ea0c9a868f604a.exe
Resource
win10v2004-20230703-en
General
-
Target
e8c39e32103acb730241925227d55b3dbb1fb8088c741ca592ea0c9a868f604a.exe
-
Size
310KB
-
MD5
91a0262d7017ee2bc268d043d8c11ab1
-
SHA1
d41ff479d5d3698cbf268b97bf69dbe410b4f530
-
SHA256
e8c39e32103acb730241925227d55b3dbb1fb8088c741ca592ea0c9a868f604a
-
SHA512
9392982da83c693186c43b97947f49dc8c179c74360e0e5d8a059c35116fa965d446fa3b68220684afb0f353ed6a739dab7a65666ef937b96fdd2cf2ebeaaf84
-
SSDEEP
6144:2177pS1rRGF2xPvJcDr+y4xOtMCmlz5a7dX9QQ:2181rRGF2xPqDrYEtGsdtQ
Malware Config
Signatures
-
Downloads MZ/PE file
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2840 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2972 e8c39e32103acb730241925227d55b3dbb1fb8088c741ca592ea0c9a868f604a.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2972 e8c39e32103acb730241925227d55b3dbb1fb8088c741ca592ea0c9a868f604a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2840 taskkill.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2100 2972 e8c39e32103acb730241925227d55b3dbb1fb8088c741ca592ea0c9a868f604a.exe 28 PID 2972 wrote to memory of 2100 2972 e8c39e32103acb730241925227d55b3dbb1fb8088c741ca592ea0c9a868f604a.exe 28 PID 2972 wrote to memory of 2100 2972 e8c39e32103acb730241925227d55b3dbb1fb8088c741ca592ea0c9a868f604a.exe 28 PID 2100 wrote to memory of 2840 2100 cmd.exe 30 PID 2100 wrote to memory of 2840 2100 cmd.exe 30 PID 2100 wrote to memory of 2840 2100 cmd.exe 30 PID 2972 wrote to memory of 2940 2972 e8c39e32103acb730241925227d55b3dbb1fb8088c741ca592ea0c9a868f604a.exe 32 PID 2972 wrote to memory of 2940 2972 e8c39e32103acb730241925227d55b3dbb1fb8088c741ca592ea0c9a868f604a.exe 32 PID 2972 wrote to memory of 2940 2972 e8c39e32103acb730241925227d55b3dbb1fb8088c741ca592ea0c9a868f604a.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8c39e32103acb730241925227d55b3dbb1fb8088c741ca592ea0c9a868f604a.exe"C:\Users\Admin\AppData\Local\Temp\e8c39e32103acb730241925227d55b3dbb1fb8088c741ca592ea0c9a868f604a.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c TASKKILL /F /IM "steam.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\system32\taskkill.exeTASKKILL /F /IM "steam.exe"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c Start steam://2⤵PID:2940
-