Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 02:44
Static task
static1
Behavioral task
behavioral1
Sample
24f951dcaa2809ecb6f035cb0b12aafa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
24f951dcaa2809ecb6f035cb0b12aafa.exe
Resource
win10v2004-20231222-en
General
-
Target
24f951dcaa2809ecb6f035cb0b12aafa.exe
-
Size
623KB
-
MD5
24f951dcaa2809ecb6f035cb0b12aafa
-
SHA1
2f4b4437d6d1673338314690f26f0e7da5967c0a
-
SHA256
1a87451a85c7b827c7f96c67dd9e1ba412677fa0037611699ce36b2781308de2
-
SHA512
541f865daa0c16d094813b15caea91f1056c0981e74b13652b2984ecb3dd5b4f1d62e84c333fbf7db53c2aef3439ba21a2e25a4c9e4611bb317aed7c7105c1bd
-
SSDEEP
12288:W/pmxj3G/wxxAeFSZMCM2cjnt+m/SS2qzjqWiaiueAQPfXUlJdmklY:W/gxj0OxAeFvCIn0mAqHHbQPf0dmke
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3540 1430881320.exe -
Loads dropped DLL 2 IoCs
pid Process 4328 24f951dcaa2809ecb6f035cb0b12aafa.exe 4328 24f951dcaa2809ecb6f035cb0b12aafa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process 2052 3540 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2192 wmic.exe Token: SeSecurityPrivilege 2192 wmic.exe Token: SeTakeOwnershipPrivilege 2192 wmic.exe Token: SeLoadDriverPrivilege 2192 wmic.exe Token: SeSystemProfilePrivilege 2192 wmic.exe Token: SeSystemtimePrivilege 2192 wmic.exe Token: SeProfSingleProcessPrivilege 2192 wmic.exe Token: SeIncBasePriorityPrivilege 2192 wmic.exe Token: SeCreatePagefilePrivilege 2192 wmic.exe Token: SeBackupPrivilege 2192 wmic.exe Token: SeRestorePrivilege 2192 wmic.exe Token: SeShutdownPrivilege 2192 wmic.exe Token: SeDebugPrivilege 2192 wmic.exe Token: SeSystemEnvironmentPrivilege 2192 wmic.exe Token: SeRemoteShutdownPrivilege 2192 wmic.exe Token: SeUndockPrivilege 2192 wmic.exe Token: SeManageVolumePrivilege 2192 wmic.exe Token: 33 2192 wmic.exe Token: 34 2192 wmic.exe Token: 35 2192 wmic.exe Token: 36 2192 wmic.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4328 wrote to memory of 3540 4328 24f951dcaa2809ecb6f035cb0b12aafa.exe 38 PID 4328 wrote to memory of 3540 4328 24f951dcaa2809ecb6f035cb0b12aafa.exe 38 PID 4328 wrote to memory of 3540 4328 24f951dcaa2809ecb6f035cb0b12aafa.exe 38 PID 3540 wrote to memory of 2192 3540 1430881320.exe 22 PID 3540 wrote to memory of 2192 3540 1430881320.exe 22 PID 3540 wrote to memory of 2192 3540 1430881320.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\24f951dcaa2809ecb6f035cb0b12aafa.exe"C:\Users\Admin\AppData\Local\Temp\24f951dcaa2809ecb6f035cb0b12aafa.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\1430881320.exeC:\Users\Admin\AppData\Local\Temp\1430881320.exe 6|8|2|4|5|8|4|9|1|1|8 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2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3540
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81704438212.txt bios get serialnumber1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2192
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3540 -ip 35401⤵PID:4472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3540 -s 9161⤵
- Program crash
PID:2052
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81704438212.txt bios get version1⤵PID:1668
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81704438212.txt bios get version1⤵PID:1676
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81704438212.txt bios get version1⤵PID:2172
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic /output:C:\Users\Admin\AppData\Local\Temp\81704438212.txt bios get version1⤵PID:1308