Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 05:38
Static task
static1
Behavioral task
behavioral1
Sample
7235c4081521daefb3ba386399112b4f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7235c4081521daefb3ba386399112b4f.exe
Resource
win10v2004-20231215-en
General
-
Target
7235c4081521daefb3ba386399112b4f.exe
-
Size
24KB
-
MD5
7235c4081521daefb3ba386399112b4f
-
SHA1
e3b014742ef42ac55c664210296d9a404a9bfeb7
-
SHA256
555154ac5847cff157f13cdcdc952d378c7c914e05d1cf5aff406e9c4aac8f5f
-
SHA512
d1f0e454d081cbe3b0abbbdf78bf3e5f5430295bb2e7f138c2edab362c2dc43cc521a61dc0e935d36d6b9f1e8a6a8a8f8fce50f4c10d993478b7e8faa6e00d82
-
SSDEEP
384:E3eVES+/xwGkRKJilM61qmTTMVF9/q5W0:bGS+ZfbJiO8qYoAf
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" 7235c4081521daefb3ba386399112b4f.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe 7235c4081521daefb3ba386399112b4f.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2300 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 5100 ipconfig.exe 2912 NETSTAT.EXE -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2300 tasklist.exe Token: SeDebugPrivilege 2912 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3744 7235c4081521daefb3ba386399112b4f.exe 3744 7235c4081521daefb3ba386399112b4f.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3744 wrote to memory of 3108 3744 7235c4081521daefb3ba386399112b4f.exe 89 PID 3744 wrote to memory of 3108 3744 7235c4081521daefb3ba386399112b4f.exe 89 PID 3744 wrote to memory of 3108 3744 7235c4081521daefb3ba386399112b4f.exe 89 PID 3108 wrote to memory of 1480 3108 cmd.exe 91 PID 3108 wrote to memory of 1480 3108 cmd.exe 91 PID 3108 wrote to memory of 1480 3108 cmd.exe 91 PID 3108 wrote to memory of 5100 3108 cmd.exe 92 PID 3108 wrote to memory of 5100 3108 cmd.exe 92 PID 3108 wrote to memory of 5100 3108 cmd.exe 92 PID 3108 wrote to memory of 2300 3108 cmd.exe 94 PID 3108 wrote to memory of 2300 3108 cmd.exe 94 PID 3108 wrote to memory of 2300 3108 cmd.exe 94 PID 3108 wrote to memory of 4588 3108 cmd.exe 96 PID 3108 wrote to memory of 4588 3108 cmd.exe 96 PID 3108 wrote to memory of 4588 3108 cmd.exe 96 PID 4588 wrote to memory of 4596 4588 net.exe 97 PID 4588 wrote to memory of 4596 4588 net.exe 97 PID 4588 wrote to memory of 4596 4588 net.exe 97 PID 3108 wrote to memory of 2912 3108 cmd.exe 98 PID 3108 wrote to memory of 2912 3108 cmd.exe 98 PID 3108 wrote to memory of 2912 3108 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\7235c4081521daefb3ba386399112b4f.exe"C:\Users\Admin\AppData\Local\Temp\7235c4081521daefb3ba386399112b4f.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\SysWOW64\cmd.execmd /c set3⤵PID:1480
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:5100
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
C:\Windows\SysWOW64\net.exenet start3⤵
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start4⤵PID:4596
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD57248bfb03d55f8884c8ef11171fc1211
SHA1b60f029b8b6e94870152a53578d071546385ed11
SHA2567f810262564213f17df72728e89cb68f052447cbbcba832cbadbd7d2cd345301
SHA5124da2bab3e1d704da583d26121834ef4cb0c03042968fb03a3f4bc0c8a5ed2603ed5ce7443dcdb6782897d83cfa2f3a0dcffa23a6e563661a685e08be8b173816