Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
21s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 03:18
Static task
static1
Behavioral task
behavioral1
Sample
4fa6c1c17e7c1296d9eef7676b948c46.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4fa6c1c17e7c1296d9eef7676b948c46.exe
Resource
win10v2004-20231215-en
General
-
Target
4fa6c1c17e7c1296d9eef7676b948c46.exe
-
Size
75KB
-
MD5
4fa6c1c17e7c1296d9eef7676b948c46
-
SHA1
27bdc174fa02ff18f4d5bafd622d46fdb9bd1b3f
-
SHA256
02d1aed87366355321948056b3b3ebeb32b12d4db7423bae8b31d174d72d4da8
-
SHA512
e5fa924db2facf47cd8ea14878c51be73dd81311d67aea05c3c5106817763e50d3d60667987ab76f98f6a0c2378c443fc99a4e526e093e81693548b282604d81
-
SSDEEP
1536:RGjac6lUu4sjBS28Ck89bcRobapREOm9FbOBWVe/bEw3BWF17xwhHKnLB8NhZg/3:RG+baBL30F11whqnNz/OB/q
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 4 IoCs
pid Process 4088 netsh.exe 2144 netsh.exe 3512 netsh.exe 3256 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 4720 syshost.exe -
Unexpected DNS network traffic destination 2 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 178.32.31.41 Destination IP 178.32.31.41 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Installer\{46417BEB-90F2-2B06-E8EC-0512C8A09DA1}\syshost.exe.tmp syshost.exe File created C:\Windows\Installer\{46417BEB-90F2-2B06-E8EC-0512C8A09DA1}\syshost.exe 4fa6c1c17e7c1296d9eef7676b948c46.exe File opened for modification C:\Windows\Installer\{46417BEB-90F2-2B06-E8EC-0512C8A09DA1}\syshost.exe 4fa6c1c17e7c1296d9eef7676b948c46.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4720 syshost.exe 4720 syshost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4856 4fa6c1c17e7c1296d9eef7676b948c46.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeAssignPrimaryTokenPrivilege 4720 syshost.exe Token: SeIncreaseQuotaPrivilege 4720 syshost.exe Token: SeShutdownPrivilege 4720 syshost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4856 wrote to memory of 2164 4856 4fa6c1c17e7c1296d9eef7676b948c46.exe 101 PID 4856 wrote to memory of 2164 4856 4fa6c1c17e7c1296d9eef7676b948c46.exe 101 PID 4856 wrote to memory of 2164 4856 4fa6c1c17e7c1296d9eef7676b948c46.exe 101 PID 4720 wrote to memory of 4088 4720 syshost.exe 103 PID 4720 wrote to memory of 4088 4720 syshost.exe 103 PID 4720 wrote to memory of 4088 4720 syshost.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fa6c1c17e7c1296d9eef7676b948c46.exe"C:\Users\Admin\AppData\Local\Temp\4fa6c1c17e7c1296d9eef7676b948c46.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\cmd.execmd.exe /C del /Q /F "C:\Users\Admin\AppData\Local\Temp\d33f04c5.tmp"2⤵PID:2164
-
-
C:\Windows\Installer\{46417BEB-90F2-2B06-E8EC-0512C8A09DA1}\syshost.exe"C:\Windows\Installer\{46417BEB-90F2-2B06-E8EC-0512C8A09DA1}\syshost.exe" /service1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall set rule name="Core Networking - System IP Core" dir=in new action=allow enable=yes profile=any2⤵
- Modifies Windows Firewall
PID:4088
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="Core Networking - System IP Core" dir=out action=allow enable=yes profile=any2⤵
- Modifies Windows Firewall
PID:2144
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall set rule name="Core Networking - System IP Core" dir=out new action=allow enable=yes profile=any2⤵
- Modifies Windows Firewall
PID:3512
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="Core Networking - System IP Core" dir=in action=allow enable=yes profile=any2⤵
- Modifies Windows Firewall
PID:3256
-