Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
20/09/2023, 02:02
Static task
static1
Behavioral task
behavioral1
Sample
8f91270393aa3e39bd0e8acab2635d368aac68c73753f527bef97a382aec0964.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
8f91270393aa3e39bd0e8acab2635d368aac68c73753f527bef97a382aec0964.exe
Resource
win10v2004-20230915-en
General
-
Target
8f91270393aa3e39bd0e8acab2635d368aac68c73753f527bef97a382aec0964.exe
-
Size
10.8MB
-
MD5
d05802d515cdad20eeeef558dc2bff9f
-
SHA1
d302e703615ff56055485a995a7b90e128f9857f
-
SHA256
8f91270393aa3e39bd0e8acab2635d368aac68c73753f527bef97a382aec0964
-
SHA512
8b2ee7eb77ba6075586fc73c6681174df0a3fe3e2597b25a684367611aec8b2724c4aa3832c15b5c1cdae699e4447fb2928cd44e77747abefce88e6b4309b171
-
SSDEEP
196608:NY3OCtHmo04r5A3Xu/h2YKI660xhzDlo/auuaI4KbGqVPNu0bmrl:N3CtlrKO/PKID0DloCuuauyq1Nu0bmZ
Malware Config
Signatures
-
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\GoodZip\confinf.ini 8f91270393aa3e39bd0e8acab2635d368aac68c73753f527bef97a382aec0964.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2996 8f91270393aa3e39bd0e8acab2635d368aac68c73753f527bef97a382aec0964.exe 2996 8f91270393aa3e39bd0e8acab2635d368aac68c73753f527bef97a382aec0964.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 2996 8f91270393aa3e39bd0e8acab2635d368aac68c73753f527bef97a382aec0964.exe Token: 35 2996 8f91270393aa3e39bd0e8acab2635d368aac68c73753f527bef97a382aec0964.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2996 8f91270393aa3e39bd0e8acab2635d368aac68c73753f527bef97a382aec0964.exe 2996 8f91270393aa3e39bd0e8acab2635d368aac68c73753f527bef97a382aec0964.exe 2996 8f91270393aa3e39bd0e8acab2635d368aac68c73753f527bef97a382aec0964.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f91270393aa3e39bd0e8acab2635d368aac68c73753f527bef97a382aec0964.exe"C:\Users\Admin\AppData\Local\Temp\8f91270393aa3e39bd0e8acab2635d368aac68c73753f527bef97a382aec0964.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
639B
MD5a110fefd038d6b148e32661fb1139b51
SHA102296a9331eb9f101e18778dfe30981c374c2d5a
SHA2562740ac94ba858571df0ff230c630713c161164ebcb44c3a3fb08785d2d364550
SHA51245761e49ba7df2ca20864adfb6b56fb0db1aaeaa30e116f4abf24c2c7c1e4f56361566f0d7a7ed21f8a4baaf2d3fbb80b058b7046af92c65c1f290e628e164e8