Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 10:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
18160d65ef1e2d285623bcf7f3277c94.exe
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
18160d65ef1e2d285623bcf7f3277c94.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
18160d65ef1e2d285623bcf7f3277c94.exe
-
Size
200KB
-
MD5
18160d65ef1e2d285623bcf7f3277c94
-
SHA1
70afbd4b3818e9b9f2d5123bb1051fc6c5604287
-
SHA256
28b3de108f842233db08015ee0aef248c409fb0c6e8ad7986b6c57beebc3d462
-
SHA512
3a7adfb296733fc1396e0121c014e2165e4c8b0fa9ebca838954c5d574f83df71bf418717c83b2407216e99f333a83c96b065272c356d3a22b1c3f37322281e7
-
SSDEEP
3072:DEC5H5A30QttkehesL5bEGsMgA9NFDn1q2ZRg9HQ6nae8m6+f:ICPLvM5bEEgEFxq2ZRg9wI1sY
Score
8/10
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0AA2D91F-0A1D-66BF-1168-C38BF766FB5D}\stubpath = "%SystemRoot%\\system32\\V3Medic.exe" 18160d65ef1e2d285623bcf7f3277c94.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{0AA2D91F-0A1D-66BF-1168-C38BF766FB5D} 18160d65ef1e2d285623bcf7f3277c94.exe -
Deletes itself 1 IoCs
pid Process 1916 cmd.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\V3Medic.exe 18160d65ef1e2d285623bcf7f3277c94.exe File opened for modification C:\Windows\SysWOW64\V3Medic.exe 18160d65ef1e2d285623bcf7f3277c94.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 18160d65ef1e2d285623bcf7f3277c94.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 18160d65ef1e2d285623bcf7f3277c94.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2712 18160d65ef1e2d285623bcf7f3277c94.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2028 2712 18160d65ef1e2d285623bcf7f3277c94.exe 21 PID 2712 wrote to memory of 2028 2712 18160d65ef1e2d285623bcf7f3277c94.exe 21 PID 2712 wrote to memory of 2028 2712 18160d65ef1e2d285623bcf7f3277c94.exe 21 PID 2712 wrote to memory of 2028 2712 18160d65ef1e2d285623bcf7f3277c94.exe 21 PID 2712 wrote to memory of 1916 2712 18160d65ef1e2d285623bcf7f3277c94.exe 33 PID 2712 wrote to memory of 1916 2712 18160d65ef1e2d285623bcf7f3277c94.exe 33 PID 2712 wrote to memory of 1916 2712 18160d65ef1e2d285623bcf7f3277c94.exe 33 PID 2712 wrote to memory of 1916 2712 18160d65ef1e2d285623bcf7f3277c94.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\18160d65ef1e2d285623bcf7f3277c94.exe"C:\Users\Admin\AppData\Local\Temp\18160d65ef1e2d285623bcf7f3277c94.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CURRENT_USER\Software\Microsoft\Active Setup\Installed Components\{0AA2D91F-0A1D-66BF-1168-C38BF766FB5D}" /f2⤵PID:2028
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\18160D~1.EXE > nul2⤵
- Deletes itself
PID:1916
-