Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
174s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 04:35
Static task
static1
Behavioral task
behavioral1
Sample
2866667f8a51f15b5a750d7e5301c9d8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2866667f8a51f15b5a750d7e5301c9d8.exe
Resource
win10v2004-20231215-en
General
-
Target
2866667f8a51f15b5a750d7e5301c9d8.exe
-
Size
100KB
-
MD5
2866667f8a51f15b5a750d7e5301c9d8
-
SHA1
0de2f55ebbd23e676fb27383cd1ebf4b2c7fb672
-
SHA256
bb045c59bb4753ea894b4ef131fc7bc3dd3ca525b0ca5dfaa5665fe737a7b7cd
-
SHA512
29c3f5df1bea7d127447dcaf1587fdbf79478374ccea568c9336d19bc0d413b5b089c121cbf314bcb24de5847c79377d19514dca414b5cbb177533c3c63b128b
-
SSDEEP
1536:mayt3u/g1bJjRroLVPjXCDw+/MO8zCzhiSayt3qyVjMoRPWn/sV:ma2tJNroLVrC78zEiSa2qyjTWg
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation 2866667f8a51f15b5a750d7e5301c9d8.exe -
Executes dropped EXE 1 IoCs
pid Process 3016 csrss.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 3016 set thread context of 2760 3016 csrss.exe 94 PID 3016 set thread context of 0 3016 csrss.exe PID 3016 set thread context of 0 3016 csrss.exe PID 3016 set thread context of 0 3016 csrss.exe PID 3016 set thread context of 0 3016 csrss.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files\Common Files\microsoft shared\Britney Spears.mp3.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Britney Spears.mp3.exe svchost.exe File created C:\Program Files\Common Files\microsoft shared\Source Engine\Ahead Nero 8.pif svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\Ahead Nero 8.pif svchost.exe File created C:\Program Files\dotnet\shared\Doom 3 release 2.exe svchost.exe File opened for modification C:\Program Files\dotnet\shared\Doom 3 release 2.exe svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\csrss.exe 2866667f8a51f15b5a750d7e5301c9d8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSystemtimePrivilege 1612 2866667f8a51f15b5a750d7e5301c9d8.exe Token: SeSystemtimePrivilege 1612 2866667f8a51f15b5a750d7e5301c9d8.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1612 wrote to memory of 3016 1612 2866667f8a51f15b5a750d7e5301c9d8.exe 95 PID 1612 wrote to memory of 3016 1612 2866667f8a51f15b5a750d7e5301c9d8.exe 95 PID 1612 wrote to memory of 3016 1612 2866667f8a51f15b5a750d7e5301c9d8.exe 95 PID 3016 wrote to memory of 2760 3016 csrss.exe 94 PID 3016 wrote to memory of 2760 3016 csrss.exe 94 PID 3016 wrote to memory of 2760 3016 csrss.exe 94 PID 3016 wrote to memory of 2760 3016 csrss.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\2866667f8a51f15b5a750d7e5301c9d8.exe"C:\Users\Admin\AppData\Local\Temp\2866667f8a51f15b5a750d7e5301c9d8.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\csrss.exe"C:\Windows\csrss.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3016
-
-
C:\Windows\SysWOW64\svchost.exesvchost C:\Windows\csrss.exe1⤵
- Drops file in Program Files directory
PID:2760