Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 22:41
Static task
static1
Behavioral task
behavioral1
Sample
4104e42bdd7716c6cf31d5d6cb6f0f55.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4104e42bdd7716c6cf31d5d6cb6f0f55.exe
Resource
win10v2004-20231215-en
General
-
Target
4104e42bdd7716c6cf31d5d6cb6f0f55.exe
-
Size
181KB
-
MD5
4104e42bdd7716c6cf31d5d6cb6f0f55
-
SHA1
1c48609bd7db7a3dffd0d13480a03d9972fc8c0e
-
SHA256
7df9c5d9955726337683c225491ed38609b89516a58ec1f20058ce955f715207
-
SHA512
8df6069f3372b4512bf5e3d751e0cfa823f1acddc1a9d245ce1844dcd489fd13979f5804606da6bb359116adbcddb4a3c56493545f694fcde88bc0112f16260b
-
SSDEEP
3072:cg+lAuXo30X3FcTl5C4oQbWoDayYDH6EkGh7P5xejAp0i7sB7/bw/lYuUysQ0+Yl:UlAU4omWoDayY1Xh7hrp0MywNYu05H0g
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 4 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: 4104e42bdd7716c6cf31d5d6cb6f0f55.exe File opened (read-only) \??\I: 4104e42bdd7716c6cf31d5d6cb6f0f55.exe File opened (read-only) \??\E: 4104e42bdd7716c6cf31d5d6cb6f0f55.exe File opened (read-only) \??\G: 4104e42bdd7716c6cf31d5d6cb6f0f55.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\Internet Explorer\iexplore.exe 4104e42bdd7716c6cf31d5d6cb6f0f55.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: SeShutdownPrivilege 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeIncreaseQuotaPrivilege 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeTakeOwnershipPrivilege 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeRestorePrivilege 3068 msiexec.exe Token: SeTakeOwnershipPrivilege 3068 msiexec.exe Token: SeSecurityPrivilege 3068 msiexec.exe Token: SeCreateTokenPrivilege 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeAssignPrimaryTokenPrivilege 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeLockMemoryPrivilege 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeIncreaseQuotaPrivilege 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeMachineAccountPrivilege 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeTcbPrivilege 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeSecurityPrivilege 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeTakeOwnershipPrivilege 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeLoadDriverPrivilege 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeSystemProfilePrivilege 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeSystemtimePrivilege 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeProfSingleProcessPrivilege 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeIncBasePriorityPrivilege 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeCreatePagefilePrivilege 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeCreatePermanentPrivilege 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeBackupPrivilege 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeRestorePrivilege 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeShutdownPrivilege 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeDebugPrivilege 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeAuditPrivilege 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeSystemEnvironmentPrivilege 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeChangeNotifyPrivilege 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeRemoteShutdownPrivilege 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeUndockPrivilege 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeSyncAgentPrivilege 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeEnableDelegationPrivilege 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeManageVolumePrivilege 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeImpersonatePrivilege 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe Token: SeCreateGlobalPrivilege 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2792 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe 29 PID 2000 wrote to memory of 2792 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe 29 PID 2000 wrote to memory of 2792 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe 29 PID 2000 wrote to memory of 2792 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe 29 PID 2000 wrote to memory of 2792 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe 29 PID 2000 wrote to memory of 2792 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe 29 PID 2000 wrote to memory of 2792 2000 4104e42bdd7716c6cf31d5d6cb6f0f55.exe 29 PID 2792 wrote to memory of 2640 2792 mstsc.exe 30 PID 2792 wrote to memory of 2640 2792 mstsc.exe 30 PID 2792 wrote to memory of 2640 2792 mstsc.exe 30 PID 2792 wrote to memory of 2640 2792 mstsc.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4104e42bdd7716c6cf31d5d6cb6f0f55.exe"C:\Users\Admin\AppData\Local\Temp\4104e42bdd7716c6cf31d5d6cb6f0f55.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\mstsc.exemstsc.exe /migrate2⤵
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\system32\mstsc.exemstsc.exe /migrate3⤵PID:2640
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3068