Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
2s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 18:45
Behavioral task
behavioral1
Sample
4e5c8938ed644daec8e14035d1f13bbe.exe
Resource
win7-20231215-en
General
-
Target
4e5c8938ed644daec8e14035d1f13bbe.exe
-
Size
1.4MB
-
MD5
4e5c8938ed644daec8e14035d1f13bbe
-
SHA1
1360d8c4f029755ddc0dae7396d13d049f745602
-
SHA256
baf65a4cb3a3443c4dea37ddd9766557037a970b6c1f2376fe75e1e09997cd4c
-
SHA512
9656ba361f94253971da6b6a0f708560d3f9b2cd8961d7323a3cd67e3d5f8f550791554cef5c4d0a7b8ef22ebfdf3a087b2cba1007c0ca329dd0a8712c1ab5bb
-
SSDEEP
24576:zIA7opO13nWEjukQuzHVZ64lEq25RHxrFCKezViURT1jS7VQ+SB42Cf6:D7op+Weu+zHj64ENRhCHJh1jS7y+SBhT
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Kills process with taskkill 1 IoCs
pid Process 1564 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 34 IoCs
description pid Process Token: SeCreateTokenPrivilege 3012 4e5c8938ed644daec8e14035d1f13bbe.exe Token: SeAssignPrimaryTokenPrivilege 3012 4e5c8938ed644daec8e14035d1f13bbe.exe Token: SeLockMemoryPrivilege 3012 4e5c8938ed644daec8e14035d1f13bbe.exe Token: SeIncreaseQuotaPrivilege 3012 4e5c8938ed644daec8e14035d1f13bbe.exe Token: SeMachineAccountPrivilege 3012 4e5c8938ed644daec8e14035d1f13bbe.exe Token: SeTcbPrivilege 3012 4e5c8938ed644daec8e14035d1f13bbe.exe Token: SeSecurityPrivilege 3012 4e5c8938ed644daec8e14035d1f13bbe.exe Token: SeTakeOwnershipPrivilege 3012 4e5c8938ed644daec8e14035d1f13bbe.exe Token: SeLoadDriverPrivilege 3012 4e5c8938ed644daec8e14035d1f13bbe.exe Token: SeSystemProfilePrivilege 3012 4e5c8938ed644daec8e14035d1f13bbe.exe Token: SeSystemtimePrivilege 3012 4e5c8938ed644daec8e14035d1f13bbe.exe Token: SeProfSingleProcessPrivilege 3012 4e5c8938ed644daec8e14035d1f13bbe.exe Token: SeIncBasePriorityPrivilege 3012 4e5c8938ed644daec8e14035d1f13bbe.exe Token: SeCreatePagefilePrivilege 3012 4e5c8938ed644daec8e14035d1f13bbe.exe Token: SeCreatePermanentPrivilege 3012 4e5c8938ed644daec8e14035d1f13bbe.exe Token: SeBackupPrivilege 3012 4e5c8938ed644daec8e14035d1f13bbe.exe Token: SeRestorePrivilege 3012 4e5c8938ed644daec8e14035d1f13bbe.exe Token: SeShutdownPrivilege 3012 4e5c8938ed644daec8e14035d1f13bbe.exe Token: SeDebugPrivilege 3012 4e5c8938ed644daec8e14035d1f13bbe.exe Token: SeAuditPrivilege 3012 4e5c8938ed644daec8e14035d1f13bbe.exe Token: SeSystemEnvironmentPrivilege 3012 4e5c8938ed644daec8e14035d1f13bbe.exe Token: SeChangeNotifyPrivilege 3012 4e5c8938ed644daec8e14035d1f13bbe.exe Token: SeRemoteShutdownPrivilege 3012 4e5c8938ed644daec8e14035d1f13bbe.exe Token: SeUndockPrivilege 3012 4e5c8938ed644daec8e14035d1f13bbe.exe Token: SeSyncAgentPrivilege 3012 4e5c8938ed644daec8e14035d1f13bbe.exe Token: SeEnableDelegationPrivilege 3012 4e5c8938ed644daec8e14035d1f13bbe.exe Token: SeManageVolumePrivilege 3012 4e5c8938ed644daec8e14035d1f13bbe.exe Token: SeImpersonatePrivilege 3012 4e5c8938ed644daec8e14035d1f13bbe.exe Token: SeCreateGlobalPrivilege 3012 4e5c8938ed644daec8e14035d1f13bbe.exe Token: 31 3012 4e5c8938ed644daec8e14035d1f13bbe.exe Token: 32 3012 4e5c8938ed644daec8e14035d1f13bbe.exe Token: 33 3012 4e5c8938ed644daec8e14035d1f13bbe.exe Token: 34 3012 4e5c8938ed644daec8e14035d1f13bbe.exe Token: 35 3012 4e5c8938ed644daec8e14035d1f13bbe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e5c8938ed644daec8e14035d1f13bbe.exe"C:\Users\Admin\AppData\Local\Temp\4e5c8938ed644daec8e14035d1f13bbe.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3012 -
C:\Windows\SysWOW64\cmd.execmd.exe /c taskkill /f /im chrome.exe2⤵PID:2036
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im chrome.exe1⤵
- Kills process with taskkill
PID:1564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d028739b900276af331f7de12762d4b7
SHA162b70174063ff06ba66326c2b8c127bf285b8a8b
SHA2562402271894dc1bbc91333c49dbf3229196c1612c5fb25b08f4c202b1cd2ea360
SHA512022b4a0a66d0f05c872d326fa163c35cb10a0da4a1a9f733be3264921a5aa5c43d3b05463003d622036bd636d5ae20346ce5d0e4cfcc7a0f92fb3132e952d24c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59be610b9361341521611224943580c09
SHA11455b65b668734adf5bff1e7fcad184e53f7bfab
SHA2561d4cde5935b3ac0092256a5ee2f508527fed7e4e9df9318ecce3ae6f587b19fc
SHA51259b7e65f981b62b50bbaf6d3c211c0ec6394fef06322afe82b2161ad56a177d768c9c37d725776bf9c9f885285025d89c5b9cd3a92fa02c177f3046a127311e8
-
Filesize
7KB
MD51722ffc8797303d6ed2a0f5a28346d7e
SHA1ba4ba6187d741e375a533c83f80b592612688694
SHA2566d47c05166ebf413169413bc5f8d85668f474cc48105d50733dec1667788af30
SHA512c53651856477e2ce2669e6821a60c36950eb4de1afa6f5a3cce015487d23a86631ecbf8e2b04339ef5ed2472181defb44dffaf182079153e7e73f95f54c531e5