Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
10s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 05:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
071ade1e08c0196111788d86189e6033.exe
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
071ade1e08c0196111788d86189e6033.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
071ade1e08c0196111788d86189e6033.exe
-
Size
71KB
-
MD5
071ade1e08c0196111788d86189e6033
-
SHA1
f1d0aafcc0f4c35c4e211b1fa8b5d7817fe2b49d
-
SHA256
cb715cd52fe966a6ceeeee923ff4fe0eb31d292de545a185230a05216fa6c8bc
-
SHA512
0f9f033abb84b9229cefe1b7b23068612cd8a7f4f1f3de54d6862ebd79ec639ef6da5a426bfa20e4044dcf26234ed09b7a4e7360b6594eb66e3e330ff9891e9a
-
SSDEEP
1536:6zgvOyds3m+ne4a+7RpBRPi+aYa0MYQTaa2d1ln3:6zgvONe4B7RpBRPi+akrAaa2Nn3
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\sdra64.exe," 071ade1e08c0196111788d86189e6033.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\sdra64.exe 071ade1e08c0196111788d86189e6033.exe File created C:\Windows\SysWOW64\sdra64.exe 071ade1e08c0196111788d86189e6033.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1240 071ade1e08c0196111788d86189e6033.exe 1240 071ade1e08c0196111788d86189e6033.exe 1240 071ade1e08c0196111788d86189e6033.exe 1240 071ade1e08c0196111788d86189e6033.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1240 071ade1e08c0196111788d86189e6033.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1240 071ade1e08c0196111788d86189e6033.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86 PID 1240 wrote to memory of 620 1240 071ade1e08c0196111788d86189e6033.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\071ade1e08c0196111788d86189e6033.exe"C:\Users\Admin\AppData\Local\Temp\071ade1e08c0196111788d86189e6033.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1240
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:620