Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
30/10/2023, 09:30
Static task
static1
Behavioral task
behavioral1
Sample
f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe
Resource
win10v2004-20231020-en
General
-
Target
f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe
-
Size
8.6MB
-
MD5
a378f5d7d56928ec15bb25107f443aea
-
SHA1
122b0c9ae0cf2df86dfb896aa3f3ad5c9e56f1e1
-
SHA256
f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6
-
SHA512
eac32641951ea569fd00351f0a6d37540bc80e52e614e8e521da534bdcdc59d7a925627f427cc1b4e2bd4ff584d79006fca4fe11964312ecd71a10aebaae9d19
-
SSDEEP
196608:h4jEtzK9D8QHi06mRmv385adFfkrnxsjhVN9R3zRWe/pkzILbCSrO:h4jN8QH/JRm856FkjKNjjMeRNjK
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2648 sg.tmp 2848 gacn.exe 3064 gacn.exe 1200 Process not Found -
Loads dropped DLL 11 IoCs
pid Process 2188 f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe 2188 f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe 2848 gacn.exe 3064 gacn.exe 3064 gacn.exe 3064 gacn.exe 3064 gacn.exe 3064 gacn.exe 3064 gacn.exe 3064 gacn.exe 1200 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3618187007-3650799920-3290345941-1000\Software\Microsoft\Windows\CurrentVersion\Run\gacn.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\~2595610233742511668\\gacn.exe\"" f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe -
Detects Pyinstaller 7 IoCs
resource yara_rule behavioral1/files/0x0007000000016adb-28.dat pyinstaller behavioral1/files/0x0007000000016adb-27.dat pyinstaller behavioral1/files/0x0007000000016adb-25.dat pyinstaller behavioral1/files/0x0007000000016adb-82.dat pyinstaller behavioral1/files/0x0007000000016adb-81.dat pyinstaller behavioral1/files/0x0007000000016adb-98.dat pyinstaller behavioral1/files/0x0007000000016adb-97.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2188 f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeBackupPrivilege 2188 f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe Token: SeRestorePrivilege 2188 f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe Token: 33 2188 f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe Token: SeIncBasePriorityPrivilege 2188 f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe Token: 33 2188 f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe Token: SeIncBasePriorityPrivilege 2188 f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe Token: 33 2188 f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe Token: SeIncBasePriorityPrivilege 2188 f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe Token: SeBackupPrivilege 2628 f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe Token: SeRestorePrivilege 2628 f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe Token: 33 2628 f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe Token: SeIncBasePriorityPrivilege 2628 f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe Token: 33 2188 f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe Token: SeIncBasePriorityPrivilege 2188 f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe Token: SeRestorePrivilege 2648 sg.tmp Token: 35 2648 sg.tmp Token: SeSecurityPrivilege 2648 sg.tmp Token: SeSecurityPrivilege 2648 sg.tmp Token: 33 2188 f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe Token: SeIncBasePriorityPrivilege 2188 f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe Token: SeDebugPrivilege 2188 f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2188 wrote to memory