Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 02:42
Static task
static1
Behavioral task
behavioral1
Sample
4d6544651cb7df710dec01b86da54b3f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4d6544651cb7df710dec01b86da54b3f.exe
Resource
win10v2004-20231222-en
General
-
Target
4d6544651cb7df710dec01b86da54b3f.exe
-
Size
617KB
-
MD5
4d6544651cb7df710dec01b86da54b3f
-
SHA1
4d2b3f9a2504824bc937be24cda6f59212c2ca5c
-
SHA256
e296f01aba2c0a00695d44dfd45873ce02b069ca4371018062cfe83f092bdd54
-
SHA512
60aa0a74bf57c584f09a5307d7948f8de387231e8a460e0b9f0742d2472e7ef5539c00a59d0d7d926cb5b70b988699e7c86c0262899ce5462d7bf02c1c4c637e
-
SSDEEP
12288:jMUQptdPz4l1GrBYkqRdDF3Z4mxxnDqVTVOC0JGp7x:YUQBPS12qkqRNQmX2VTz0JGp7x
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2792 Server_Setup.exe 1696 Hacker.com.cn.exe -
Loads dropped DLL 4 IoCs
pid Process 2108 4d6544651cb7df710dec01b86da54b3f.exe 2792 Server_Setup.exe 2792 Server_Setup.exe 2792 Server_Setup.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1696 set thread context of 2824 1696 Hacker.com.cn.exe 16 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\program files\common files\microsoft shared\msinfo\Server_Setup.jpg 4d6544651cb7df710dec01b86da54b3f.exe File opened for modification C:\program files\common files\microsoft shared\msinfo\Server_Setup.exe Server_Setup.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Hacker.com.cn.exe Server_Setup.exe File opened for modification C:\Windows\Hacker.com.cn.exe Server_Setup.exe File created C:\Windows\UNINSTAL.BAT Server_Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2792 Server_Setup.exe Token: SeDebugPrivilege 1696 Hacker.com.cn.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2792 2108 4d6544651cb7df710dec01b86da54b3f.exe 14 PID 2108 wrote to memory of 2792 2108 4d6544651cb7df710dec01b86da54b3f.exe 14 PID 2108 wrote to memory of 2792 2108 4d6544651cb7df710dec01b86da54b3f.exe 14 PID 2108 wrote to memory of 2792 2108 4d6544651cb7df710dec01b86da54b3f.exe 14 PID 2108 wrote to memory of 2792 2108 4d6544651cb7df710dec01b86da54b3f.exe 14 PID 2108 wrote to memory of 2792 2108 4d6544651cb7df710dec01b86da54b3f.exe 14 PID 2108 wrote to memory of 2792 2108 4d6544651cb7df710dec01b86da54b3f.exe 14 PID 1696 wrote to memory of 2824 1696 Hacker.com.cn.exe 16 PID 1696 wrote to memory of 2824 1696 Hacker.com.cn.exe 16 PID 1696 wrote to memory of 2824 1696 Hacker.com.cn.exe 16 PID 1696 wrote to memory of 2824 1696 Hacker.com.cn.exe 16 PID 1696 wrote to memory of 2824 1696 Hacker.com.cn.exe 16 PID 1696 wrote to memory of 2824 1696 Hacker.com.cn.exe 16 PID 2792 wrote to memory of 2580 2792 Server_Setup.exe 32 PID 2792 wrote to memory of 2580 2792 Server_Setup.exe 32 PID 2792 wrote to memory of 2580 2792 Server_Setup.exe 32 PID 2792 wrote to memory of 2580 2792 Server_Setup.exe 32 PID 2792 wrote to memory of 2580 2792 Server_Setup.exe 32 PID 2792 wrote to memory of 2580 2792 Server_Setup.exe 32 PID 2792 wrote to memory of 2580 2792 Server_Setup.exe 32
Processes
-
C:\program files\common files\microsoft shared\msinfo\Server_Setup.exe"C:\program files\common files\microsoft shared\msinfo\Server_Setup.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\UNINSTAL.BAT2⤵PID:2580
-
-
C:\Windows\Hacker.com.cn.exeC:\Windows\Hacker.com.cn.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\WINDOWS\SysWOW64\svchost.exeC:\WINDOWS\system32\svchost.exe2⤵PID:2824
-
-
C:\Users\Admin\AppData\Local\Temp\4d6544651cb7df710dec01b86da54b3f.exe"C:\Users\Admin\AppData\Local\Temp\4d6544651cb7df710dec01b86da54b3f.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
276KB
MD58632a80f382f17c27e73751a9b242b92
SHA197236014401246e44fea1bb31a6f62221b8f25c3
SHA256bdd0a6a722cfe76b201b8c35e87bd927a11a4e0f197998b228bbee07fd8af46f
SHA51230e8c0fadb2898a2bd30092ac45c90cb85538647cb20a77ef517391528c78e04b53fb57ec8ff1d001030df9936db2fcdffbec7896912c3220e4ead27c4e47da1