Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 11:42
Static task
static1
Behavioral task
behavioral1
Sample
40c4b11105db1386e30bc870183a6499.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
40c4b11105db1386e30bc870183a6499.exe
Resource
win10v2004-20231215-en
General
-
Target
40c4b11105db1386e30bc870183a6499.exe
-
Size
354KB
-
MD5
40c4b11105db1386e30bc870183a6499
-
SHA1
c91b01612d0a67a9200a6f0780d554a5c1e321fd
-
SHA256
ec93dd2c8432d31d3be69a3538a20fd344090246dd7289a2db829d9048ce9b5e
-
SHA512
70fb8f93c6c48cd890990ccb3a8ae85851ba44e94c294cf4aa1760bcdc20daae3e77ad381fbb699e1eb473223643d518f0c47a8955d9f1d700ace5128a575c59
-
SSDEEP
6144:I2pRrUqddTQZokHv1rQJvnRIAYjY35AiZkpoks5UF1Sf5jGPW2LdMgDbq6nk1/3i:IqUudBkP1UJZIIJpkDrF1SoP/dTBk1/3
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3216 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3752 X -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4256 set thread context of 3216 4256 40c4b11105db1386e30bc870183a6499.exe 101 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3752 X 3752 X -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 4256 40c4b11105db1386e30bc870183a6499.exe Token: SeShutdownPrivilege 3468 Explorer.EXE Token: SeCreatePagefilePrivilege 3468 Explorer.EXE Token: SeShutdownPrivilege 3468 Explorer.EXE Token: SeCreatePagefilePrivilege 3468 Explorer.EXE Token: SeShutdownPrivilege 3468 Explorer.EXE Token: SeCreatePagefilePrivilege 3468 Explorer.EXE Token: SeShutdownPrivilege 3468 Explorer.EXE Token: SeCreatePagefilePrivilege 3468 Explorer.EXE Token: SeShutdownPrivilege 3468 Explorer.EXE Token: SeCreatePagefilePrivilege 3468 Explorer.EXE Token: SeShutdownPrivilege 3468 Explorer.EXE Token: SeCreatePagefilePrivilege 3468 Explorer.EXE Token: SeShutdownPrivilege 3468 Explorer.EXE Token: SeCreatePagefilePrivilege 3468 Explorer.EXE Token: SeShutdownPrivilege 3468 Explorer.EXE Token: SeCreatePagefilePrivilege 3468 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3468 Explorer.EXE 3468 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3468 Explorer.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4256 wrote to memory of 3752 4256 40c4b11105db1386e30bc870183a6499.exe 92 PID 4256 wrote to memory of 3752 4256 40c4b11105db1386e30bc870183a6499.exe 92 PID 3752 wrote to memory of 3468 3752 X 48 PID 4256 wrote to memory of 3216 4256 40c4b11105db1386e30bc870183a6499.exe 101 PID 4256 wrote to memory of 3216 4256 40c4b11105db1386e30bc870183a6499.exe 101 PID 4256 wrote to memory of 3216 4256 40c4b11105db1386e30bc870183a6499.exe 101 PID 4256 wrote to memory of 3216 4256 40c4b11105db1386e30bc870183a6499.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\40c4b11105db1386e30bc870183a6499.exe"C:\Users\Admin\AppData\Local\Temp\40c4b11105db1386e30bc870183a6499.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Users\Admin\AppData\Local\ad0c643d\X176.53.17.23:802⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3752
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"2⤵
- Deletes itself
PID:3216
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of UnmapMainImage
PID:3468
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5686b479b0ee164cf1744a8be359ebb7d
SHA18615e8f967276a85110b198d575982a958581a07
SHA256fcfbb4c648649f4825b66504b261f912227ba32cbaabcadf4689020a83fb201b
SHA5127ed8022e2b09f232150b77fc3a25269365b624f19f0b50c46a4fdf744eeb23294c09c051452c4c9dbb34a274f1a0bfc54b3ff1987ec16ae2e54848e22a97ed64