of 1192 2188 f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe 28 PID 2188 wrote to memory of 1192 2188 f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe 28 PID 2188 wrote to memory of 1192 2188 f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe 28 PID 2188 wrote to memory of 1192 2188 f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe 28 PID 2188 wrote to memory of 2628 2188 f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe 30 PID 2188 wrote to memory of 2628 2188 f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe 30 PID 2188 wrote to memory of 2628 2188 f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe 30 PID 2188 wrote to memory of 2628 2188 f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe 30 PID 2188 wrote to memory of 2648 2188 f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe 31 PID 2188 wrote to memory of 2648 2188 f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe 31 PID 2188 wrote to memory of 2648 2188 f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe 31 PID 2188 wrote to memory of 2648 2188 f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe 31 PID 2188 wrote to memory of 2848 2188 f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe 33 PID 2188 wrote to memory of 2848 2188 f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe 33 PID 2188 wrote to memory of 2848 2188 f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe 33 PID 2188 wrote to memory of 2848 2188 f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe 33 PID 2848 wrote to memory of 3064 2848 gacn.exe 34 PID 2848 wrote to memory of 3064 2848 gacn.exe 34 PID 2848 wrote to memory of 3064 2848 gacn.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe"C:\Users\Admin\AppData\Local\Temp\f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\system32\cmd.execmd.exe /c set2⤵PID:1192
-
-
C:\Users\Admin\AppData\Local\Temp\f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exePECMD**pecmd-cmd* PUTF -dd -skipb=1047552 -len=8002926 "C:\Users\Admin\AppData\Local\Temp\~3046160588133267903.tmp",,C:\Users\Admin\AppData\Local\Temp\f960082ab2dba2c8adeb510811f15132d780bc2980eb90f1917c6b32e1f4f6e6.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2628
-
-
C:\Users\Admin\AppData\Local\Temp\~3006496123174828635~\sg.tmp7zG_exe x "C:\Users\Admin\AppData\Local\Temp\~3046160588133267903.tmp" -y -aoa -o"C:\Users\Admin\AppData\Local\Temp\~2595610233742511668"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
C:\Users\Admin\AppData\Local\Temp\~2595610233742511668\gacn.exe"C:\Users\Admin\AppData\Local\Temp\~2595610233742511668\gacn.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\~2595610233742511668\gacn.exe"C:\Users\Admin\AppData\Local\Temp\~2595610233742511668\gacn.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3064
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD59d8413744097196f92327f632a85acee
SHA1dfc07f5e5a0634dd1f15fdc9ff9731748fbff919
SHA2566878d8168d5cc159efe58f14e5ba10310d99b53ab8495521e54c966994dac50b
SHA512a8f6e9ee1c5d65f68b8b20d406d3e666c186e15cb3b92575257b5637fe7dd5ac7d75e9ad51c839ba4490512f68f6b48822fc9edd316dd7625d3627d3b975fb2a
-
Filesize
18KB
MD5361c6bcfcea263749419b0fbed7a0ce8
SHA103db13108ce9d5fc01cecf3199619ffbccbd855a
SHA256b74aefd6fa638be3f415165c8109121a2093597421101abc312ee7ffa1130278
SHA512aa8b585000cc65f9841b938e4523d91d8f6db650e0b4bb11efd740c27309bf81cdb77f05d0beda2489bf26f4fbc6d02c93ce3b64946502e2c044eea89696cc76
-
Filesize
21KB
