Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 03:42
Static task
static1
Behavioral task
behavioral1
Sample
73a44083556179e076af633a2757f64b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
73a44083556179e076af633a2757f64b.exe
Resource
win10v2004-20231215-en
General
-
Target
73a44083556179e076af633a2757f64b.exe
-
Size
24KB
-
MD5
73a44083556179e076af633a2757f64b
-
SHA1
72dafd10ebee7ff1b1032eeb7f5e323fa5dce43b
-
SHA256
419388bc816bfec26d8c45b2fca1788ae6d883ded974eb8a89200a7ffad6fe5c
-
SHA512
ccdf1123bd2ab1b732e79ce4307bcd9bf8ceb84108b8348c6d2195e86c5260e469b380228eccef4b08bc1cbb15adfa734c2c7fcbb5478dc3c20c193219dc05b2
-
SSDEEP
384:E3eVES+/xwGkRKJTwLwlM61qmTTMVF9/q5M0:bGS+ZfbJTwLwO8qYoAd
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" 73a44083556179e076af633a2757f64b.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe 73a44083556179e076af633a2757f64b.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4652 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 492 ipconfig.exe 2640 NETSTAT.EXE -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4652 tasklist.exe Token: SeDebugPrivilege 2640 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3112 73a44083556179e076af633a2757f64b.exe 3112 73a44083556179e076af633a2757f64b.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3112 wrote to memory of 5020 3112 73a44083556179e076af633a2757f64b.exe 88 PID 3112 wrote to memory of 5020 3112 73a44083556179e076af633a2757f64b.exe 88 PID 3112 wrote to memory of 5020 3112 73a44083556179e076af633a2757f64b.exe 88 PID 5020 wrote to memory of 3504 5020 cmd.exe 90 PID 5020 wrote to memory of 3504 5020 cmd.exe 90 PID 5020 wrote to memory of 3504 5020 cmd.exe 90 PID 5020 wrote to memory of 492 5020 cmd.exe 91 PID 5020 wrote to memory of 492 5020 cmd.exe 91 PID 5020 wrote to memory of 492 5020 cmd.exe 91 PID 5020 wrote to memory of 4652 5020 cmd.exe 92 PID 5020 wrote to memory of 4652 5020 cmd.exe 92 PID 5020 wrote to memory of 4652 5020 cmd.exe 92 PID 5020 wrote to memory of 1916 5020 cmd.exe 95 PID 5020 wrote to memory of 1916 5020 cmd.exe 95 PID 5020 wrote to memory of 1916 5020 cmd.exe 95 PID 1916 wrote to memory of 4560 1916 net.exe 96 PID 1916 wrote to memory of 4560 1916 net.exe 96 PID 1916 wrote to memory of 4560 1916 net.exe 96 PID 5020 wrote to memory of 2640 5020 cmd.exe 97 PID 5020 wrote to memory of 2640 5020 cmd.exe 97 PID 5020 wrote to memory of 2640 5020 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\73a44083556179e076af633a2757f64b.exe"C:\Users\Admin\AppData\Local\Temp\73a44083556179e076af633a2757f64b.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\cmd.execmd /c set3⤵PID:3504
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:492
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4652
-
-
C:\Windows\SysWOW64\net.exenet start3⤵
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start4⤵PID:4560
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5e924ad1972e21ab2b33426233c733510
SHA1ef904dd5097492566277b216a9d8ff3627033a70
SHA256d329a5a7521d3903c84d7b399d9de7136f0e86545d586b8c7a56a44e23123e1c
SHA51209cc26078618a8824b2814487e07d3fb6efae952999bd7945318095ba441fd3a67bab64b21d9cb176e10b72ab85ecfb1bc56a397155ea802408021f93a34eccc