Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 13:07
Static task
static1
Behavioral task
behavioral1
Sample
20833aa5282fcaf90991860840e0132e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
20833aa5282fcaf90991860840e0132e.exe
Resource
win10v2004-20231215-en
General
-
Target
20833aa5282fcaf90991860840e0132e.exe
-
Size
3.0MB
-
MD5
20833aa5282fcaf90991860840e0132e
-
SHA1
ecedaee3b1bab591d56fda784a7e04d897667ba5
-
SHA256
e43588a87c7f97bf49f18424bd7004c66106250169602d55f48099a0b1b740be
-
SHA512
03745631207362c9c487bb5c26a662e258a309195f8cf2524b545dd63ae12729db48ab381482b898311c4a3bb6c55ee6003d2bf851a39cb858dc44bf01910c29
-
SSDEEP
49152:Qpsz6mevZ7dTEUT9tm7+IHed5TGsVZKkuQTCr3k6cesd:Q06TBE4tPfTGOMkue
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: 20833aa5282fcaf90991860840e0132e.exe File opened (read-only) \??\V: 20833aa5282fcaf90991860840e0132e.exe File opened (read-only) \??\X: 20833aa5282fcaf90991860840e0132e.exe File opened (read-only) \??\Z: 20833aa5282fcaf90991860840e0132e.exe File opened (read-only) \??\L: 20833aa5282fcaf90991860840e0132e.exe File opened (read-only) \??\R: 20833aa5282fcaf90991860840e0132e.exe File opened (read-only) \??\K: 20833aa5282fcaf90991860840e0132e.exe File opened (read-only) \??\M: 20833aa5282fcaf90991860840e0132e.exe File opened (read-only) \??\S: 20833aa5282fcaf90991860840e0132e.exe File opened (read-only) \??\A: 20833aa5282fcaf90991860840e0132e.exe File opened (read-only) \??\B: 20833aa5282fcaf90991860840e0132e.exe File opened (read-only) \??\G: 20833aa5282fcaf90991860840e0132e.exe File opened (read-only) \??\I: 20833aa5282fcaf90991860840e0132e.exe File opened (read-only) \??\P: 20833aa5282fcaf90991860840e0132e.exe File opened (read-only) \??\Q: 20833aa5282fcaf90991860840e0132e.exe File opened (read-only) \??\T: 20833aa5282fcaf90991860840e0132e.exe File opened (read-only) \??\U: 20833aa5282fcaf90991860840e0132e.exe File opened (read-only) \??\E: 20833aa5282fcaf90991860840e0132e.exe File opened (read-only) \??\H: 20833aa5282fcaf90991860840e0132e.exe File opened (read-only) \??\N: 20833aa5282fcaf90991860840e0132e.exe File opened (read-only) \??\O: 20833aa5282fcaf90991860840e0132e.exe File opened (read-only) \??\W: 20833aa5282fcaf90991860840e0132e.exe File opened (read-only) \??\Y: 20833aa5282fcaf90991860840e0132e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2804 schtasks.exe 2828 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2240 20833aa5282fcaf90991860840e0132e.exe Token: SeIncBasePriorityPrivilege 2240 20833aa5282fcaf90991860840e0132e.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2240 20833aa5282fcaf90991860840e0132e.exe 2240 20833aa5282fcaf90991860840e0132e.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2240 20833aa5282fcaf90991860840e0132e.exe 2240 20833aa5282fcaf90991860840e0132e.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2528 2240 20833aa5282fcaf90991860840e0132e.exe 25 PID 2240 wrote to memory of 2528 2240 20833aa5282fcaf90991860840e0132e.exe 25 PID 2240 wrote to memory of 2528 2240 20833aa5282fcaf90991860840e0132e.exe 25 PID 2240 wrote to memory of 2528 2240 20833aa5282fcaf90991860840e0132e.exe 25 PID 2528 wrote to memory of 2828 2528 cmd.exe 24 PID 2528 wrote to memory of 2828 2528 cmd.exe 24 PID 2528 wrote to memory of 2828 2528 cmd.exe 24 PID 2528 wrote to memory of 2828 2528 cmd.exe 24 PID 2240 wrote to memory of 2428 2240 20833aa5282fcaf90991860840e0132e.exe 21 PID 2240 wrote to memory of 2428 2240 20833aa5282fcaf90991860840e0132e.exe 21 PID 2240 wrote to memory of 2428 2240 20833aa5282fcaf90991860840e0132e.exe 21 PID 2240 wrote to memory of 2428 2240 20833aa5282fcaf90991860840e0132e.exe 21 PID 2428 wrote to memory of 2804 2428 cmd.exe 22 PID 2428 wrote to memory of 2804 2428 cmd.exe 22 PID 2428 wrote to memory of 2804 2428 cmd.exe 22 PID 2428 wrote to memory of 2804 2428 cmd.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\20833aa5282fcaf90991860840e0132e.exe"C:\Users\Admin\AppData\Local\Temp\20833aa5282fcaf90991860840e0132e.exe"1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks.exe /Create /TN "PCMAV" /XML "C:\Users\Admin\AppData\Local\Temp\PCMAV.xml" /F2⤵
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "PCMAV" /XML "C:\Users\Admin\AppData\Local\Temp\PCMAV.xml" /F3⤵
- Creates scheduled task(s)
PID:2804
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks.exe /Create /TN "PCMAV" /XML "C:\Users\Admin\AppData\Local\Temp\PCMAV.xml" /F2⤵
- Suspicious use of WriteProcessMemory
PID:2528
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "PCMAV" /XML "C:\Users\Admin\AppData\Local\Temp\PCMAV.xml" /F1⤵
- Creates scheduled task(s)
PID:2828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD529d09bc5ac45dee5d540a66d846b0855
SHA14b0a7afd03a9db77428fc385a94f7e2cc85064aa
SHA256e30e591c1f40284b513eeb56c371aab55df76f838d0fef3bc368da6d62680820
SHA5126d013040b73f58beeb39230af5de191ee9c6bae48dea3b22570eae10fe2acc1621b4af788f901e1182678709ceaf01072726490169b7ff9cf4d654a2dc66bb08