Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
163s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 15:13
Static task
static1
Behavioral task
behavioral1
Sample
783032c39a1b128532724362efb6c9f0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
783032c39a1b128532724362efb6c9f0.exe
Resource
win10v2004-20231215-en
General
-
Target
783032c39a1b128532724362efb6c9f0.exe
-
Size
195KB
-
MD5
783032c39a1b128532724362efb6c9f0
-
SHA1
ce4d6f3554296bb48265fd245536a2ac527878d3
-
SHA256
21b8c34f00e3e840e24f365946f6cfbb87d21ebb2d76c666644bc9cbf52084fd
-
SHA512
199b3fa25d924f6539733c97c4bf800005e0468cdaf39ec25bbf12cf7d37d06ce0e6ed20b0db98efb803a045802c6e6716ac1b0ac0a8b5bf1a07477921dcaf50
-
SSDEEP
3072:17fM5EWgd1mEwIEaSdkQzRLs9T7r5NOSqeXWZ+2sDOgLw8DlKLD7hSs:1fkEdr3wnPZEHfOSqGlBLxRiA
Malware Config
Signatures
-
Registers COM server for autorun 1 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\{4337b8e7-34a1-79ac-69de-20e29f5c242e}\\n." 783032c39a1b128532724362efb6c9f0.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32 783032c39a1b128532724362efb6c9f0.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32\ThreadingModel = "Both" 783032c39a1b128532724362efb6c9f0.exe -
Unexpected DNS network traffic destination 4 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 83.133.123.20 Destination IP 83.133.123.20 Destination IP 83.133.123.20 Destination IP 83.133.123.20 -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\{4337b8e7-34a1-79ac-69de-20e29f5c242e}\\n." 783032c39a1b128532724362efb6c9f0.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\clsid 783032c39a1b128532724362efb6c9f0.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1} 783032c39a1b128532724362efb6c9f0.exe Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32 783032c39a1b128532724362efb6c9f0.exe Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\CLSID\{42aedc87-2188-41fd-b9a3-0c966feabec1}\InprocServer32\ThreadingModel = "Both" 783032c39a1b128532724362efb6c9f0.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 872 783032c39a1b128532724362efb6c9f0.exe 872 783032c39a1b128532724362efb6c9f0.exe 872 783032c39a1b128532724362efb6c9f0.exe 872 783032c39a1b128532724362efb6c9f0.exe 872 783032c39a1b128532724362efb6c9f0.exe 872 783032c39a1b128532724362efb6c9f0.exe 872 783032c39a1b128532724362efb6c9f0.exe 872 783032c39a1b128532724362efb6c9f0.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 872 783032c39a1b128532724362efb6c9f0.exe Token: SeDebugPrivilege 872 783032c39a1b128532724362efb6c9f0.exe Token: SeDebugPrivilege 872 783032c39a1b128532724362efb6c9f0.exe Token: SeShutdownPrivilege 3520 Explorer.EXE Token: SeCreatePagefilePrivilege 3520 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3520 Explorer.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 872 wrote to memory of 3520 872 783032c39a1b128532724362efb6c9f0.exe 74 PID 872 wrote to memory of 3520 872 783032c39a1b128532724362efb6c9f0.exe 74
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\783032c39a1b128532724362efb6c9f0.exe"C:\Users\Admin\AppData\Local\Temp\783032c39a1b128532724362efb6c9f0.exe"2⤵
- Registers COM server for autorun
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:872
-