Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
126s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2023, 18:11 UTC
Static task
static1
Behavioral task
behavioral1
Sample
6544731644361dc0564b8286eafbfcc5e57c1a1fd5fbbbcb3f8316f81c6b3723_JC.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
6544731644361dc0564b8286eafbfcc5e57c1a1fd5fbbbcb3f8316f81c6b3723_JC.exe
Resource
win10v2004-20230703-en
General
-
Target
6544731644361dc0564b8286eafbfcc5e57c1a1fd5fbbbcb3f8316f81c6b3723_JC.exe
-
Size
1.3MB
-
MD5
35b611cdea14a62de14b1f8471162853
-
SHA1
f138441d6987c1f57d448965bc64f9bc417d3844
-
SHA256
6544731644361dc0564b8286eafbfcc5e57c1a1fd5fbbbcb3f8316f81c6b3723
-
SHA512
b75ed07047c03174cc8a3f86808786200fb0e74e051bee758ccefc64cbea98915927c86ca799daff7ec44256674cf4159682cae375bfc570cdc3e89947e65e6b
-
SSDEEP
24576:hGtcJ+P7/Nx4aZcoootnwKDJiBPrMpG0mFmcyNCFZnI9QU3:6D1qaZcH6wGiBPD02mLYbc
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 60 set thread context of 1884 60 6544731644361dc0564b8286eafbfcc5e57c1a1fd5fbbbcb3f8316f81c6b3723_JC.exe 97 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 960 ipconfig.exe 1800 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1884 AppLaunch.exe 1884 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 60 6544731644361dc0564b8286eafbfcc5e57c1a1fd5fbbbcb3f8316f81c6b3723_JC.exe Token: SeDebugPrivilege 1884 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1884 AppLaunch.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 60 wrote to memory of 4956 60 6544731644361dc0564b8286eafbfcc5e57c1a1fd5fbbbcb3f8316f81c6b3723_JC.exe 86 PID 60 wrote to memory of 4956 60 6544731644361dc0564b8286eafbfcc5e57c1a1fd5fbbbcb3f8316f81c6b3723_JC.exe 86 PID 60 wrote to memory of 4956 60 6544731644361dc0564b8286eafbfcc5e57c1a1fd5fbbbcb3f8316f81c6b3723_JC.exe 86 PID 4956 wrote to memory of 960 4956 cmd.exe 89 PID 4956 wrote to memory of 960 4956 cmd.exe 89 PID 4956 wrote to memory of 960 4956 cmd.exe 89 PID 60 wrote to memory of 3124 60 6544731644361dc0564b8286eafbfcc5e57c1a1fd5fbbbcb3f8316f81c6b3723_JC.exe 94 PID 60 wrote to memory of 3124 60 6544731644361dc0564b8286eafbfcc5e57c1a1fd5fbbbcb3f8316f81c6b3723_JC.exe 94 PID 60 wrote to memory of 3124 60 6544731644361dc0564b8286eafbfcc5e57c1a1fd5fbbbcb3f8316f81c6b3723_JC.exe 94 PID 3124 wrote to memory of 1800 3124 cmd.exe 96 PID 3124 wrote to memory of 1800 3124 cmd.exe 96 PID 3124 wrote to memory of 1800 3124 cmd.exe 96 PID 60 wrote to memory of 1884 60 6544731644361dc0564b8286eafbfcc5e57c1a1fd5fbbbcb3f8316f81c6b3723_JC.exe 97 PID 60 wrote to memory of 1884 60 6544731644361dc0564b8286eafbfcc5e57c1a1fd5fbbbcb3f8316f81c6b3723_JC.exe 97 PID 60 wrote to memory of 1884 60 6544731644361dc0564b8286eafbfcc5e57c1a1fd5fbbbcb3f8316f81c6b3723_JC.exe 97 PID 60 wrote to memory of 1884 60 6544731644361dc0564b8286eafbfcc5e57c1a1fd5fbbbcb3f8316f81c6b3723_JC.exe 97 PID 60 wrote to memory of 1884 60 6544731644361dc0564b8286eafbfcc5e57c1a1fd5fbbbcb3f8316f81c6b3723_JC.exe 97 PID 60 wrote to memory of 1884 60 6544731644361dc0564b8286eafbfcc5e57c1a1fd5fbbbcb3f8316f81c6b3723_JC.exe 97 PID 60 wrote to memory of 1884 60 6544731644361dc0564b8286eafbfcc5e57c1a1fd5fbbbcb3f8316f81c6b3723_JC.exe 97 PID 60 wrote to memory of 1884 60 6544731644361dc0564b8286eafbfcc5e57c1a1fd5fbbbcb3f8316f81c6b3723_JC.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\6544731644361dc0564b8286eafbfcc5e57c1a1fd5fbbbcb3f8316f81c6b3723_JC.exe"C:\Users\Admin\AppData\Local\Temp\6544731644361dc0564b8286eafbfcc5e57c1a1fd5fbbbcb3f8316f81c6b3723_JC.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release2⤵
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release3⤵
- Gathers network information
PID:960
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew2⤵
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew3⤵
- Gathers network information
PID:1800
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1884
-
Network
-
Remote address:8.8.8.8:53Request59.128.231.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request8.3.197.209.in-addr.arpaIN PTRResponse8.3.197.209.in-addr.arpaIN PTRvip0x008map2sslhwcdnnet
-
Remote address:8.8.8.8:53Request2.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request2.136.104.51.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request146.78.124.51.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request198.187.3.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request1.202.248.87.in-addr.arpaIN PTRResponse1.202.248.87.in-addr.arpaIN PTRhttps-87-248-202-1amsllnwnet
-
Remote address:8.8.8.8:53Request203.151.224.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request169.117.168.52.in-addr.arpaIN PTRResponse
-
71 B 157 B 1 1
DNS Request
59.128.231.4.in-addr.arpa
-
70 B 111 B 1 1
DNS Request
8.3.197.209.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
2.159.190.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
2.136.104.51.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
146.78.124.51.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
198.187.3.20.in-addr.arpa
-
71 B 116 B 1 1
DNS Request
1.202.248.87.in-addr.arpa
-
73 B 159 B 1 1
DNS Request
203.151.224.20.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
169.117.168.52.in-addr.arpa