Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 11:47
Static task
static1
Behavioral task
behavioral1
Sample
177aa965419f5ca5f0f69010f0bb234a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
177aa965419f5ca5f0f69010f0bb234a.exe
Resource
win10v2004-20231222-en
General
-
Target
177aa965419f5ca5f0f69010f0bb234a.exe
-
Size
24KB
-
MD5
177aa965419f5ca5f0f69010f0bb234a
-
SHA1
461ad3b715dc50326391f28e688a26472b4fb333
-
SHA256
ceac26f43e094541a4abb85c3aedbdf3fdf8d5bcc89a06ae8d6e72699c47ad31
-
SHA512
04a92af0a051e7d35f95b5f8439abc25674029c62f69feb32440e28e9c052f73029abddb82e5afa433c83fc2204eb52f9504c766bb2bf37fc8b63196e2f0762c
-
SSDEEP
384:E3eVES+/xwGkRKJilM61qmTTMVF9/q5j0:bGS+ZfbJiO8qYoAI
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" 177aa965419f5ca5f0f69010f0bb234a.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe 177aa965419f5ca5f0f69010f0bb234a.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4064 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 348 NETSTAT.EXE 4840 ipconfig.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4064 tasklist.exe Token: SeDebugPrivilege 348 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4488 177aa965419f5ca5f0f69010f0bb234a.exe 4488 177aa965419f5ca5f0f69010f0bb234a.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4488 wrote to memory of 4992 4488 177aa965419f5ca5f0f69010f0bb234a.exe 86 PID 4488 wrote to memory of 4992 4488 177aa965419f5ca5f0f69010f0bb234a.exe 86 PID 4488 wrote to memory of 4992 4488 177aa965419f5ca5f0f69010f0bb234a.exe 86 PID 4992 wrote to memory of 1496 4992 cmd.exe 88 PID 4992 wrote to memory of 1496 4992 cmd.exe 88 PID 4992 wrote to memory of 1496 4992 cmd.exe 88 PID 4992 wrote to memory of 4840 4992 cmd.exe 89 PID 4992 wrote to memory of 4840 4992 cmd.exe 89 PID 4992 wrote to memory of 4840 4992 cmd.exe 89 PID 4992 wrote to memory of 4064 4992 cmd.exe 90 PID 4992 wrote to memory of 4064 4992 cmd.exe 90 PID 4992 wrote to memory of 4064 4992 cmd.exe 90 PID 4992 wrote to memory of 2820 4992 cmd.exe 92 PID 4992 wrote to memory of 2820 4992 cmd.exe 92 PID 4992 wrote to memory of 2820 4992 cmd.exe 92 PID 2820 wrote to memory of 2208 2820 net.exe 94 PID 2820 wrote to memory of 2208 2820 net.exe 94 PID 2820 wrote to memory of 2208 2820 net.exe 94 PID 4992 wrote to memory of 348 4992 cmd.exe 95 PID 4992 wrote to memory of 348 4992 cmd.exe 95 PID 4992 wrote to memory of 348 4992 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\177aa965419f5ca5f0f69010f0bb234a.exe"C:\Users\Admin\AppData\Local\Temp\177aa965419f5ca5f0f69010f0bb234a.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\cmd.execmd /c set3⤵PID:1496
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:4840
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4064
-
-
C:\Windows\SysWOW64\net.exenet start3⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start4⤵PID:2208
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:348
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD52c9de0bcdcba7563f1618250b625ec06
SHA12bd9df5bc2ff8dfecd46c8a05204318b42903aab
SHA256f2487b349bf70b061ea02993f1a08094e5f425b0d44489f44fa1edb15db5d172
SHA5129da2bf72a57f38199f862b01e3501714497af142d52e470003294f697deb45170fa2b1006fe49546d8bcdd8275c1a49ddcf82b296c49112374a74d3bbcb5e3d5