Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 08:46
Static task
static1
Behavioral task
behavioral1
Sample
60eb440b50deecf53d4c1ccd102dbc6d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
60eb440b50deecf53d4c1ccd102dbc6d.exe
Resource
win10v2004-20231215-en
General
-
Target
60eb440b50deecf53d4c1ccd102dbc6d.exe
-
Size
581KB
-
MD5
60eb440b50deecf53d4c1ccd102dbc6d
-
SHA1
a8c2d11441adf64c807fea44738a332271e7639a
-
SHA256
050235ac7752d4e87878f733ba539e3a64a23ca442653e3e1ca0a5ca8e55b913
-
SHA512
67711f06c393f3d5128dd4319d1846d7e043e49f1e9ec086c11d05cff79694f9e363b5ec7330572cf241cdfb34cc7589dc6023ce1a2c73c0f847d5263e7caa37
-
SSDEEP
12288:wfDJhNH8ZkXWykEr8369tNFMP8NdHXpZ2achJC4+6:wLJbl+36tKPdhJ7b
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 800 1431831751.exe -
Loads dropped DLL 2 IoCs
pid Process 1068 60eb440b50deecf53d4c1ccd102dbc6d.exe 1068 60eb440b50deecf53d4c1ccd102dbc6d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process 4976 800 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3580 wmic.exe Token: SeSecurityPrivilege 3580 wmic.exe Token: SeTakeOwnershipPrivilege 3580 wmic.exe Token: SeLoadDriverPrivilege 3580 wmic.exe Token: SeSystemProfilePrivilege 3580 wmic.exe Token: SeSystemtimePrivilege 3580 wmic.exe Token: SeProfSingleProcessPrivilege 3580 wmic.exe Token: SeIncBasePriorityPrivilege 3580 wmic.exe Token: SeCreatePagefilePrivilege 3580 wmic.exe Token: SeBackupPrivilege 3580 wmic.exe Token: SeRestorePrivilege 3580 wmic.exe Token: SeShutdownPrivilege 3580 wmic.exe Token: SeDebugPrivilege 3580 wmic.exe Token: SeSystemEnvironmentPrivilege 3580 wmic.exe Token: SeRemoteShutdownPrivilege 3580 wmic.exe Token: SeUndockPrivilege 3580 wmic.exe Token: SeManageVolumePrivilege 3580 wmic.exe Token: 33 3580 wmic.exe Token: 34 3580 wmic.exe Token: 35 3580 wmic.exe Token: 36 3580 wmic.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1068 wrote to memory of 800 1068 60eb440b50deecf53d4c1ccd102dbc6d.exe 34 PID 1068 wrote to memory of 800 1068 60eb440b50deecf53d4c1ccd102dbc6d.exe 34 PID 1068 wrote to memory of 800 1068 60eb440b50deecf53d4c1ccd102dbc6d.exe 34 PID 800 wrote to memory of 3580 800 1431831751.exe 19 PID 800 wrote to memory of 3580 800 1431831751.exe 19 PID 800 wrote to memory of 3580 800 1431831751.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\60eb440b50deecf53d4c1ccd102dbc6d.exe"C:\Users\Admin\AppData\Local\Temp\60eb440b50deecf53d4c1ccd102dbc6d.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\1431831751.exeC:\Users\Admin\AppData\Local\Temp\1431831751.exe 9#2#2#7#5#3#4#7#8#0#8 Jk5HPTgwLCsqICdKU0BJREE5KRgvRjxSVUhNSEU9NTAYJkJHTE9GQDYqNyouMB4oPkZANiggJ0dQTT1QQFBYQUQ1KDQ3LRssTz5KVj1JXVNLRzpkbWxwMiYtcWtxK0A+S0slS01OJjxNTCdBTj5GHi08R0Y/REFENW5ELyw0L0ovTktNQDJKMkYtMjxLTDE6QR4oPy45KikwKCweLT0tOikqGC88KjsrKhssQC01LSkXLUIuOCotGSdQSkZCUzxPXExLQVY5Olc7GSpNTkg8VTtLXUNORz45GSdQSkZCUzxPXEo6RUU1Fy1DUUBcUUtEPRgmQ1Y+WkBJPURJRjw7HihDTE9NV0JKRlVRPk06LBknVEA4TElSSlJbTkpMNRctVEY4LxwoPFMpNB4tS1BLUEJFRVdOQ0o8SkpBQkVBPzxTUEU4HStCS19KTExSQkhCOW1qdV0XLVA+T1JOR0FOP1ZTUT5NXEA6UVM1KR4tQURBQVE1MRgmR1FYP1ZKOkVJO1ZDTDxNVkxNPUQ1XV9qbGAdKz1HV0ZDTT89WkZMNi42JiguMCczKy0wKSAnS0dLPjguMCwpOCwoNDEyGyxASE9OREY/QlhPRkk+NTUnKDUtKysuMSMtOiwuOC8yJT5JGSdVOTRLbXNkaWhaHTJeLCwuJCNUZWdcb29qKUxNJjMqKh0zWiJVTVAxMSEsWitMaWdiXmlxISteNyYnIzFbJm9yHithKSgsLiImaWVkXSs/XGFpaBssUUtEPWBrcm4eLl4hK14lKl1lY20sKywqKTFcXHFnYGkrZWdebx0pZFBuaVFlZl1EZ25samhcYUlaZmFfXHBdXWBtaGhxJSpdLzIsLDUwKi40KBwwZF1qdGplZ2FcZF9sWmJibh4qZikrMS8xLy4yLSglK10xMSw0NDIxKDEqMFhFQ3NPZjptTis4NktMXnNIckZiRmB1dEZlVnNBT2suQ2cuckdlMW5IQyxbV1EtMUg/aGlLPExqV2JmM0diLGRQSi4vRU8+Z1ByRS5CZ2VfU2YsMkRDMFtXMFNrVUNdWlpPTDZhT3N1X2YoZFA+WGZSLW1qUHJwKEh3ZWxIdmxIRlZKOlNpUnNOdkM+SzxRQVNOSC9NPjlkUWMvbFtldHM=2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:800
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81704524305.txt bios get serialnumber1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3580
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81704524305.txt bios get version1⤵PID:2296
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81704524305.txt bios get version1⤵PID:3316
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81704524305.txt bios get version1⤵PID:3484
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81704524305.txt bios get version1⤵PID:1604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 800 -ip 8001⤵PID:4412
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 800 -s 9521⤵
- Program crash
PID:4976