Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 23:07
Static task
static1
Behavioral task
behavioral1
Sample
1f734d29cf2993ec66e579ca90cb003c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1f734d29cf2993ec66e579ca90cb003c.exe
Resource
win10v2004-20231222-en
General
-
Target
1f734d29cf2993ec66e579ca90cb003c.exe
-
Size
24KB
-
MD5
1f734d29cf2993ec66e579ca90cb003c
-
SHA1
d3cd997815e53b646e72a71889ef757220e318f5
-
SHA256
10c40ca72f76a46fe1854c35d663fe86fe3b8b835f8689362cc269d6305a1a2f
-
SHA512
fdae6b463c8156039ff1d8b3f364757c1375537e6d37582fc26e261c69147a219ac5a18711c3bb997bf377847b874363543e439af7d77f49c9a6544c6b3c2b49
-
SSDEEP
384:E3eVES+/xwGkRKJVPlM61qmTTMVF9/q5Z0:bGS+ZfbJVPO8qYoAm
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" 1f734d29cf2993ec66e579ca90cb003c.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe 1f734d29cf2993ec66e579ca90cb003c.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2176 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 3052 ipconfig.exe 2688 NETSTAT.EXE -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2176 tasklist.exe Token: SeDebugPrivilege 2688 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2928 1f734d29cf2993ec66e579ca90cb003c.exe 2928 1f734d29cf2993ec66e579ca90cb003c.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2992 2928 1f734d29cf2993ec66e579ca90cb003c.exe 16 PID 2928 wrote to memory of 2992 2928 1f734d29cf2993ec66e579ca90cb003c.exe 16 PID 2928 wrote to memory of 2992 2928 1f734d29cf2993ec66e579ca90cb003c.exe 16 PID 2928 wrote to memory of 2992 2928 1f734d29cf2993ec66e579ca90cb003c.exe 16 PID 2992 wrote to memory of 2872 2992 cmd.exe 23 PID 2992 wrote to memory of 2872 2992 cmd.exe 23 PID 2992 wrote to memory of 2872 2992 cmd.exe 23 PID 2992 wrote to memory of 2872 2992 cmd.exe 23 PID 2992 wrote to memory of 3052 2992 cmd.exe 17 PID 2992 wrote to memory of 3052 2992 cmd.exe 17 PID 2992 wrote to memory of 3052 2992 cmd.exe 17 PID 2992 wrote to memory of 3052 2992 cmd.exe 17 PID 2992 wrote to memory of 2176 2992 cmd.exe 18 PID 2992 wrote to memory of 2176 2992 cmd.exe 18 PID 2992 wrote to memory of 2176 2992 cmd.exe 18 PID 2992 wrote to memory of 2176 2992 cmd.exe 18 PID 2992 wrote to memory of 2676 2992 cmd.exe 22 PID 2992 wrote to memory of 2676 2992 cmd.exe 22 PID 2992 wrote to memory of 2676 2992 cmd.exe 22 PID 2992 wrote to memory of 2676 2992 cmd.exe 22 PID 2676 wrote to memory of 2680 2676 net.exe 20 PID 2676 wrote to memory of 2680 2676 net.exe 20 PID 2676 wrote to memory of 2680 2676 net.exe 20 PID 2676 wrote to memory of 2680 2676 net.exe 20 PID 2992 wrote to memory of 2688 2992 cmd.exe 21 PID 2992 wrote to memory of 2688 2992 cmd.exe 21 PID 2992 wrote to memory of 2688 2992 cmd.exe 21 PID 2992 wrote to memory of 2688 2992 cmd.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f734d29cf2993ec66e579ca90cb003c.exe"C:\Users\Admin\AppData\Local\Temp\1f734d29cf2993ec66e579ca90cb003c.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:3052
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2176
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
C:\Windows\SysWOW64\net.exenet start3⤵
- Suspicious use of WriteProcessMemory
PID:2676
-
-
C:\Windows\SysWOW64\cmd.execmd /c set3⤵PID:2872
-
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start1⤵PID:2680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5e5d0772300df6e4a2b8517bbbd42676f
SHA12fa35be964592fac95dbe109c5e002570ee87c88
SHA256417e38929c3de5a6ea4778122d0b1c9fd1037a971c4e60d6f21142b1605e88c4
SHA5129ea9585c2957a8cc55a04a0825a9608e2dc9b9af73397bee639a77c8d3e378aba8da4a23ba4eb803e50a9e4cb99f03e85ef59516e1dce08c3cff52f7cfc390f8