MD5b402ed77d6f31d825bda175dbc0c4f92
SHA11f2a4b8753b3aae225feac5487cc0011b73c0eb7
SHA2566ed17fb3ca5156b39fbc1ef7d1eefa95e739857607de4cd8d41cecfcd1350705
SHA512ec04013139f3fd9dbf22b92121d82b2eb97e136f8619790cde2d0b660280e838962f9006d3e4c3a359627b017f2b6ade7edff3bbc26e559c3de37540585602d9
-
Filesize
19KB
MD53d872be898581f00d0310d7ab9abaf2b
SHA1420e0ab98bb748723130de414f0ffed117ef3f7e
SHA2564de821884cbef4182b29d8c33cfe13e43e130ad58ee1281679e8d40a2edcb8ea
SHA51235cfb9888a5f4299403a0d9c57f0ba79e3625431a9acc5e04ae2ae101b3dc521a0dcff5d4a1bf508b25dbf05dd432f6987d860ff494d15538ed95673a8b7376b
-
Filesize
18KB
MD56c180c8de3ecf27de7a5812ff055737e
SHA13aad20b71bb374bb2c5f7431a1b75b60956a01fd
SHA256630466fd77ac7009c947a8370a0d0c20652169824c54ddcb8c05e8df45e23197
SHA512e4aa79eb2b6b3be9b545e8cb8b43cd6052036dc5cce7077be40441b9942931b30d76c475d550a178d4e94c9c366cabc852f500e482b7fdcd361fc2a08e41c00e
-
Filesize
6.6MB
MD55c5602cda7ab8418420f223366fff5db
SHA152f81ee0aef9b6906f7751fd2bbd4953e3f3b798
SHA256e7890e38256f04ee0b55ac5276bbf3ac61392c3a3ce150bb5497b709803e17ce
SHA51251c3b4f29781bb52c137ddb356e1bc5a37f3a25f0ed7d89416b14ed994121f884cb3e40ccdbb211a8989e3bd137b8df8b28e232f98de8f35b03965cfce4b424f
-
Filesize
1000KB
MD53c72fc810602812d8c03c8709519f115
SHA18956f79d95fe1eab1a06c4ad75588a49c2029994
SHA256da572f7c674178ba7b91f7d47643fed07f7e71dbb4aeb46e1671ce08d1b31d73
SHA512633f71aa2985e30870a3408dfb5b135b75c65ac89df24dc21b4f1057a6c8a489309ebdb263b3c46b054817dd81cde33ba47aa4677ee7f52237a5e0b821417901
-
Filesize
7.8MB
MD5ed8f2fce558eb997ed22acf6e96b4fdd
SHA11f9618777746aee117d214389d6cf2f51af96f3a
SHA256eed9691837dae0fe3f79b597fd12303d09d1a50eda03add22ad9c1e291ab9128
SHA5128a8284b9e67ee3d6045adc11e319304f4db78c3e410dc6808b5c6da186bb9c44a9da170b5e2f54cc773f5ce048429318caeacb824ba9da88ca3065a9b69bc1fa
-
Filesize
7.8MB
MD5ed8f2fce558eb997ed22acf6e96b4fdd
SHA11f9618777746aee117d214389d6cf2f51af96f3a
SHA256eed9691837dae0fe3f79b597fd12303d09d1a50eda03add22ad9c1e291ab9128
SHA5128a8284b9e67ee3d6045adc11e319304f4db78c3e410dc6808b5c6da186bb9c44a9da170b5e2f54cc773f5ce048429318caeacb824ba9da88ca3065a9b69bc1fa
-
Filesize
7.8MB
MD5ed8f2fce558eb997ed22acf6e96b4fdd
SHA11f9618777746aee117d214389d6cf2f51af96f3a
SHA256eed9691837dae0fe3f79b597fd12303d09d1a50eda03add22ad9c1e291ab9128
SHA5128a8284b9e67ee3d6045adc11e319304f4db78c3e410dc6808b5c6da186bb9c44a9da170b5e2f54cc773f5ce048429318caeacb824ba9da88ca3065a9b69bc1fa
-
Filesize
715KB
MD57c4718943bd3f66ebdb47ccca72c7b1e
SHA1f9edfaa7adb8fa528b2e61b2b251f18da10a6969
SHA2564cc32d00338fc7b206a7c052297acf9ac304ae7de9d61a2475a116959c1524fc
SHA512e18c40d646fa4948f90f7471da55489df431f255041ebb6dcef86346f91078c9b27894e27216a4b2fe2a1c5e501c7953c77893cf696930123d28a322d49e1516
-
Filesize
7.6MB
MD5d264507f4b1870e1199e9696254754e2
SHA158bbdf3be331c307ab6156e9bf079620d204715a
SHA25632c627cbd5dc4644f0f41e293cca1470c81cb929413b342c4da94dd64687d1b0
SHA5127a907d4a057ef312487c6cba99bcae89aee7345933dce498c66ebc936007941919cfce262f782be7abe9d76fecd0ee7898077ca754dbcc17bdf3c5776f1e8ce4
-
Filesize
7.6MB
MD5d264507f4b1870e1199e9696254754e2
SHA158bbdf3be331c307ab6156e9bf079620d204715a
SHA25632c627cbd5dc4644f0f41e293cca1470c81cb929413b342c4da94dd64687d1b0
SHA5127a907d4a057ef312487c6cba99bcae89aee7345933dce498c66ebc936007941919cfce262f782be7abe9d76fecd0ee7898077ca754dbcc17bdf3c5776f1e8ce4
-
Filesize
18KB
MD59d8413744097196f92327f632a85acee
SHA1dfc07f5e5a0634dd1f15fdc9ff9731748fbff919
SHA2566878d8168d5cc159efe58f14e5ba10310d99b53ab8495521e54c966994dac50b
