Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19/12/2023, 11:13
Static task
static1
Behavioral task
behavioral1
Sample
114bbb5486f91734cf3da12673762b11.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
114bbb5486f91734cf3da12673762b11.exe
Resource
win10v2004-20231215-en
General
-
Target
114bbb5486f91734cf3da12673762b11.exe
-
Size
24KB
-
MD5
114bbb5486f91734cf3da12673762b11
-
SHA1
fc14739d432f478760d4f2ee647d9c2e5a0194ad
-
SHA256
d4cbd9fe722eae46ec8ebc56988b0f521a8317a409b7385fba4592a2e3bee5d2
-
SHA512
2cf9f6b3015902dc320e6433537e33fee35d356eb9df8a14015f697c22e6e238b664f53513cdf969b8d7e14a8c9bd6352523dcc1612b21b739c334a794183365
-
SSDEEP
384:E3eVES+/xwGkRKJg+MlM61qmTTMVF9/q5R0:bGS+ZfbJg+MO8qYoAO
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" 114bbb5486f91734cf3da12673762b11.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe 114bbb5486f91734cf3da12673762b11.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 3008 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2180 ipconfig.exe 2656 NETSTAT.EXE -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3008 tasklist.exe Token: SeDebugPrivilege 2656 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2820 114bbb5486f91734cf3da12673762b11.exe 2820 114bbb5486f91734cf3da12673762b11.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2316 2820 114bbb5486f91734cf3da12673762b11.exe 28 PID 2820 wrote to memory of 2316 2820 114bbb5486f91734cf3da12673762b11.exe 28 PID 2820 wrote to memory of 2316 2820 114bbb5486f91734cf3da12673762b11.exe 28 PID 2820 wrote to memory of 2316 2820 114bbb5486f91734cf3da12673762b11.exe 28 PID 2316 wrote to memory of 2176 2316 cmd.exe 30 PID 2316 wrote to memory of 2176 2316 cmd.exe 30 PID 2316 wrote to memory of 2176 2316 cmd.exe 30 PID 2316 wrote to memory of 2176 2316 cmd.exe 30 PID 2316 wrote to memory of 2180 2316 cmd.exe 31 PID 2316 wrote to memory of 2180 2316 cmd.exe 31 PID 2316 wrote to memory of 2180 2316 cmd.exe 31 PID 2316 wrote to memory of 2180 2316 cmd.exe 31 PID 2316 wrote to memory of 3008 2316 cmd.exe 32 PID 2316 wrote to memory of 3008 2316 cmd.exe 32 PID 2316 wrote to memory of 3008 2316 cmd.exe 32 PID 2316 wrote to memory of 3008 2316 cmd.exe 32 PID 2316 wrote to memory of 2588 2316 cmd.exe 34 PID 2316 wrote to memory of 2588 2316 cmd.exe 34 PID 2316 wrote to memory of 2588 2316 cmd.exe 34 PID 2316 wrote to memory of 2588 2316 cmd.exe 34 PID 2588 wrote to memory of 2592 2588 net.exe 35 PID 2588 wrote to memory of 2592 2588 net.exe 35 PID 2588 wrote to memory of 2592 2588 net.exe 35 PID 2588 wrote to memory of 2592 2588 net.exe 35 PID 2316 wrote to memory of 2656 2316 cmd.exe 36 PID 2316 wrote to memory of 2656 2316 cmd.exe 36 PID 2316 wrote to memory of 2656 2316 cmd.exe 36 PID 2316 wrote to memory of 2656 2316 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\114bbb5486f91734cf3da12673762b11.exe"C:\Users\Admin\AppData\Local\Temp\114bbb5486f91734cf3da12673762b11.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\cmd.execmd /c set3⤵PID:2176
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:2180
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3008
-
-
C:\Windows\SysWOW64\net.exenet start3⤵
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start4⤵PID:2592
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD565611ce45705d8fc510fd9a34b1ded81
SHA1b3a9cefaee6cb968eee6892681b7baa4089d32e2
SHA256775136e50758775eaa70c262793b48f8aba1fb42a2c466cae8b65d7bb1ca43aa
SHA512a38b6f991f2f415ce25540a90b115a238efed1b5a8cf0649af4ccbad1a5119bcc20bc47fddc303277591583df1669beacc865dc6ec3d84779655f8e02e1d16f0