Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2024, 08:58
Static task
static1
Behavioral task
behavioral1
Sample
43478d28704cadc0db6571dc2e6fa96f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
43478d28704cadc0db6571dc2e6fa96f.exe
Resource
win10v2004-20231215-en
General
-
Target
43478d28704cadc0db6571dc2e6fa96f.exe
-
Size
13KB
-
MD5
43478d28704cadc0db6571dc2e6fa96f
-
SHA1
b62680eacb847f98a53af00901eafac6b287ef2b
-
SHA256
036a39a60d6447338c92ebae426124e4c93920d64ddecf73f5c1b290924a4f59
-
SHA512
ca2e5fac347ba8a03b351531787528644eae85dc032b9bfccf3e254397bddb992b33c88b2fe9de17bd23e1ae2805f5626d600ebe12fb29c98bca3b2f95edbcfc
-
SSDEEP
192:T2Uq4pEMfiymuqbjzDbiZFGyknlLfP1oynG0JS0ATUBb9Lru8LTP3N:KX4lfiymuqbPqFAnlb1jkUt9Lru0TP9
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2540 wsttrs.exe -
Executes dropped EXE 1 IoCs
pid Process 2540 wsttrs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\wsttrs = "C:\\Windows\\wsttrs.exe" wsttrs.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\wsttrs.dll wsttrs.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\wsttrs.exe 43478d28704cadc0db6571dc2e6fa96f.exe File opened for modification C:\Windows\wsttrs.exe 43478d28704cadc0db6571dc2e6fa96f.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2540 wsttrs.exe 2540 wsttrs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3248 43478d28704cadc0db6571dc2e6fa96f.exe Token: SeDebugPrivilege 2540 wsttrs.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3248 wrote to memory of 2540 3248 43478d28704cadc0db6571dc2e6fa96f.exe 44 PID 3248 wrote to memory of 2540 3248 43478d28704cadc0db6571dc2e6fa96f.exe 44 PID 3248 wrote to memory of 2540 3248 43478d28704cadc0db6571dc2e6fa96f.exe 44 PID 2540 wrote to memory of 3448 2540 wsttrs.exe 47 PID 2540 wrote to memory of 3448 2540 wsttrs.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\43478d28704cadc0db6571dc2e6fa96f.exe"C:\Users\Admin\AppData\Local\Temp\43478d28704cadc0db6571dc2e6fa96f.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\wsttrs.exeC:\Windows\wsttrs.exe @C:\Users\Admin\AppData\Local\Temp\43478d28704cadc0db6571dc2e6fa96f.exe@32482⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2540
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD543478d28704cadc0db6571dc2e6fa96f
SHA1b62680eacb847f98a53af00901eafac6b287ef2b
SHA256036a39a60d6447338c92ebae426124e4c93920d64ddecf73f5c1b290924a4f59
SHA512ca2e5fac347ba8a03b351531787528644eae85dc032b9bfccf3e254397bddb992b33c88b2fe9de17bd23e1ae2805f5626d600ebe12fb29c98bca3b2f95edbcfc