Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
31s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/01/2024, 01:00
Static task
static1
Behavioral task
behavioral1
Sample
AkuTheSlime4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
AkuTheSlime4.exe
Resource
android-x64-arm64-20231215-en
Errors
General
-
Target
AkuTheSlime4.exe
-
Size
243KB
-
MD5
5a908bd0fb8970f5bcee95d31aa1b972
-
SHA1
cad8de8d2ada987ce3ebe99e4c10ee60baee33f2
-
SHA256
a90ffdba1be5e8c98a4c083b81d9b1f8346410fbaf3dd511dc34c01bde3ec20e
-
SHA512
02226e6080138546366e23f2ce0363da3f90477605e1684ff8d5a23f87bbf90347c0780ac4da978e1543d49e65d6249a94aa4f143eb701dd5ada59bfbb2ce724
-
SSDEEP
6144:YqPatttk5x37tttttt67bhOSKfU0wOtTiEqOpPXccV+RGRNM:YqP15x3cB9060PX3cRG
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2784 shutdown.exe Token: SeRemoteShutdownPrivilege 2784 shutdown.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2076 2228 AkuTheSlime4.exe 29 PID 2228 wrote to memory of 2076 2228 AkuTheSlime4.exe 29 PID 2228 wrote to memory of 2076 2228 AkuTheSlime4.exe 29 PID 2076 wrote to memory of 2748 2076 cmd.exe 30 PID 2076 wrote to memory of 2748 2076 cmd.exe 30 PID 2076 wrote to memory of 2748 2076 cmd.exe 30 PID 2076 wrote to memory of 2784 2076 cmd.exe 31 PID 2076 wrote to memory of 2784 2076 cmd.exe 31 PID 2076 wrote to memory of 2784 2076 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\AkuTheSlime4.exe"C:\Users\Admin\AppData\Local\Temp\AkuTheSlime4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\cmd.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\msg.vbs"3⤵PID:2748
-
-
C:\Windows\system32\shutdown.exeshutdown /r3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2952
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108B
MD528256a962767b1954e50801af30baa3d
SHA106938a7ea7ef6f1d45732b34cf8583879c8b5011
SHA2562d18064414596c6bebc504d3b2e61ad263356d19685cb2fb7cee5ca3d579374c
SHA5126a601b0b33dacbd75723f59a1d272d48778cff42302e564b79de4ea0263738f239bba68171fdd7ce72387b73324b1e80ea49ff91a0740730d4d5ef7da3e999af
-
Filesize
64B
MD5a9a0c15d9af10b6ea119975f99bf453d
SHA14966878bf0ef1bfbe0bc6e4e48c8f8fa8442248e
SHA256b08c5aa5783b5286d31a013ef78eb7cc4f1a244985776fa0752874c8fff2cda9
SHA5122747e49aacaf0000774cdfe580db437469f5d99e6f3bcd6963acf6d87757ed98fb1fb6d19ce713f98fcaa42eb7e61539556066eb47ff9de5b37a08a96323f5db