Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
6s -
max time network
6s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
23/01/2024, 23:27
Static task
static1
Behavioral task
behavioral1
Sample
70d63f09fe6c943bc2ad0c9979d06bd2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
70d63f09fe6c943bc2ad0c9979d06bd2.exe
Resource
win10v2004-20231215-en
Errors
General
-
Target
70d63f09fe6c943bc2ad0c9979d06bd2.exe
-
Size
43KB
-
MD5
70d63f09fe6c943bc2ad0c9979d06bd2
-
SHA1
b78306a12f5448fdd5d9db13d948cbb5e22770ab
-
SHA256
a147d8748e41bb764de2271f2cb5854bca7d2df3c6be5a0bb2c60f8131a8caa9
-
SHA512
c80a187513b80f0115f8009ddabbefc8cbc3e77f26f8adfbc7e442e074961f76a65e01706cd984dab20e2f2ff9d16bf9c27bcbbcd79841607a8801ec1a4605c8
-
SSDEEP
768:/213z5/gbGWhVhGToNCYK1hfdyuBNxQrkRUwbJytP+Wz:/Gz5/67hi8NCYKzfdyumr/wbJ++Wz
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2636 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\18534940 = "C:\\Users\\Admin\\18534940.exe" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 624 70d63f09fe6c943bc2ad0c9979d06bd2.exe Token: SeShutdownPrivilege 2300 shutdown.exe Token: SeRemoteShutdownPrivilege 2300 shutdown.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 624 wrote to memory of 2264 624 70d63f09fe6c943bc2ad0c9979d06bd2.exe 28 PID 624 wrote to memory of 2264 624 70d63f09fe6c943bc2ad0c9979d06bd2.exe 28 PID 624 wrote to memory of 2264 624 70d63f09fe6c943bc2ad0c9979d06bd2.exe 28 PID 624 wrote to memory of 2264 624 70d63f09fe6c943bc2ad0c9979d06bd2.exe 28 PID 2264 wrote to memory of 3032 2264 cmd.exe 30 PID 2264 wrote to memory of 3032 2264 cmd.exe 30 PID 2264 wrote to memory of 3032 2264 cmd.exe 30 PID 2264 wrote to memory of 3032 2264 cmd.exe 30 PID 624 wrote to memory of 2300 624 70d63f09fe6c943bc2ad0c9979d06bd2.exe 31 PID 624 wrote to memory of 2300 624 70d63f09fe6c943bc2ad0c9979d06bd2.exe 31 PID 624 wrote to memory of 2300 624 70d63f09fe6c943bc2ad0c9979d06bd2.exe 31 PID 624 wrote to memory of 2300 624 70d63f09fe6c943bc2ad0c9979d06bd2.exe 31 PID 624 wrote to memory of 2636 624 70d63f09fe6c943bc2ad0c9979d06bd2.exe 33 PID 624 wrote to memory of 2636 624 70d63f09fe6c943bc2ad0c9979d06bd2.exe 33 PID 624 wrote to memory of 2636 624 70d63f09fe6c943bc2ad0c9979d06bd2.exe 33 PID 624 wrote to memory of 2636 624 70d63f09fe6c943bc2ad0c9979d06bd2.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\70d63f09fe6c943bc2ad0c9979d06bd2.exe"C:\Users\Admin\AppData\Local\Temp\70d63f09fe6c943bc2ad0c9979d06bd2.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\SysWOW64\cmd.execmd.exe /c REG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 18534940 /t REG_SZ /d "%userprofile%\18534940.exe" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v 18534940 /t REG_SZ /d "C:\Users\Admin\18534940.exe" /f3⤵
- Adds Run key to start application
PID:3032
-
-
-
C:\Windows\SysWOW64\shutdown.exe"C:\Windows\System32\shutdown.exe" /r /f /t 32⤵
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\70D63F~1.EXE > nul2⤵
- Deletes itself
PID:2636
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2548
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2572