Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 16:10
Static task
static1
Behavioral task
behavioral1
Sample
ea4e5df4f3581fb57c8c89f8eb2ab1fb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ea4e5df4f3581fb57c8c89f8eb2ab1fb.exe
Resource
win10v2004-20231215-en
General
-
Target
ea4e5df4f3581fb57c8c89f8eb2ab1fb.exe
-
Size
24KB
-
MD5
ea4e5df4f3581fb57c8c89f8eb2ab1fb
-
SHA1
ca81d40e97dfe23437d0e2d701eed90adf12f85a
-
SHA256
8e693a263d61a44a9ef68b7c082ed22453c9671919a75fc7b90be4ae67c07d76
-
SHA512
7161a7796cd698fec123d2b5ad2a6080cbe815b66ab7d855e69a8706321343fed5a70fe409353bd0ff600459f4c8db938aab2019263784a4a846b9dc7ba46745
-
SSDEEP
384:E3eVES+/xwGkRKJJIlM61qmTTMVF9/q5q0:bGS+ZfbJqO8qYoAb
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" ea4e5df4f3581fb57c8c89f8eb2ab1fb.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe ea4e5df4f3581fb57c8c89f8eb2ab1fb.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2096 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 116 ipconfig.exe 4808 NETSTAT.EXE -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2096 tasklist.exe Token: SeDebugPrivilege 4808 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3692 ea4e5df4f3581fb57c8c89f8eb2ab1fb.exe 3692 ea4e5df4f3581fb57c8c89f8eb2ab1fb.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3692 wrote to memory of 3232 3692 ea4e5df4f3581fb57c8c89f8eb2ab1fb.exe 34 PID 3692 wrote to memory of 3232 3692 ea4e5df4f3581fb57c8c89f8eb2ab1fb.exe 34 PID 3692 wrote to memory of 3232 3692 ea4e5df4f3581fb57c8c89f8eb2ab1fb.exe 34 PID 3232 wrote to memory of 4440 3232 cmd.exe 24 PID 3232 wrote to memory of 4440 3232 cmd.exe 24 PID 3232 wrote to memory of 4440 3232 cmd.exe 24 PID 3232 wrote to memory of 116 3232 cmd.exe 25 PID 3232 wrote to memory of 116 3232 cmd.exe 25 PID 3232 wrote to memory of 116 3232 cmd.exe 25 PID 3232 wrote to memory of 2096 3232 cmd.exe 26 PID 3232 wrote to memory of 2096 3232 cmd.exe 26 PID 3232 wrote to memory of 2096 3232 cmd.exe 26 PID 3232 wrote to memory of 3368 3232 cmd.exe 32 PID 3232 wrote to memory of 3368 3232 cmd.exe 32 PID 3232 wrote to memory of 3368 3232 cmd.exe 32 PID 3368 wrote to memory of 1180 3368 net.exe 31 PID 3368 wrote to memory of 1180 3368 net.exe 31 PID 3368 wrote to memory of 1180 3368 net.exe 31 PID 3232 wrote to memory of 4808 3232 cmd.exe 30 PID 3232 wrote to memory of 4808 3232 cmd.exe 30 PID 3232 wrote to memory of 4808 3232 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea4e5df4f3581fb57c8c89f8eb2ab1fb.exe"C:\Users\Admin\AppData\Local\Temp\ea4e5df4f3581fb57c8c89f8eb2ab1fb.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:3232
-
-
C:\Windows\SysWOW64\cmd.execmd /c set1⤵PID:4440
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all1⤵
- Gathers network information
PID:116
-
C:\Windows\SysWOW64\tasklist.exetasklist1⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2096
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an1⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:4808
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start1⤵PID:1180
-
C:\Windows\SysWOW64\net.exenet start1⤵
- Suspicious use of WriteProcessMemory
PID:3368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD557f608f7d20e13fe284ded3f51d8e6af
SHA1f63b46ef553bd581fd5702b8b9675ea776272a1b
SHA256f8397bdf283e413513993915b172e748433a8ee18a8b1df1a38d3a7f09585434
SHA512bc178d473746017821035f06d44c2841afb92668c1fddcbf8129cd100d00cc8122a30d8ed91cc5bf5ceb79b107722c18e5f609a2a302edbc58e24f2dca4483a1