Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 12:24
Static task
static1
Behavioral task
behavioral1
Sample
6e44fe1424a9e32b2c5cf0bc56489f32.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6e44fe1424a9e32b2c5cf0bc56489f32.exe
Resource
win10v2004-20231215-en
General
-
Target
6e44fe1424a9e32b2c5cf0bc56489f32.exe
-
Size
24KB
-
MD5
6e44fe1424a9e32b2c5cf0bc56489f32
-
SHA1
25806965bce207c85a4b212802de768225959c34
-
SHA256
88a5e4d13b31864b76eebf50118e1aa4c0d57cbcd7463eef73685b18c8d4c77a
-
SHA512
aa1a8480100f9c3e48ea818bcab52c71266ffafff0ea24ab2a293f63b3960dc6d1d80f3bffa4e3ff49543fc5f2599a331f2fb676d9374759fc135236a228b554
-
SSDEEP
384:E3eVES+/xwGkRKJPbHUllM61qmTTMVF9/q5w0:bGS+ZfbJjHKO8qYoAJ
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" 6e44fe1424a9e32b2c5cf0bc56489f32.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe 6e44fe1424a9e32b2c5cf0bc56489f32.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2548 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2352 ipconfig.exe 2688 NETSTAT.EXE -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2548 tasklist.exe Token: SeDebugPrivilege 2688 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2216 6e44fe1424a9e32b2c5cf0bc56489f32.exe 2216 6e44fe1424a9e32b2c5cf0bc56489f32.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2216 wrote to memory of 1068 2216 6e44fe1424a9e32b2c5cf0bc56489f32.exe 16 PID 2216 wrote to memory of 1068 2216 6e44fe1424a9e32b2c5cf0bc56489f32.exe 16 PID 2216 wrote to memory of 1068 2216 6e44fe1424a9e32b2c5cf0bc56489f32.exe 16 PID 2216 wrote to memory of 1068 2216 6e44fe1424a9e32b2c5cf0bc56489f32.exe 16 PID 1068 wrote to memory of 2344 1068 cmd.exe 23 PID 1068 wrote to memory of 2344 1068 cmd.exe 23 PID 1068 wrote to memory of 2344 1068 cmd.exe 23 PID 1068 wrote to memory of 2344 1068 cmd.exe 23 PID 1068 wrote to memory of 2352 1068 cmd.exe 17 PID 1068 wrote to memory of 2352 1068 cmd.exe 17 PID 1068 wrote to memory of 2352 1068 cmd.exe 17 PID 1068 wrote to memory of 2352 1068 cmd.exe 17 PID 1068 wrote to memory of 2548 1068 cmd.exe 18 PID 1068 wrote to memory of 2548 1068 cmd.exe 18 PID 1068 wrote to memory of 2548 1068 cmd.exe 18 PID 1068 wrote to memory of 2548 1068 cmd.exe 18 PID 1068 wrote to memory of 2612 1068 cmd.exe 22 PID 1068 wrote to memory of 2612 1068 cmd.exe 22 PID 1068 wrote to memory of 2612 1068 cmd.exe 22 PID 1068 wrote to memory of 2612 1068 cmd.exe 22 PID 2612 wrote to memory of 2652 2612 net.exe 21 PID 2612 wrote to memory of 2652 2612 net.exe 21 PID 2612 wrote to memory of 2652 2612 net.exe 21 PID 2612 wrote to memory of 2652 2612 net.exe 21 PID 1068 wrote to memory of 2688 1068 cmd.exe 20 PID 1068 wrote to memory of 2688 1068 cmd.exe 20 PID 1068 wrote to memory of 2688 1068 cmd.exe 20 PID 1068 wrote to memory of 2688 1068 cmd.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e44fe1424a9e32b2c5cf0bc56489f32.exe"C:\Users\Admin\AppData\Local\Temp\6e44fe1424a9e32b2c5cf0bc56489f32.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:2352
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2548
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
C:\Windows\SysWOW64\net.exenet start3⤵
- Suspicious use of WriteProcessMemory
PID:2612
-
-
C:\Windows\SysWOW64\cmd.execmd /c set3⤵PID:2344
-
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start1⤵PID:2652