Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2023, 11:13
Static task
static1
Behavioral task
behavioral1
Sample
114bbb5486f91734cf3da12673762b11.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
114bbb5486f91734cf3da12673762b11.exe
Resource
win10v2004-20231215-en
General
-
Target
114bbb5486f91734cf3da12673762b11.exe
-
Size
24KB
-
MD5
114bbb5486f91734cf3da12673762b11
-
SHA1
fc14739d432f478760d4f2ee647d9c2e5a0194ad
-
SHA256
d4cbd9fe722eae46ec8ebc56988b0f521a8317a409b7385fba4592a2e3bee5d2
-
SHA512
2cf9f6b3015902dc320e6433537e33fee35d356eb9df8a14015f697c22e6e238b664f53513cdf969b8d7e14a8c9bd6352523dcc1612b21b739c334a794183365
-
SSDEEP
384:E3eVES+/xwGkRKJg+MlM61qmTTMVF9/q5R0:bGS+ZfbJg+MO8qYoAO
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" 114bbb5486f91734cf3da12673762b11.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe 114bbb5486f91734cf3da12673762b11.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4172 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2424 ipconfig.exe 1588 NETSTAT.EXE -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4172 tasklist.exe Token: SeDebugPrivilege 1588 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2908 114bbb5486f91734cf3da12673762b11.exe 2908 114bbb5486f91734cf3da12673762b11.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2908 wrote to memory of 3964 2908 114bbb5486f91734cf3da12673762b11.exe 90 PID 2908 wrote to memory of 3964 2908 114bbb5486f91734cf3da12673762b11.exe 90 PID 2908 wrote to memory of 3964 2908 114bbb5486f91734cf3da12673762b11.exe 90 PID 3964 wrote to memory of 488 3964 cmd.exe 92 PID 3964 wrote to memory of 488 3964 cmd.exe 92 PID 3964 wrote to memory of 488 3964 cmd.exe 92 PID 3964 wrote to memory of 2424 3964 cmd.exe 93 PID 3964 wrote to memory of 2424 3964 cmd.exe 93 PID 3964 wrote to memory of 2424 3964 cmd.exe 93 PID 3964 wrote to memory of 4172 3964 cmd.exe 95 PID 3964 wrote to memory of 4172 3964 cmd.exe 95 PID 3964 wrote to memory of 4172 3964 cmd.exe 95 PID 3964 wrote to memory of 2440 3964 cmd.exe 98 PID 3964 wrote to memory of 2440 3964 cmd.exe 98 PID 3964 wrote to memory of 2440 3964 cmd.exe 98 PID 2440 wrote to memory of 2932 2440 net.exe 99 PID 2440 wrote to memory of 2932 2440 net.exe 99 PID 2440 wrote to memory of 2932 2440 net.exe 99 PID 3964 wrote to memory of 1588 3964 cmd.exe 100 PID 3964 wrote to memory of 1588 3964 cmd.exe 100 PID 3964 wrote to memory of 1588 3964 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\114bbb5486f91734cf3da12673762b11.exe"C:\Users\Admin\AppData\Local\Temp\114bbb5486f91734cf3da12673762b11.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\SysWOW64\cmd.execmd /c set3⤵PID:488
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:2424
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4172
-
-
C:\Windows\SysWOW64\net.exenet start3⤵
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start4⤵PID:2932
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD55d054ac517e4c9bd3673b52b7785d1f0
SHA1961dfeea5a788728f8b6d0a8a8742f7d5b3c9934
SHA256f696252224165340cb862596d4a488be142643cbbd20b6da467e0ed0fc55f9c1
SHA512c8d70b1935e0f10d3875d14dfabdcea7b225202f7c09730dcecae3ec5cf5e00f18c60420bffea5ddab4f00c3dc315c0e3c9395c22a6d9748badfd332eb13a56a