Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
2s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 14:35
Behavioral task
behavioral1
Sample
75fec76e56944264d7dafd729caa69d0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
75fec76e56944264d7dafd729caa69d0.exe
Resource
win10v2004-20231215-en
General
-
Target
75fec76e56944264d7dafd729caa69d0.exe
-
Size
433KB
-
MD5
75fec76e56944264d7dafd729caa69d0
-
SHA1
0111407ec55b8fe06645f701c9538eccc402e767
-
SHA256
dc8f61ffb998cd0655ec9ded6183b0d4db9548722d5ffa2ced71b6fb251c5bd2
-
SHA512
85ddad170ef71a5a9f4c5e07879f96043532cc53503f5b701288cf64401119f7e31dbac7e97d663b6f39700abd3fd5f8dbc803fe1b09f17af81ecf32fc184213
-
SSDEEP
12288:njkArEN249AyE/rbaMct4bO2/bY4B+XxBZV4l6L/V03EWWI97:EFE//Tct4bOsQhnVa6DV0UA7
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/972-0-0x0000000000400000-0x00000000004C0000-memory.dmp upx behavioral2/memory/972-3-0x0000000000400000-0x00000000004C0000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/972-3-0x0000000000400000-0x00000000004C0000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 3 IoCs
pid Process 4768 taskkill.exe 4292 taskkill.exe 2360 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4768 taskkill.exe Token: SeDebugPrivilege 4292 taskkill.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 972 wrote to memory of 2368 972 75fec76e56944264d7dafd729caa69d0.exe 118 PID 972 wrote to memory of 2368 972 75fec76e56944264d7dafd729caa69d0.exe 118 PID 972 wrote to memory of 2368 972 75fec76e56944264d7dafd729caa69d0.exe 118 PID 972 wrote to memory of 4396 972 75fec76e56944264d7dafd729caa69d0.exe 38 PID 972 wrote to memory of 4396 972 75fec76e56944264d7dafd729caa69d0.exe 38 PID 972 wrote to memory of 4396 972 75fec76e56944264d7dafd729caa69d0.exe 38 PID 4396 wrote to memory of 4768 4396 cmd.exe 39 PID 4396 wrote to memory of 4768 4396 cmd.exe 39 PID 4396 wrote to memory of 4768 4396 cmd.exe 39 PID 972 wrote to memory of 812 972 75fec76e56944264d7dafd729caa69d0.exe 47 PID 972 wrote to memory of 812 972 75fec76e56944264d7dafd729caa69d0.exe 47 PID 972 wrote to memory of 812 972 75fec76e56944264d7dafd729caa69d0.exe 47 PID 812 wrote to memory of 4292 812 cmd.exe 43 PID 812 wrote to memory of 4292 812 cmd.exe 43 PID 812 wrote to memory of 4292 812 cmd.exe 43 PID 972 wrote to memory of 3728 972 75fec76e56944264d7dafd729caa69d0.exe 46 PID 972 wrote to memory of 3728 972 75fec76e56944264d7dafd729caa69d0.exe 46 PID 972 wrote to memory of 3728 972 75fec76e56944264d7dafd729caa69d0.exe 46 PID 3728 wrote to memory of 872 3728 cmd.exe 120 PID 3728 wrote to memory of 872 3728 cmd.exe 120 PID 3728 wrote to memory of 872 3728 cmd.exe 120 PID 972 wrote to memory of 2760 972 75fec76e56944264d7dafd729caa69d0.exe 66 PID 972 wrote to memory of 2760 972 75fec76e56944264d7dafd729caa69d0.exe 66 PID 972 wrote to memory of 2760 972 75fec76e56944264d7dafd729caa69d0.exe 66 PID 2760 wrote to memory of 2360 2760 cmd.exe 62 PID 2760 wrote to memory of 2360 2760 cmd.exe 62 PID 2760 wrote to memory of 2360 2760 cmd.exe 62
Processes
-
C:\Users\Admin\AppData\Local\Temp\75fec76e56944264d7dafd729caa69d0.exe"C:\Users\Admin\AppData\Local\Temp\75fec76e56944264d7dafd729caa69d0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c khmsg2⤵PID:2368
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im NXPRUN.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im NXPRUN.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4768
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C REG IMPORT "C:\Windows\SysWOW64\zc.lst"2⤵
- Suspicious use of WriteProcessMemory
PID:3728
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im NxpAuxSvc.exe2⤵
- Suspicious use of WriteProcessMemory
PID:812
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c start explorer.exe2⤵PID:4648
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /f /im explorer.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2760
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im NxpAuxSvc.exe1⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4292
-
C:\Windows\SysWOW64\reg.exeREG IMPORT "C:\Windows\SysWOW64\zc.lst"1⤵PID:872
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe1⤵
- Kills process with taskkill
PID:2360
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe1⤵PID:512
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵PID:4228
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding1⤵PID:2040
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {3eef301f-b596-4c0b-bd92-013beafce793} -Embedding1⤵PID:4064
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵PID:2368
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵PID:872
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3836