Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 05:01
Static task
static1
Behavioral task
behavioral1
Sample
293178bffa66fd519b4a33492344a03d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
293178bffa66fd519b4a33492344a03d.exe
Resource
win10v2004-20231215-en
General
-
Target
293178bffa66fd519b4a33492344a03d.exe
-
Size
64KB
-
MD5
293178bffa66fd519b4a33492344a03d
-
SHA1
cc4efa0f65c7a23c88281e1b354648feff4a7188
-
SHA256
f34e7e8533ba668ee17c51299df695b1ba71e383b4a3575027b7f1d9fbd918dc
-
SHA512
7dfdd7fd57d41c40c5057dc15c84f8a9fef060f797842cdeda0ce1806c51accdd58b218316c24847d455c56e7df643b874ef45f942332a80753a082a5ddbd73f
-
SSDEEP
768:7aND5oKh4khWgoQ9lTvUNsE92tt7LYoQ3E38sdXzxn81XgX/GPiLu/T7GTm:7aND5oqxlTv8se0B8oQ0FX4XgX/G
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 772 cmd.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\fagianom.pbk 293178bffa66fd519b4a33492344a03d.exe File opened for modification C:\Windows\SysWOW64\fagianom.pbk 293178bffa66fd519b4a33492344a03d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2292 293178bffa66fd519b4a33492344a03d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2292 wrote to memory of 772 2292 293178bffa66fd519b4a33492344a03d.exe 28 PID 2292 wrote to memory of 772 2292 293178bffa66fd519b4a33492344a03d.exe 28 PID 2292 wrote to memory of 772 2292 293178bffa66fd519b4a33492344a03d.exe 28 PID 2292 wrote to memory of 772 2292 293178bffa66fd519b4a33492344a03d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\293178bffa66fd519b4a33492344a03d.exe"C:\Users\Admin\AppData\Local\Temp\293178bffa66fd519b4a33492344a03d.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\293178~1.EXE > nul2⤵
- Deletes itself
PID:772
-