Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
05/01/2024, 17:24
Static task
static1
Behavioral task
behavioral1
Sample
440193b01fbcd16c06d031c0d2b2229c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
440193b01fbcd16c06d031c0d2b2229c.exe
Resource
win10v2004-20231222-en
General
-
Target
440193b01fbcd16c06d031c0d2b2229c.exe
-
Size
16KB
-
MD5
440193b01fbcd16c06d031c0d2b2229c
-
SHA1
a3e9dedbdbce365e69e3ecde0269f439c9aa2b89
-
SHA256
c5ef9ee00ce117fdb330d20d6b555cd31d5d19b547e2f00ee6030a42f163ba20
-
SHA512
90f24315b183440f46887441dbf1fbe745ba5efcce29e242a465ae0956954ee4c024687e396f3f4bdc1801b775ae520a74dfa343034b16f7bf3c14d9ff8fd41a
-
SSDEEP
192:Ud0rLz3g3/l8u5E34argdQlEvGiUWuRyONthSLYMhUKqLl0d6Sff+bBl:w0r8Ku5mCaouWuRthSLRhUKqLla3yB
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2604 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2548 440193b01fbcd16c06d031c0d2b2229c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2604 2548 440193b01fbcd16c06d031c0d2b2229c.exe 29 PID 2548 wrote to memory of 2604 2548 440193b01fbcd16c06d031c0d2b2229c.exe 29 PID 2548 wrote to memory of 2604 2548 440193b01fbcd16c06d031c0d2b2229c.exe 29 PID 2548 wrote to memory of 2604 2548 440193b01fbcd16c06d031c0d2b2229c.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\440193b01fbcd16c06d031c0d2b2229c.exe"C:\Users\Admin\AppData\Local\Temp\440193b01fbcd16c06d031c0d2b2229c.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\440193~1.EXE > nul2⤵
- Deletes itself
PID:2604
-