Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
195s -
max time network
213s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 13:21
Static task
static1
Behavioral task
behavioral1
Sample
19d2215ff2a61f2c5a5cb88dc7896115.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
19d2215ff2a61f2c5a5cb88dc7896115.exe
Resource
win10v2004-20231215-en
General
-
Target
19d2215ff2a61f2c5a5cb88dc7896115.exe
-
Size
24KB
-
MD5
19d2215ff2a61f2c5a5cb88dc7896115
-
SHA1
8d889186c2848091b74e40780a50668404cce3f9
-
SHA256
afccc63ae40d656ecd3e96dd8238026839b81e1b5cae917fe74e2cd3c2c60102
-
SHA512
a0a90840f3874cff382d612b03bf71c42c2b690ca63f8d206e986508ee7bd032c7964e9f5a6cc242f5d780d6be096489cea6c11896e7f9e9514d5050a4654717
-
SSDEEP
384:E3eVES+/xwGkRKJilM61qmTTMVF9/q5c0:bGS+ZfbJiO8qYoAN
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" 19d2215ff2a61f2c5a5cb88dc7896115.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe 19d2215ff2a61f2c5a5cb88dc7896115.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1052 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 1176 ipconfig.exe 2936 NETSTAT.EXE -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1052 tasklist.exe Token: SeDebugPrivilege 2936 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4092 19d2215ff2a61f2c5a5cb88dc7896115.exe 4092 19d2215ff2a61f2c5a5cb88dc7896115.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4092 wrote to memory of 4960 4092 19d2215ff2a61f2c5a5cb88dc7896115.exe 91 PID 4092 wrote to memory of 4960 4092 19d2215ff2a61f2c5a5cb88dc7896115.exe 91 PID 4092 wrote to memory of 4960 4092 19d2215ff2a61f2c5a5cb88dc7896115.exe 91 PID 4960 wrote to memory of 644 4960 cmd.exe 93 PID 4960 wrote to memory of 644 4960 cmd.exe 93 PID 4960 wrote to memory of 644 4960 cmd.exe 93 PID 4960 wrote to memory of 1176 4960 cmd.exe 94 PID 4960 wrote to memory of 1176 4960 cmd.exe 94 PID 4960 wrote to memory of 1176 4960 cmd.exe 94 PID 4960 wrote to memory of 1052 4960 cmd.exe 97 PID 4960 wrote to memory of 1052 4960 cmd.exe 97 PID 4960 wrote to memory of 1052 4960 cmd.exe 97 PID 4960 wrote to memory of 4672 4960 cmd.exe 98 PID 4960 wrote to memory of 4672 4960 cmd.exe 98 PID 4960 wrote to memory of 4672 4960 cmd.exe 98 PID 4672 wrote to memory of 2176 4672 net.exe 99 PID 4672 wrote to memory of 2176 4672 net.exe 99 PID 4672 wrote to memory of 2176 4672 net.exe 99 PID 4960 wrote to memory of 2936 4960 cmd.exe 100 PID 4960 wrote to memory of 2936 4960 cmd.exe 100 PID 4960 wrote to memory of 2936 4960 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\19d2215ff2a61f2c5a5cb88dc7896115.exe"C:\Users\Admin\AppData\Local\Temp\19d2215ff2a61f2c5a5cb88dc7896115.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\cmd.execmd /c set3⤵PID:644
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:1176
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-
C:\Windows\SysWOW64\net.exenet start3⤵
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start4⤵PID:2176
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-