Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
17/09/2023, 18:39
Static task
static1
Behavioral task
behavioral1
Sample
eea8b7e5470d11a430902b53c2455233_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
eea8b7e5470d11a430902b53c2455233_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
eea8b7e5470d11a430902b53c2455233_JC.exe
-
Size
124KB
-
MD5
eea8b7e5470d11a430902b53c2455233
-
SHA1
811f45b430deee05b8861478c5153327f45048f2
-
SHA256
d621f8c50bacc88c62443e17b28264ef40afceb2fc4f82d284ca32643f52a965
-
SHA512
3fe7d7edff438a4fdbd9b0c360cc4defb2f6e955bbdf04c896ee0c6e02e66c2d91d15fe199ae79537341c2ce2a6729a1709639edd014bc1021688870cd50d688
-
SSDEEP
3072:qq8f/oic1i9uTAlPQSDwEyWefHEvGdxETCpPJZ:h8f/U1iF/sUGdxETI
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2112 eea8b7e5470d11a430902b53c2455233_JC.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2112 wrote to memory of 3044 2112 eea8b7e5470d11a430902b53c2455233_JC.exe 28 PID 2112 wrote to memory of 3044 2112 eea8b7e5470d11a430902b53c2455233_JC.exe 28 PID 2112 wrote to memory of 3044 2112 eea8b7e5470d11a430902b53c2455233_JC.exe 28 PID 2112 wrote to memory of 3044 2112 eea8b7e5470d11a430902b53c2455233_JC.exe 28 PID 3044 wrote to memory of 2744 3044 cmd.exe 30 PID 3044 wrote to memory of 2744 3044 cmd.exe 30 PID 3044 wrote to memory of 2744 3044 cmd.exe 30 PID 3044 wrote to memory of 2744 3044 cmd.exe 30 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2744 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eea8b7e5470d11a430902b53c2455233_JC.exe"C:\Users\Admin\AppData\Local\Temp\eea8b7e5470d11a430902b53c2455233_JC.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\mkn47A4.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\eea8b7e5470d11a430902b53c2455233_JC.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\eea8b7e5470d11a430902b53c2455233_JC.exe"3⤵
- Views/modifies file attributes
PID:2744
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53B
MD5cd14315ab212f7a1cd99b1e77187acf4
SHA1c8c807380f64fe0355d2cafc800e2460bba41297
SHA2567d06a327ab132b2a12b7cd992c70beb8006373116134a2a0b010465f9f742556
SHA5123d670da05d344b35847e3a2adfcb64f95a0dfe9ff0d802b917903b107d179fcdaa09f3855100f85ef56d4acdac36bd39f5e87d86c095e8cd67f063e3408aa883
-
Filesize
53B
MD5cd14315ab212f7a1cd99b1e77187acf4
SHA1c8c807380f64fe0355d2cafc800e2460bba41297
SHA2567d06a327ab132b2a12b7cd992c70beb8006373116134a2a0b010465f9f742556
SHA5123d670da05d344b35847e3a2adfcb64f95a0dfe9ff0d802b917903b107d179fcdaa09f3855100f85ef56d4acdac36bd39f5e87d86c095e8cd67f063e3408aa883