Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
159s -
max time network
187s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 00:44
Behavioral task
behavioral1
Sample
08f25af2c15de686932f61a4fe60d206.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
08f25af2c15de686932f61a4fe60d206.exe
Resource
win10v2004-20231215-en
General
-
Target
08f25af2c15de686932f61a4fe60d206.exe
-
Size
29KB
-
MD5
08f25af2c15de686932f61a4fe60d206
-
SHA1
33963c77d471294635a7ad321e2e49521b3eb383
-
SHA256
e1371b7ca6ff9bbbfb4bb56d3bd037ff261687a0218953d877066ffb6a2274ff
-
SHA512
caf7e32c661e37635935fc8e0640f9b6cb3e88b72be013b645464260e5cad9521dd1a3baaf024321f5ab3bc069df2cfab9bb536be2f794fd5dd0410c2dfc67f3
-
SSDEEP
768:jk7Ajy1o0J422hHbJHXevS+tzxNFa2AFagUGbzzn4Lgq:jc4xC2hH5XYS+ON517n4Eq
Malware Config
Signatures
-
Sets file execution options in registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe 08f25af2c15de686932f61a4fe60d206.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe\Debugger = "services.exe" 08f25af2c15de686932f61a4fe60d206.exe -
Executes dropped EXE 1 IoCs
pid Process 2584 ~259456635.tmpe -
Loads dropped DLL 2 IoCs
pid Process 2672 08f25af2c15de686932f61a4fe60d206.exe 2672 08f25af2c15de686932f61a4fe60d206.exe -
resource yara_rule behavioral1/memory/2672-0-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2672-4-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/2672-16-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2672 08f25af2c15de686932f61a4fe60d206.exe 2672 08f25af2c15de686932f61a4fe60d206.exe 2672 08f25af2c15de686932f61a4fe60d206.exe 2672 08f25af2c15de686932f61a4fe60d206.exe 2672 08f25af2c15de686932f61a4fe60d206.exe 2672 08f25af2c15de686932f61a4fe60d206.exe 2584 ~259456635.tmpe 2584 ~259456635.tmpe 2584 ~259456635.tmpe 2584 ~259456635.tmpe 2584 ~259456635.tmpe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 468 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2672 08f25af2c15de686932f61a4fe60d206.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2684 2672 08f25af2c15de686932f61a4fe60d206.exe 27 PID 2672 wrote to memory of 2684 2672 08f25af2c15de686932f61a4fe60d206.exe 27 PID 2672 wrote to memory of 2684 2672 08f25af2c15de686932f61a4fe60d206.exe 27 PID 2672 wrote to memory of 2684 2672 08f25af2c15de686932f61a4fe60d206.exe 27 PID 2672 wrote to memory of 2584 2672 08f25af2c15de686932f61a4fe60d206.exe 31 PID 2672 wrote to memory of 2584 2672 08f25af2c15de686932f61a4fe60d206.exe 31 PID 2672 wrote to memory of 2584 2672 08f25af2c15de686932f61a4fe60d206.exe 31 PID 2672 wrote to memory of 2584 2672 08f25af2c15de686932f61a4fe60d206.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\08f25af2c15de686932f61a4fe60d206.exe"C:\Users\Admin\AppData\Local\Temp\08f25af2c15de686932f61a4fe60d206.exe"1⤵
- Sets file execution options in registry
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\cmd.execmd2⤵PID:2684
-
-
C:\Users\Admin\AppData\Local\Temp\~259456635.tmpeC:\Users\Admin\AppData\Local\Temp\~259456635.tmpe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5826132c4b9f500a26274a8f589415b2d
SHA105f0990663ca2b31d8b320bccb57e721c4f3fdcf
SHA2566e24832a7629050504c00b5ed93b0e78c37151352975b756d2a3365797ac695f
SHA51257788e514695f82e6916fec3718e876813d79ec4137f4c43fcb28e47cd3f818285329ee90a5bc4d3a9d1534781f989f5e464cd02d51afbb6efcd728794f71c74