Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
8s -
max time network
6s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 16:25
Static task
static1
Behavioral task
behavioral1
Sample
ee6bfd2f9b53ed923c3b10f3eeab3ed3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ee6bfd2f9b53ed923c3b10f3eeab3ed3.exe
Resource
win10v2004-20231215-en
General
-
Target
ee6bfd2f9b53ed923c3b10f3eeab3ed3.exe
-
Size
178KB
-
MD5
ee6bfd2f9b53ed923c3b10f3eeab3ed3
-
SHA1
22eab09935aba748fc208fcf7d533ad284895ddf
-
SHA256
6132fb32737a39524f33328f9317f329752a8dc10e705a8565b71fec755dc431
-
SHA512
aaed3c284202b58515dfcf71fa91e26fb2c66e033463660e9f0be9be94daede2352dac31cbc2ef76d7c38c1e6c6bfb316fe3649398d8dcea1d46be3942d9beef
-
SSDEEP
3072:3q6+ouCpk2mpcWJ0r+QNTBfmj8q6+ouCpk2mpcWJ0r+QNTBfmjW:3ldk1cWQRNTBej8ldk1cWQRNTBejW
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AVAADA = "C:\\Windows\\setup.bat" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\AVAADA = "C:\\Windows\\setup.bat" reg.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\setup.bat cmd.exe File opened for modification C:\Windows\setup.bat cmd.exe File opened for modification C:\Windows\win.ini cmd.exe File opened for modification C:\Windows\system.ini cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 2 IoCs
pid Process 2692 taskkill.exe 2644 taskkill.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 2712 reg.exe 2816 reg.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2692 taskkill.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2056 2488 ee6bfd2f9b53ed923c3b10f3eeab3ed3.exe 28 PID 2488 wrote to memory of 2056 2488 ee6bfd2f9b53ed923c3b10f3eeab3ed3.exe 28 PID 2488 wrote to memory of 2056 2488 ee6bfd2f9b53ed923c3b10f3eeab3ed3.exe 28 PID 2488 wrote to memory of 2056 2488 ee6bfd2f9b53ed923c3b10f3eeab3ed3.exe 28 PID 2056 wrote to memory of 2712 2056 cmd.exe 30 PID 2056 wrote to memory of 2712 2056 cmd.exe 30 PID 2056 wrote to memory of 2712 2056 cmd.exe 30 PID 2056 wrote to memory of 2816 2056 cmd.exe 31 PID 2056 wrote to memory of 2816 2056 cmd.exe 31 PID 2056 wrote to memory of 2816 2056 cmd.exe 31 PID 2056 wrote to memory of 2724 2056 cmd.exe 32 PID 2056 wrote to memory of 2724 2056 cmd.exe 32 PID 2056 wrote to memory of 2724 2056 cmd.exe 32 PID 2056 wrote to memory of 2692 2056 cmd.exe 33 PID 2056 wrote to memory of 2692 2056 cmd.exe 33 PID 2056 wrote to memory of 2692 2056 cmd.exe 33 PID 2056 wrote to memory of 3008 2056 cmd.exe 35 PID 2056 wrote to memory of 3008 2056 cmd.exe 35 PID 2056 wrote to memory of 3008 2056 cmd.exe 35 PID 3008 wrote to memory of 2980 3008 net.exe 36 PID 3008 wrote to memory of 2980 3008 net.exe 36 PID 3008 wrote to memory of 2980 3008 net.exe 36 PID 2056 wrote to memory of 2740 2056 cmd.exe 37 PID 2056 wrote to memory of 2740 2056 cmd.exe 37 PID 2056 wrote to memory of 2740 2056 cmd.exe 37 PID 2740 wrote to memory of 2732 2740 net.exe 38 PID 2740 wrote to memory of 2732 2740 net.exe 38 PID 2740 wrote to memory of 2732 2740 net.exe 38 PID 2056 wrote to memory of 2568 2056 cmd.exe 39 PID 2056 wrote to memory of 2568 2056 cmd.exe 39 PID 2056 wrote to memory of 2568 2056 cmd.exe 39 PID 2568 wrote to memory of 2564 2568 net.exe 40 PID 2568 wrote to memory of 2564 2568 net.exe 40 PID 2568 wrote to memory of 2564 2568 net.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee6bfd2f9b53ed923c3b10f3eeab3ed3.exe"C:\Users\Admin\AppData\Local\Temp\ee6bfd2f9b53ed923c3b10f3eeab3ed3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\4BA0.tmp\4BA1.tmp\4BA2.bat C:\Users\Admin\AppData\Local\Temp\ee6bfd2f9b53ed923c3b10f3eeab3ed3.exe"2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\system32\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v AVAADA /t REG_SZ /d C:\Windows\setup.bat /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:2712
-
-
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v AVAADA /t REG_SZ /d C:\Windows\setup.bat /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:2816
-
-
C:\Windows\system32\mode.commode 8003⤵PID:2724
-
-
C:\Windows\system32\taskkill.exetaskkill /IM explorer.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
C:\Windows\system32\net.exenet user Admin /delete3⤵
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin /delete4⤵PID:2980
-
-
-
C:\Windows\system32\net.exenet user Admin /del3⤵
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user Admin /del4⤵PID:2732
-
-
-
C:\Windows\system32\net.exenet stop "Themes"3⤵
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "Themes"4⤵PID:2564
-
-
-
C:\Windows\system32\taskkill.exetaskkill /IM wininit.exe /F3⤵
- Kills process with taskkill
PID:2644
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD52442a13b59684193d389f0cc947f44fa
SHA1e9e39f1f080b827ef8df139501d3679332c4e2e5
SHA2567d8cc630d28bef8c0ca5c34799e975159551f507c62db0d0cf09288960a4a6dc
SHA512ae8f69330155a02ff9cd9f365322c7cf14bac8df288127f284ae1061e4adff5af2b35327596959ef7fb5e3191bfc4258629ef5fa9ff9ca5241bc45c785c1f789
-
Filesize
178KB
MD5ee6bfd2f9b53ed923c3b10f3eeab3ed3
SHA122eab09935aba748fc208fcf7d533ad284895ddf
SHA2566132fb32737a39524f33328f9317f329752a8dc10e705a8565b71fec755dc431
SHA512aaed3c284202b58515dfcf71fa91e26fb2c66e033463660e9f0be9be94daede2352dac31cbc2ef76d7c38c1e6c6bfb316fe3649398d8dcea1d46be3942d9beef