Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 17:12
Static task
static1
Behavioral task
behavioral1
Sample
2ff22c8ec4e340b78efd44b836e3e260.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2ff22c8ec4e340b78efd44b836e3e260.exe
Resource
win10v2004-20231215-en
General
-
Target
2ff22c8ec4e340b78efd44b836e3e260.exe
-
Size
13KB
-
MD5
2ff22c8ec4e340b78efd44b836e3e260
-
SHA1
7b80a044aa69d79f31d98992eb24f90e74da30d2
-
SHA256
d47a558f49f9c211c6a16e36670232a9d997b85c5162e6fab4a8c61f8151e4f4
-
SHA512
ebd4a83702f0568ae505e1a066a64afb55ae61fef2ea9c08a69efff478fb3878678c54e287e5594dd46c4be24c0798afd37cf5a65006027f49a710ba9db66eba
-
SSDEEP
192:FjdMyhJG2aM/lBxlyA9IF8G+ZMimz82pXdHMHlcc23kaGqFSX0DubjP/:xdUoNflv9IFRY2ptsc10+FSEUjH
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4964 netsh.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System32 = "C:\\Windows\\system32\\update32.exe" 2ff22c8ec4e340b78efd44b836e3e260.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\update32.exe 2ff22c8ec4e340b78efd44b836e3e260.exe File opened for modification C:\Windows\SysWOW64\update32.exe 2ff22c8ec4e340b78efd44b836e3e260.exe File opened for modification C:\Windows\SysWOW64\dlds8.exe 2ff22c8ec4e340b78efd44b836e3e260.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3448 wrote to memory of 4964 3448 2ff22c8ec4e340b78efd44b836e3e260.exe 90 PID 3448 wrote to memory of 4964 3448 2ff22c8ec4e340b78efd44b836e3e260.exe 90 PID 3448 wrote to memory of 4964 3448 2ff22c8ec4e340b78efd44b836e3e260.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ff22c8ec4e340b78efd44b836e3e260.exe"C:\Users\Admin\AppData\Local\Temp\2ff22c8ec4e340b78efd44b836e3e260.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set allowedprogram 'C:\Users\Admin\AppData\Local\Temp\2ff22c8ec4e340b78efd44b836e3e260.exe' enable2⤵
- Modifies Windows Firewall
PID:4964
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1