Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
160s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 02:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
24b349e1a00ac2915eb3b4d45954eb9f.exe
Resource
win7-20231129-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
24b349e1a00ac2915eb3b4d45954eb9f.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
24b349e1a00ac2915eb3b4d45954eb9f.exe
-
Size
288KB
-
MD5
24b349e1a00ac2915eb3b4d45954eb9f
-
SHA1
d81dc3bd102244dcd6f1809a04719707b495b3f8
-
SHA256
8635f2e3d091fba3beed9f36d9b3ca6bbf49a9d1b6209c8468409d4c5c1ff858
-
SHA512
0a45ea3b048638e13028833ed526ce81b6fce332fe193b484e018cbcdcf265e56933c55bdb698b78216154b6b4875fe8334905ecc1431a7c4b9a203df7841a0a
-
SSDEEP
768:iQEHEMiN/5IP/90skbrPTbCDO0Yw61lsZh0+ZT9F1:i4SiskKS0I1lsjt9b
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinits.exe" 24b349e1a00ac2915eb3b4d45954eb9f.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\userinits.exe 24b349e1a00ac2915eb3b4d45954eb9f.exe File opened for modification C:\Windows\SysWOW64\userinits.exe 24b349e1a00ac2915eb3b4d45954eb9f.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files\ATI Technologies\ATI Control Panel\atciptaxx.exe 24b349e1a00ac2915eb3b4d45954eb9f.exe File created C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe 24b349e1a00ac2915eb3b4d45954eb9f.exe File opened for modification C:\Program Files\ATI Technologies\ATI Control Panel\atiptaxx.exe 24b349e1a00ac2915eb3b4d45954eb9f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3564 24b349e1a00ac2915eb3b4d45954eb9f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\24b349e1a00ac2915eb3b4d45954eb9f.exe"C:\Users\Admin\AppData\Local\Temp\24b349e1a00ac2915eb3b4d45954eb9f.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3564