Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
219s -
max time network
176s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 13:54
Static task
static1
Behavioral task
behavioral1
Sample
236527a469f0d6c696528728e95c47ff.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
236527a469f0d6c696528728e95c47ff.exe
Resource
win10v2004-20231215-en
General
-
Target
236527a469f0d6c696528728e95c47ff.exe
-
Size
314KB
-
MD5
236527a469f0d6c696528728e95c47ff
-
SHA1
f7f57617a815572cc1842b90055d5326df5ccaef
-
SHA256
a2114dca4d17804fff66d9998c26ffa6b16317cdcd7fd60ba2f7ea19bd24f771
-
SHA512
f00270b1c8fcdc2166ff22e62e5c8bbd93304de7c903e74dadd18a95e0a81ff7f158192e335eb39f81fe4632cbece4237352a720c97a6a545744abe1e4000b2d
-
SSDEEP
6144:k1l4f5pjA6EstDkoCDuG6K4nY+zIZJz5GyCY6ootoA4t/T4RgU0:JA6ESDkoUuBfqR50YPot3e/Tg6
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 932 gLbAgFc15400.exe -
Executes dropped EXE 1 IoCs
pid Process 932 gLbAgFc15400.exe -
Loads dropped DLL 2 IoCs
pid Process 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe -
resource yara_rule behavioral1/memory/2596-1-0x0000000000400000-0x00000000004B3000-memory.dmp upx behavioral1/memory/2596-3-0x0000000000400000-0x00000000004B3000-memory.dmp upx behavioral1/memory/2596-4-0x0000000000400000-0x00000000004B3000-memory.dmp upx behavioral1/memory/2596-5-0x0000000000400000-0x00000000004B3000-memory.dmp upx behavioral1/memory/2596-6-0x0000000000400000-0x00000000004B3000-memory.dmp upx behavioral1/memory/2596-24-0x0000000000400000-0x00000000004B3000-memory.dmp upx behavioral1/memory/932-27-0x0000000000400000-0x00000000004B3000-memory.dmp upx behavioral1/memory/932-26-0x0000000000400000-0x00000000004B3000-memory.dmp upx behavioral1/memory/932-28-0x0000000000400000-0x00000000004B3000-memory.dmp upx behavioral1/memory/932-32-0x0000000000400000-0x00000000004B3000-memory.dmp upx behavioral1/memory/932-39-0x0000000000400000-0x00000000004B3000-memory.dmp upx behavioral1/memory/2596-40-0x0000000000400000-0x00000000004B3000-memory.dmp upx behavioral1/memory/932-45-0x0000000000400000-0x00000000004B3000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\gLbAgFc15400 = "C:\\ProgramData\\gLbAgFc15400\\gLbAgFc15400.exe" gLbAgFc15400.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3308111660-3636268597-2291490419-1000\Software\Microsoft\Internet Explorer\Main gLbAgFc15400.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe 2596 236527a469f0d6c696528728e95c47ff.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2596 236527a469f0d6c696528728e95c47ff.exe Token: SeDebugPrivilege 932 gLbAgFc15400.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 932 gLbAgFc15400.exe 932 gLbAgFc15400.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 932 gLbAgFc15400.exe 932 gLbAgFc15400.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 932 gLbAgFc15400.exe 932 gLbAgFc15400.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2596 wrote to memory of 932 2596 236527a469f0d6c696528728e95c47ff.exe 28 PID 2596 wrote to memory of 932 2596 236527a469f0d6c696528728e95c47ff.exe 28 PID 2596 wrote to memory of 932 2596 236527a469f0d6c696528728e95c47ff.exe 28 PID 2596 wrote to memory of 932 2596 236527a469f0d6c696528728e95c47ff.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\236527a469f0d6c696528728e95c47ff.exe"C:\Users\Admin\AppData\Local\Temp\236527a469f0d6c696528728e95c47ff.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\ProgramData\gLbAgFc15400\gLbAgFc15400.exe"C:\ProgramData\gLbAgFc15400\gLbAgFc15400.exe" "C:\Users\Admin\AppData\Local\Temp\236527a469f0d6c696528728e95c47ff.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
314KB
MD5ac1073ed3259af266706838498b43afe
SHA1e9ff522036d63ffbacb0c84251bbcd4b05bd2e0e
SHA256e151fce98b7a4a53c22505c062cbc3968d3185c1ce4b712df52874697ae00109
SHA5123f06f0142022667f94254477d8fbf4b4179a3ee38cf61dcbe5b4c2d781f816823ff15fb9a4a1034a9ef312515e2bc21bcd2149d4aa5fc0469ce76a54a13ae9de