Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 06:45

General

  • Target

    115ca675f0098d320aeeaca88e9b248c.exe

  • Size

    52KB

  • MD5

    115ca675f0098d320aeeaca88e9b248c

  • SHA1

    c254ec13ab67c6c3b5fdbeee8151a1c5544e95b3

  • SHA256

    fa26c4168f6518c8c4169e170046652565718984f29b6cf78f38f993bbf043b6

  • SHA512

    c2fdff3229f61ba68eaa3417c5de6eefef2625c382d51dc38c624e936073bf03ca64a3bbed7ec9da2b3ecc84f4ee0723a2ff234e46e805d67117fa3dfa9cc75e

  • SSDEEP

    768:Yl0RWNvjjZpolW1dmaW4KpQDxdjjmADoOEsxzWM6H8A7DOEAc:cAQbcy0Oc

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Stops running service(s) 3 TTPs
  • Drops file in System32 directory 2 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Runs net.exe
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\115ca675f0098d320aeeaca88e9b248c.exe
    "C:\Users\Admin\AppData\Local\Temp\115ca675f0098d320aeeaca88e9b248c.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Drops file in System32 directory
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Windows\SysWOW64\net.exe
      net stop wscsvc
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2632
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop wscsvc
        3⤵
          PID:2744
      • C:\Windows\SysWOW64\net.exe
        net stop sharedaccess
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1912
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop sharedaccess
          3⤵
            PID:2760
        • C:\Windows\SysWOW64\sc.exe
          sc delete wscsvc
          2⤵
          • Launches sc.exe
          PID:2780
        • C:\Windows\SysWOW64\sc.exe
          sc delete sharedaccess
          2⤵
          • Launches sc.exe
          PID:2684

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Cab96D5.tmp

        Filesize

        65KB

        MD5

        ac05d27423a85adc1622c714f2cb6184

        SHA1

        b0fe2b1abddb97837ea0195be70ab2ff14d43198

        SHA256

        c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

        SHA512

        6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

      • C:\Users\Admin\AppData\Local\Temp\Tar9755.tmp

        Filesize

        171KB

        MD5

        9c0c641c06238516f27941aa1166d427

        SHA1

        64cd549fb8cf014fcd9312aa7a5b023847b6c977

        SHA256

        4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

        SHA512

        936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

      • C:\Windows\SysWOW64\svcctrl.exe

        Filesize

        41KB

        MD5

        8d5e53fc7b8b425a6f652d594b0e92d3

        SHA1

        b791e8d13ee985b7ccf1d2b6a99d74fc0bf2d542

        SHA256

        5f8b89b370cb0ba73505da4b4c214b73f27dc2181a24a610226ff1560a58610c

        SHA512

        cfab526a65a5f3ad744e28226cdf2238d31478902caf6e37ab3293e959bb944c3edadc655aa3403bd0057540fbe9026f7385f8f5f1124b832c5eb2789308e4b4