Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 01:38
Static task
static1
Behavioral task
behavioral1
Sample
404ebe64b33d2f01b100cc10ba84a97ac79107aac5a88948a3820161e11a86ae.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
404ebe64b33d2f01b100cc10ba84a97ac79107aac5a88948a3820161e11a86ae.exe
Resource
win10v2004-20231215-en
General
-
Target
404ebe64b33d2f01b100cc10ba84a97ac79107aac5a88948a3820161e11a86ae.exe
-
Size
196KB
-
MD5
b70aaa5c8c7dd1d5d57649b601127693
-
SHA1
745598aa07e6c4541747c57ad52e604a9cbbd02d
-
SHA256
404ebe64b33d2f01b100cc10ba84a97ac79107aac5a88948a3820161e11a86ae
-
SHA512
869e9b82b4ae1d72e91acaa36d9c077e604f731370ac8124a8d3c8b8cb9b3bd4041dafedcb2b7f3c86d3e4dbfb5bd1777d69e9de1ba0ce4c8404f9aeaecd9def
-
SSDEEP
3072:c29+hIl2epp1q5GWp1icKAArDZz4N9GhbkrNEk1wgXDnsZH4lLsEff/J:DwAwp0yN90QEhiwZH4lQEff/
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 404ebe64b33d2f01b100cc10ba84a97ac79107aac5a88948a3820161e11a86ae.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 4596 reg.exe -
Suspicious behavior: LoadsDriver 10 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 656 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 408 cmstp.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4980 wrote to memory of 408 4980 404ebe64b33d2f01b100cc10ba84a97ac79107aac5a88948a3820161e11a86ae.exe 100 PID 4980 wrote to memory of 408 4980 404ebe64b33d2f01b100cc10ba84a97ac79107aac5a88948a3820161e11a86ae.exe 100 PID 408 wrote to memory of 4596 408 cmstp.exe 102 PID 408 wrote to memory of 4596 408 cmstp.exe 102 PID 408 wrote to memory of 4056 408 cmstp.exe 105 PID 408 wrote to memory of 4056 408 cmstp.exe 105 PID 4056 wrote to memory of 4292 4056 cmd.exe 106 PID 4056 wrote to memory of 4292 4056 cmd.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\404ebe64b33d2f01b100cc10ba84a97ac79107aac5a88948a3820161e11a86ae.exe"C:\Users\Admin\AppData\Local\Temp\404ebe64b33d2f01b100cc10ba84a97ac79107aac5a88948a3820161e11a86ae.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Windows\SYSTEM32\cmstp.execmstp.exe /s /su /ns 90ff0063-d143-484d-a0a6-51a6491b859e.inf2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\SYSTEM32\reg.exereg add HKLM\SYSTEM\CurrentControlSet\Services\RasMan\PPP\EAP\13 /v SelectSelfSignedCert /t REG_DWORD /d 1 /f3⤵
- Modifies registry key
PID:4596
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c certutil -addstore root %APPDATA%\Microsoft\Network\Connections\Cm\90ff0063-d143-484d-a0a6-51a6491b859e\90ff0063-d143-484d-a0a6-51a6491b859e.cer3⤵
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\system32\certutil.execertutil -addstore root C:\Users\Admin\AppData\Roaming\Microsoft\Network\Connections\Cm\90ff0063-d143-484d-a0a6-51a6491b859e\90ff0063-d143-484d-a0a6-51a6491b859e.cer4⤵PID:4292
-
-
-