Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 08:12
Static task
static1
Behavioral task
behavioral1
Sample
13176cea7b40e46fa45932494886b5f6.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
13176cea7b40e46fa45932494886b5f6.exe
Resource
win10v2004-20231215-en
General
-
Target
13176cea7b40e46fa45932494886b5f6.exe
-
Size
112KB
-
MD5
13176cea7b40e46fa45932494886b5f6
-
SHA1
6295ce4a287e110d34eda671413142bc45cfcdb6
-
SHA256
5fc47f28ce7cbcb8d143d40ca16ce66cf1c2485e6952210577b65089b15b83f3
-
SHA512
6056ba0696a6535c0d40902299033ef57755dd917a7a9d0d42a398ac5d4f9ff19aea8730834d91fec134e9ba4c2a8572bcecc83d5723286e67a18164d4d19441
-
SSDEEP
3072:/19Cc3nckFtUJE4SRoept7Em2F8abPeROXbfZnW2lW9:/1tnckFeSvAFuJROVnWyW9
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1860 cmd.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\c_7382.nls 13176cea7b40e46fa45932494886b5f6.exe File opened for modification C:\Windows\SysWOW64\c_7382.nls 13176cea7b40e46fa45932494886b5f6.exe File created C:\Windows\SysWOW64\dllcache\ups.exe 13176cea7b40e46fa45932494886b5f6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 2436 13176cea7b40e46fa45932494886b5f6.exe Token: SeRestorePrivilege 2436 13176cea7b40e46fa45932494886b5f6.exe Token: SeIncBasePriorityPrivilege 2436 13176cea7b40e46fa45932494886b5f6.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2436 wrote to memory of 1860 2436 13176cea7b40e46fa45932494886b5f6.exe 28 PID 2436 wrote to memory of 1860 2436 13176cea7b40e46fa45932494886b5f6.exe 28 PID 2436 wrote to memory of 1860 2436 13176cea7b40e46fa45932494886b5f6.exe 28 PID 2436 wrote to memory of 1860 2436 13176cea7b40e46fa45932494886b5f6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\13176cea7b40e46fa45932494886b5f6.exe"C:\Users\Admin\AppData\Local\Temp\13176cea7b40e46fa45932494886b5f6.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\13176C~1.EXE2⤵
- Deletes itself
PID:1860
-