Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 02:52
Static task
static1
Behavioral task
behavioral1
Sample
253d09978322865776341262fb6faa61.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
253d09978322865776341262fb6faa61.exe
Resource
win10v2004-20231215-en
General
-
Target
253d09978322865776341262fb6faa61.exe
-
Size
164KB
-
MD5
253d09978322865776341262fb6faa61
-
SHA1
76163271afb7497a0f47ba78553cc8dfa5ec9f4b
-
SHA256
fdbd3303441f7c9824396c4ddb6264985e222b03f7c81461437bd1f91bf22452
-
SHA512
c0f1093a82907ce7ffb3c8e5922d4a1931b4ad724b42c993714d540720aa05c9f008ab04c82fcdec66173a94a89800a185cd9b1f7e132146210a1b6e922c2266
-
SSDEEP
3072:vecfyc98W/w3w4wTDQo6vEaZ97fwjwNGL9w0LTGXgY6/4WtG9dqAg4dJ2RlDEY:vecfx98W/wgB0vEa/zGCGCXM4UOdqjE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 748 logon.com -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\logon.com = "C:\\Windows\\system32\\logon.com" 253d09978322865776341262fb6faa61.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\logon.com logon.com File created C:\Windows\SysWOW64\logon.com 253d09978322865776341262fb6faa61.exe File opened for modification C:\Windows\SysWOW64\logon.com 253d09978322865776341262fb6faa61.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3624 253d09978322865776341262fb6faa61.exe Token: SeIncBasePriorityPrivilege 3624 253d09978322865776341262fb6faa61.exe Token: SeIncBasePriorityPrivilege 748 logon.com Token: SeIncBasePriorityPrivilege 748 logon.com -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3624 wrote to memory of 748 3624 253d09978322865776341262fb6faa61.exe 90 PID 3624 wrote to memory of 748 3624 253d09978322865776341262fb6faa61.exe 90 PID 3624 wrote to memory of 748 3624 253d09978322865776341262fb6faa61.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\253d09978322865776341262fb6faa61.exe"C:\Users\Admin\AppData\Local\Temp\253d09978322865776341262fb6faa61.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\SysWOW64\logon.comC:\Windows\system32\logon.com2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:748
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164KB
MD5253d09978322865776341262fb6faa61
SHA176163271afb7497a0f47ba78553cc8dfa5ec9f4b
SHA256fdbd3303441f7c9824396c4ddb6264985e222b03f7c81461437bd1f91bf22452
SHA512c0f1093a82907ce7ffb3c8e5922d4a1931b4ad724b42c993714d540720aa05c9f008ab04c82fcdec66173a94a89800a185cd9b1f7e132146210a1b6e922c2266