Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 08:21
Static task
static1
Behavioral task
behavioral1
Sample
11a34f12daedb81a905b2a2fc0445987.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
11a34f12daedb81a905b2a2fc0445987.exe
Resource
win10v2004-20231215-en
General
-
Target
11a34f12daedb81a905b2a2fc0445987.exe
-
Size
637KB
-
MD5
11a34f12daedb81a905b2a2fc0445987
-
SHA1
d38a5252f81655f66a8fe82c8bcf6727b64d76cb
-
SHA256
119fd0abea80795ab2a84e7a81a9a5332b0200d28e2cbf7f31c1235b3f8a0067
-
SHA512
0cfc673e3c5b075335e91d04726685f534b7e8c1a53dd3c22fec4a3f391b4b17f41819534517d28fd0f82dcfb6a5807641226de15c22eb639fc5500e5c3e303f
-
SSDEEP
12288:IwSXj+0IeDOIz6cLtpXVhkT6/45nmCLL6knmDwOVHKWuYlnV+Wgfc8vy4h8i:I+oaIzbLD/4BL+knmcQH40186Ti
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2936 bedgbbjdeb.exe -
Loads dropped DLL 4 IoCs
pid Process 2632 11a34f12daedb81a905b2a2fc0445987.exe 2632 11a34f12daedb81a905b2a2fc0445987.exe 2632 11a34f12daedb81a905b2a2fc0445987.exe 2632 11a34f12daedb81a905b2a2fc0445987.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process 2276 2936 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2272 wmic.exe Token: SeSecurityPrivilege 2272 wmic.exe Token: SeTakeOwnershipPrivilege 2272 wmic.exe Token: SeLoadDriverPrivilege 2272 wmic.exe Token: SeSystemProfilePrivilege 2272 wmic.exe Token: SeSystemtimePrivilege 2272 wmic.exe Token: SeProfSingleProcessPrivilege 2272 wmic.exe Token: SeIncBasePriorityPrivilege 2272 wmic.exe Token: SeCreatePagefilePrivilege 2272 wmic.exe Token: SeBackupPrivilege 2272 wmic.exe Token: SeRestorePrivilege 2272 wmic.exe Token: SeShutdownPrivilege 2272 wmic.exe Token: SeDebugPrivilege 2272 wmic.exe Token: SeSystemEnvironmentPrivilege 2272 wmic.exe Token: SeRemoteShutdownPrivilege 2272 wmic.exe Token: SeUndockPrivilege 2272 wmic.exe Token: SeManageVolumePrivilege 2272 wmic.exe Token: 33 2272 wmic.exe Token: 34 2272 wmic.exe Token: 35 2272 wmic.exe Token: SeIncreaseQuotaPrivilege 2272 wmic.exe Token: SeSecurityPrivilege 2272 wmic.exe Token: SeTakeOwnershipPrivilege 2272 wmic.exe Token: SeLoadDriverPrivilege 2272 wmic.exe Token: SeSystemProfilePrivilege 2272 wmic.exe Token: SeSystemtimePrivilege 2272 wmic.exe Token: SeProfSingleProcessPrivilege 2272 wmic.exe Token: SeIncBasePriorityPrivilege 2272 wmic.exe Token: SeCreatePagefilePrivilege 2272 wmic.exe Token: SeBackupPrivilege 2272 wmic.exe Token: SeRestorePrivilege 2272 wmic.exe Token: SeShutdownPrivilege 2272 wmic.exe Token: SeDebugPrivilege 2272 wmic.exe Token: SeSystemEnvironmentPrivilege 2272 wmic.exe Token: SeRemoteShutdownPrivilege 2272 wmic.exe Token: SeUndockPrivilege 2272 wmic.exe Token: SeManageVolumePrivilege 2272 wmic.exe Token: 33 2272 wmic.exe Token: 34 2272 wmic.exe Token: 35 2272 wmic.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2632 wrote to memory of 2936 2632 11a34f12daedb81a905b2a2fc0445987.exe 27 PID 2632 wrote to memory of 2936 2632 11a34f12daedb81a905b2a2fc0445987.exe 27 PID 2632 wrote to memory of 2936 2632 11a34f12daedb81a905b2a2fc0445987.exe 27 PID 2632 wrote to memory of 2936 2632 11a34f12daedb81a905b2a2fc0445987.exe 27 PID 2936 wrote to memory of 2272 2936 bedgbbjdeb.exe 16 PID 2936 wrote to memory of 2272 2936 bedgbbjdeb.exe 16 PID 2936 wrote to memory of 2272 2936 bedgbbjdeb.exe 16 PID 2936 wrote to memory of 2272 2936 bedgbbjdeb.exe 16 PID 2936 wrote to memory of 2668 2936 bedgbbjdeb.exe 26 PID 2936 wrote to memory of 2668 2936 bedgbbjdeb.exe 26 PID 2936 wrote to memory of 2668 2936 bedgbbjdeb.exe 26 PID 2936 wrote to memory of 2668 2936 bedgbbjdeb.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\11a34f12daedb81a905b2a2fc0445987.exe"C:\Users\Admin\AppData\Local\Temp\11a34f12daedb81a905b2a2fc0445987.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\bedgbbjdeb.exeC:\Users\Admin\AppData\Local\Temp\bedgbbjdeb.exe 7#2#5#1#4#4#0#1#6#0#5 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⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2936
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81703539579.txt bios get serialnumber1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2272
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81703539579.txt bios get version1⤵PID:2100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 3681⤵
- Program crash
PID:2276
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81703539579.txt bios get version1⤵PID:2672
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81703539579.txt bios get version1⤵PID:2552
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81703539579.txt bios get version1⤵PID:2668