Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2023, 10:41

General

  • Target

    packy.exe

  • Size

    20KB

  • MD5

    f8bfaf0d65a295ca33ebf4be63457588

  • SHA1

    d8bba0a431c18a52d0745a8d5f17e92d8768cf0a

  • SHA256

    4786322b7f2ec05b480bd0f11b3380bdc2ff171147dc3dcf004ae1dc18816e15

  • SHA512

    9ae269c19ef19547bbf4ef4184ed1e628b12c72c0607fc69903973c028cdea49b27b3254d7b7226e7c36281fcf9cb5fe6c94bcab3ff6c3e6841bc40d30ef7a00

  • SSDEEP

    384:c/zWJQbBAJ/GZzUUj132wCSCTqWXJIm0RZyBOS2zUAONplmXLGqIxnCWD:kWWg/GVZWVTqs8cOS2dglKLGq8n

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 32 IoCs
  • Modifies data under HKEY_USERS 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\packy.exe
    "C:\Users\Admin\AppData\Local\Temp\packy.exe"
    1⤵
      PID:2268
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x0
      1⤵
        PID:2448
      • C:\Windows\system32\csrss.exe
        %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
        1⤵
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:2768
      • C:\Windows\system32\winlogon.exe
        winlogon.exe
        1⤵
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:2976
        • C:\Windows\system32\LogonUI.exe
          "LogonUI.exe" /flags:0x0
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1936

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1936-9-0x0000000002760000-0x0000000002761000-memory.dmp

        Filesize

        4KB

      • memory/1936-10-0x0000000002760000-0x0000000002761000-memory.dmp

        Filesize

        4KB

      • memory/2268-0-0x0000000000400000-0x0000000000406000-memory.dmp

        Filesize

        24KB

      • memory/2268-1-0x000007FFFFFA0000-0x000007FFFFFA9000-memory.dmp

        Filesize

        36KB

      • memory/2268-7-0x0000000000400000-0x0000000000406000-memory.dmp

        Filesize

        24KB

      • memory/2448-8-0x00000000029C0000-0x00000000029C1000-memory.dmp

        Filesize

        4KB