SHA512a8f6e9ee1c5d65f68b8b20d406d3e666c186e15cb3b92575257b5637fe7dd5ac7d75e9ad51c839ba4490512f68f6b48822fc9edd316dd7625d3627d3b975fb2a
-
Filesize
18KB
MD5361c6bcfcea263749419b0fbed7a0ce8
SHA103db13108ce9d5fc01cecf3199619ffbccbd855a
SHA256b74aefd6fa638be3f415165c8109121a2093597421101abc312ee7ffa1130278
SHA512aa8b585000cc65f9841b938e4523d91d8f6db650e0b4bb11efd740c27309bf81cdb77f05d0beda2489bf26f4fbc6d02c93ce3b64946502e2c044eea89696cc76
-
Filesize
21KB
MD5b402ed77d6f31d825bda175dbc0c4f92
SHA11f2a4b8753b3aae225feac5487cc0011b73c0eb7
SHA2566ed17fb3ca5156b39fbc1ef7d1eefa95e739857607de4cd8d41cecfcd1350705
SHA512ec04013139f3fd9dbf22b92121d82b2eb97e136f8619790cde2d0b660280e838962f9006d3e4c3a359627b017f2b6ade7edff3bbc26e559c3de37540585602d9
-
Filesize
19KB
MD53d872be898581f00d0310d7ab9abaf2b
SHA1420e0ab98bb748723130de414f0ffed117ef3f7e
SHA2564de821884cbef4182b29d8c33cfe13e43e130ad58ee1281679e8d40a2edcb8ea
SHA51235cfb9888a5f4299403a0d9c57f0ba79e3625431a9acc5e04ae2ae101b3dc521a0dcff5d4a1bf508b25dbf05dd432f6987d860ff494d15538ed95673a8b7376b
-
Filesize
18KB
MD56c180c8de3ecf27de7a5812ff055737e
SHA13aad20b71bb374bb2c5f7431a1b75b60956a01fd
SHA256630466fd77ac7009c947a8370a0d0c20652169824c54ddcb8c05e8df45e23197
SHA512e4aa79eb2b6b3be9b545e8cb8b43cd6052036dc5cce7077be40441b9942931b30d76c475d550a178d4e94c9c366cabc852f500e482b7fdcd361fc2a08e41c00e
-
Filesize
6.6MB
MD55c5602cda7ab8418420f223366fff5db
SHA152f81ee0aef9b6906f7751fd2bbd4953e3f3b798
SHA256e7890e38256f04ee0b55ac5276bbf3ac61392c3a3ce150bb5497b709803e17ce
SHA51251c3b4f29781bb52c137ddb356e1bc5a37f3a25f0ed7d89416b14ed994121f884cb3e40ccdbb211a8989e3bd137b8df8b28e232f98de8f35b03965cfce4b424f
-
Filesize
1000KB
MD53c72fc810602812d8c03c8709519f115
SHA18956f79d95fe1eab1a06c4ad75588a49c2029994
SHA256da572f7c674178ba7b91f7d47643fed07f7e71dbb4aeb46e1671ce08d1b31d73
SHA512633f71aa2985e30870a3408dfb5b135b75c65ac89df24dc21b4f1057a6c8a489309ebdb263b3c46b054817dd81cde33ba47aa4677ee7f52237a5e0b821417901
-
Filesize
7.8MB
MD5ed8f2fce558eb997ed22acf6e96b4fdd
SHA11f9618777746aee117d214389d6cf2f51af96f3a
SHA256eed9691837dae0fe3f79b597fd12303d09d1a50eda03add22ad9c1e291ab9128
SHA5128a8284b9e67ee3d6045adc11e319304f4db78c3e410dc6808b5c6da186bb9c44a9da170b5e2f54cc773f5ce048429318caeacb824ba9da88ca3065a9b69bc1fa
-
Filesize
7.8MB
MD5ed8f2fce558eb997ed22acf6e96b4fdd
SHA11f9618777746aee117d214389d6cf2f51af96f3a
SHA256eed9691837dae0fe3f79b597fd12303d09d1a50eda03add22ad9c1e291ab9128
SHA5128a8284b9e67ee3d6045adc11e319304f4db78c3e410dc6808b5c6da186bb9c44a9da170b5e2f54cc773f5ce048429318caeacb824ba9da88ca3065a9b69bc1fa
-
Filesize
7.8MB
MD5ed8f2fce558eb997ed22acf6e96b4fdd
SHA11f9618777746aee117d214389d6cf2f51af96f3a
SHA256eed9691837dae0fe3f79b597fd12303d09d1a50eda03add22ad9c1e291ab9128
SHA5128a8284b9e67ee3d6045adc11e319304f4db78c3e410dc6808b5c6da186bb9c44a9da170b5e2f54cc773f5ce048429318caeacb824ba9da88ca3065a9b69bc1fa
-
Filesize
7.8MB
MD5ed8f2fce558eb997ed22acf6e96b4fdd
SHA11f9618777746aee117d214389d6cf2f51af96f3a
SHA256eed9691837dae0fe3f79b597fd12303d09d1a50eda03add22ad9c1e291ab9128
SHA5128a8284b9e67ee3d6045adc11e319304f4db78c3e410dc6808b5c6da186bb9c44a9da170b5e2f54cc773f5ce048429318caeacb824ba9da88ca3065a9b69bc1fa
-
Filesize
715KB
MD57c4718943bd3f66ebdb47ccca72c7b1e
SHA1f9edfaa7adb8fa528b2e61b2b251f18da10a6969
SHA2564cc32d00338fc7b206a7c052297acf9ac304ae7de9d61a2475a116959c1524fc
SHA512e18c40d646fa4948f90f7471da55489df431f255041ebb6dcef86346f91078c9b27894e27216a4b2fe2a1c5e501c7953c77893cf696930123d28a322d49e1516