Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 05:46
Static task
static1
Behavioral task
behavioral1
Sample
09222dcab9167f4a748c4d3e457aa31c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
09222dcab9167f4a748c4d3e457aa31c.exe
Resource
win10v2004-20231215-en
General
-
Target
09222dcab9167f4a748c4d3e457aa31c.exe
-
Size
32KB
-
MD5
09222dcab9167f4a748c4d3e457aa31c
-
SHA1
bcac93f663dae855af7305bf3528d8fcbd513fa8
-
SHA256
caadc15e19e5784d06d6b488a5b2a98e2f4832d1c4381a73d1b28c0072175b18
-
SHA512
8335485dafe5176dcea1aeb531716d992d7a330402efdaac7b34a9c3102a5dfdaa99a287d38380ffbe1393f0207acb91bc653190ffc5d28301c956f7cc847533
-
SSDEEP
768:sccccccccccccccccccccccKcccccccccccccccccccccc0ccccccccccccccccD:sccccccccccccccccccccccKcccccccD
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1996 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1420 09222dcab9167f4a748c4d3e457aa31c.exe 1420 09222dcab9167f4a748c4d3e457aa31c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1420 09222dcab9167f4a748c4d3e457aa31c.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1420 09222dcab9167f4a748c4d3e457aa31c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1420 wrote to memory of 1996 1420 09222dcab9167f4a748c4d3e457aa31c.exe 28 PID 1420 wrote to memory of 1996 1420 09222dcab9167f4a748c4d3e457aa31c.exe 28 PID 1420 wrote to memory of 1996 1420 09222dcab9167f4a748c4d3e457aa31c.exe 28 PID 1420 wrote to memory of 1996 1420 09222dcab9167f4a748c4d3e457aa31c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\09222dcab9167f4a748c4d3e457aa31c.exe"C:\Users\Admin\AppData\Local\Temp\09222dcab9167f4a748c4d3e457aa31c.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\09222D~1.EXE > nul2⤵
- Deletes itself
PID:1996
-