Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
155s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 06:05
Static task
static1
Behavioral task
behavioral1
Sample
10a2dc48fb092b51d5eb990f1e8d5987.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
10a2dc48fb092b51d5eb990f1e8d5987.exe
Resource
win10v2004-20231215-en
General
-
Target
10a2dc48fb092b51d5eb990f1e8d5987.exe
-
Size
24KB
-
MD5
10a2dc48fb092b51d5eb990f1e8d5987
-
SHA1
556735cd82d6e1ed6f829835abc77d8c4d8415c0
-
SHA256
fb20b92d6f3db75e242988e35c7fd0c573bbadce7314eb35c1bfbe78aab25a72
-
SHA512
e65e7028548960bb511581938bc6dd651eae8efd1238b6081c7ce2904341d8a425af76622920f91d9f4e544f79ffab6bcbf1244fb054a394626bde9b54494e73
-
SSDEEP
384:E3eVES+/xwGkRKJelM61qmTTMVF9/q5G0:bGS+ZfbJeO8qYoAv
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" 10a2dc48fb092b51d5eb990f1e8d5987.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe 10a2dc48fb092b51d5eb990f1e8d5987.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 3384 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 4808 ipconfig.exe 2252 NETSTAT.EXE -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3384 tasklist.exe Token: SeDebugPrivilege 2252 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3192 10a2dc48fb092b51d5eb990f1e8d5987.exe 3192 10a2dc48fb092b51d5eb990f1e8d5987.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3192 wrote to memory of 4044 3192 10a2dc48fb092b51d5eb990f1e8d5987.exe 86 PID 3192 wrote to memory of 4044 3192 10a2dc48fb092b51d5eb990f1e8d5987.exe 86 PID 3192 wrote to memory of 4044 3192 10a2dc48fb092b51d5eb990f1e8d5987.exe 86 PID 4044 wrote to memory of 1620 4044 cmd.exe 88 PID 4044 wrote to memory of 1620 4044 cmd.exe 88 PID 4044 wrote to memory of 1620 4044 cmd.exe 88 PID 4044 wrote to memory of 4808 4044 cmd.exe 89 PID 4044 wrote to memory of 4808 4044 cmd.exe 89 PID 4044 wrote to memory of 4808 4044 cmd.exe 89 PID 4044 wrote to memory of 3384 4044 cmd.exe 91 PID 4044 wrote to memory of 3384 4044 cmd.exe 91 PID 4044 wrote to memory of 3384 4044 cmd.exe 91 PID 4044 wrote to memory of 4940 4044 cmd.exe 97 PID 4044 wrote to memory of 4940 4044 cmd.exe 97 PID 4044 wrote to memory of 4940 4044 cmd.exe 97 PID 4940 wrote to memory of 3324 4940 net.exe 95 PID 4940 wrote to memory of 3324 4940 net.exe 95 PID 4940 wrote to memory of 3324 4940 net.exe 95 PID 4044 wrote to memory of 2252 4044 cmd.exe 96 PID 4044 wrote to memory of 2252 4044 cmd.exe 96 PID 4044 wrote to memory of 2252 4044 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\10a2dc48fb092b51d5eb990f1e8d5987.exe"C:\Users\Admin\AppData\Local\Temp\10a2dc48fb092b51d5eb990f1e8d5987.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\cmd.execmd /c set3⤵PID:1620
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:4808
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3384
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
-
C:\Windows\SysWOW64\net.exenet start3⤵
- Suspicious use of WriteProcessMemory
PID:4940
-
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start1⤵PID:3324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD56d2197a521241b9d89c8a29fc5715054
SHA14b40bef6954820fce3b6b4f07cd273f82beea3b6
SHA25633715373c6c406e95e01b0301ebd7631d00f132921afde0be82bbe53a315d152
SHA512e29b41693e29263432c3252e01af720d2bb8c80fc49cb6356e3b234776ff8bc8270e55934525d698add5b37a7b47961dfba064b42ffaa4a2933022a65de4bdad