Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 10:43
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
18160d65ef1e2d285623bcf7f3277c94.exe
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
18160d65ef1e2d285623bcf7f3277c94.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
18160d65ef1e2d285623bcf7f3277c94.exe
-
Size
200KB
-
MD5
18160d65ef1e2d285623bcf7f3277c94
-
SHA1
70afbd4b3818e9b9f2d5123bb1051fc6c5604287
-
SHA256
28b3de108f842233db08015ee0aef248c409fb0c6e8ad7986b6c57beebc3d462
-
SHA512
3a7adfb296733fc1396e0121c014e2165e4c8b0fa9ebca838954c5d574f83df71bf418717c83b2407216e99f333a83c96b065272c356d3a22b1c3f37322281e7
-
SSDEEP
3072:DEC5H5A30QttkehesL5bEGsMgA9NFDn1q2ZRg9HQ6nae8m6+f:ICPLvM5bEEgEFxq2ZRg9wI1sY
Score
8/10
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C5F1FB00-A1A0-F32E-399F-FC592D80F01E} 18160d65ef1e2d285623bcf7f3277c94.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{C5F1FB00-A1A0-F32E-399F-FC592D80F01E}\stubpath = "%SystemRoot%\\system32\\V3Medic.exe" 18160d65ef1e2d285623bcf7f3277c94.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\V3Medic.exe 18160d65ef1e2d285623bcf7f3277c94.exe File opened for modification C:\Windows\SysWOW64\V3Medic.exe 18160d65ef1e2d285623bcf7f3277c94.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3148 18160d65ef1e2d285623bcf7f3277c94.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3148 wrote to memory of 4960 3148 18160d65ef1e2d285623bcf7f3277c94.exe 91 PID 3148 wrote to memory of 4960 3148 18160d65ef1e2d285623bcf7f3277c94.exe 91 PID 3148 wrote to memory of 4960 3148 18160d65ef1e2d285623bcf7f3277c94.exe 91 PID 3148 wrote to memory of 4112 3148 18160d65ef1e2d285623bcf7f3277c94.exe 102 PID 3148 wrote to memory of 4112 3148 18160d65ef1e2d285623bcf7f3277c94.exe 102 PID 3148 wrote to memory of 4112 3148 18160d65ef1e2d285623bcf7f3277c94.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\18160d65ef1e2d285623bcf7f3277c94.exe"C:\Users\Admin\AppData\Local\Temp\18160d65ef1e2d285623bcf7f3277c94.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CURRENT_USER\Software\Microsoft\Active Setup\Installed Components\{C5F1FB00-A1A0-F32E-399F-FC592D80F01E}" /f2⤵PID:4960
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\18160D~1.EXE > nul2⤵PID:4112
-