Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28/12/2023, 20:37
Static task
static1
Behavioral task
behavioral1
Sample
f67070da1c1c5c9eddb67f22fda72396.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f67070da1c1c5c9eddb67f22fda72396.exe
Resource
win10v2004-20231215-en
General
-
Target
f67070da1c1c5c9eddb67f22fda72396.exe
-
Size
315KB
-
MD5
f67070da1c1c5c9eddb67f22fda72396
-
SHA1
b0d47e0e51b5a18f73f4a98abaa3d2938a4c643f
-
SHA256
a7561e7435b0319079f97f4b80ecb9bb471f2d613f57b91cfb3ea6b1b2568db2
-
SHA512
d00491a04adc13bfe8da00fbb5bd5a96b59920374144fd3199fceeabfb8f06b121ded175272f1fbd44bc1ac3a5cc89953218936ee721b8c2d753ddbf6ecd5908
-
SSDEEP
6144:s5ZDGVDiipZrMyALmkMP2VCw24XgkTPPSSOn7CdevS22P4c:s5ZyVDiWU9yj+3s7Cdy2
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3024 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2712 pdsafwjog.exe -
Loads dropped DLL 3 IoCs
pid Process 3024 cmd.exe 2712 pdsafwjog.exe 2712 pdsafwjog.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 3004 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2668 PING.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2712 pdsafwjog.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2712 pdsafwjog.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3004 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2712 pdsafwjog.exe 2712 pdsafwjog.exe 2712 pdsafwjog.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2712 pdsafwjog.exe 2712 pdsafwjog.exe 2712 pdsafwjog.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3060 wrote to memory of 3024 3060 f67070da1c1c5c9eddb67f22fda72396.exe 28 PID 3060 wrote to memory of 3024 3060 f67070da1c1c5c9eddb67f22fda72396.exe 28 PID 3060 wrote to memory of 3024 3060 f67070da1c1c5c9eddb67f22fda72396.exe 28 PID 3060 wrote to memory of 3024 3060 f67070da1c1c5c9eddb67f22fda72396.exe 28 PID 3024 wrote to memory of 3004 3024 cmd.exe 30 PID 3024 wrote to memory of 3004 3024 cmd.exe 30 PID 3024 wrote to memory of 3004 3024 cmd.exe 30 PID 3024 wrote to memory of 3004 3024 cmd.exe 30 PID 3024 wrote to memory of 2668 3024 cmd.exe 31 PID 3024 wrote to memory of 2668 3024 cmd.exe 31 PID 3024 wrote to memory of 2668 3024 cmd.exe 31 PID 3024 wrote to memory of 2668 3024 cmd.exe 31 PID 3024 wrote to memory of 2712 3024 cmd.exe 33 PID 3024 wrote to memory of 2712 3024 cmd.exe 33 PID 3024 wrote to memory of 2712 3024 cmd.exe 33 PID 3024 wrote to memory of 2712 3024 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\f67070da1c1c5c9eddb67f22fda72396.exe"C:\Users\Admin\AppData\Local\Temp\f67070da1c1c5c9eddb67f22fda72396.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 3060 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\f67070da1c1c5c9eddb67f22fda72396.exe" & start C:\Users\Admin\AppData\Local\PDSAFW~1.EXE -f2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 30603⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3004
-
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.13⤵
- Runs ping.exe
PID:2668
-
-
C:\Users\Admin\AppData\Local\pdsafwjog.exeC:\Users\Admin\AppData\Local\PDSAFW~1.EXE -f3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2712
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
315KB
MD5f67070da1c1c5c9eddb67f22fda72396
SHA1b0d47e0e51b5a18f73f4a98abaa3d2938a4c643f
SHA256a7561e7435b0319079f97f4b80ecb9bb471f2d613f57b91cfb3ea6b1b2568db2
SHA512d00491a04adc13bfe8da00fbb5bd5a96b59920374144fd3199fceeabfb8f06b121ded175272f1fbd44bc1ac3a5cc89953218936ee721b8c2d753ddbf6ecd5908