Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/01/2024, 17:21
Static task
static1
Behavioral task
behavioral1
Sample
U prilogu lista novih narudzbi.exe
Resource
win7-20231129-en
General
-
Target
U prilogu lista novih narudzbi.exe
-
Size
776KB
-
MD5
75c1a9a40b3594e87dfd526d5d02786e
-
SHA1
9da904b9ade761c097d214a2fa823edc219522da
-
SHA256
be6c4cf0c6c048a2a1c98374746b282bae9c7eb191ec193a747b47910ade5aa1
-
SHA512
808bda7370c3c5c00faca7a088b059baa59545f17bd8167964565379dbf77d0093824cc4496c7154dc65b83dea92e118027e737ac640a6cd697928f6f81ed7a9
-
SSDEEP
24576:20vDyK4nrFuXSrTb/bqQlt/GR4lHKg6Qsi08StK2PwxNcH:20uKYFuXkcssi08IK2ozcH
Malware Config
Signatures
-
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype.lnk U prilogu lista novih narudzbi.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2548 skype.exe -
Loads dropped DLL 2 IoCs
pid Process 2632 cmd.exe 2632 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2548 set thread context of 1624 2548 skype.exe 36 PID 1624 set thread context of 1216 1624 AddInProcess32.exe 7 PID 1776 set thread context of 1216 1776 cscript.exe 7 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 2 IoCs
pid Process 3040 PING.EXE 2776 PING.EXE -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2932 U prilogu lista novih narudzbi.exe 2932 U prilogu lista novih narudzbi.exe 2932 U prilogu lista novih narudzbi.exe 1628 skype.exe 1628 skype.exe 1628 skype.exe 1628 skype.exe 1628 skype.exe 1628 skype.exe 2548 skype.exe 2548 skype.exe 2548 skype.exe 2548 skype.exe 1624 AddInProcess32.exe 1624 AddInProcess32.exe 1624 AddInProcess32.exe 1624 AddInProcess32.exe 1776 cscript.exe 1776 cscript.exe 1776 cscript.exe 1776 cscript.exe 1776 cscript.exe 1776 cscript.exe 1776 cscript.exe 1776 cscript.exe 1776 cscript.exe 1776 cscript.exe 1776 cscript.exe 1776 cscript.exe 1776 cscript.exe 1776 cscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1624 AddInProcess32.exe 1624 AddInProcess32.exe 1624 AddInProcess32.exe 1776 cscript.exe 1776 cscript.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2932 U prilogu lista novih narudzbi.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2932 U prilogu lista novih narudzbi.exe Token: SeDebugPrivilege 1628 skype.exe Token: SeDebugPrivilege 2548 skype.exe Token: SeDebugPrivilege 1624 AddInProcess32.exe Token: SeDebugPrivilege 1776 cscript.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 2932 wrote to memory of 1628 2932 U prilogu lista novih narudzbi.exe 28 PID 2932 wrote to memory of 1628 2932 U prilogu lista novih narudzbi.exe 28 PID 2932 wrote to memory of 1628 2932 U prilogu lista novih narudzbi.exe 28 PID 2932 wrote to memory of 1628 2932 U prilogu lista novih narudzbi.exe 28 PID 1628 wrote to memory of 2632 1628 skype.exe 29 PID 1628 wrote to memory of 2632 1628 skype.exe 29 PID 1628 wrote to memory of 2632 1628 skype.exe 29 PID 1628 wrote to memory of 2632 1628 skype.exe 29 PID 2632 wrote to memory of 3040 2632 cmd.exe 31 PID 2632 wrote to memory of 3040 2632 cmd.exe 31 PID 2632 wrote to memory of 3040 2632 cmd.exe 31 PID 2632 wrote to memory of 3040 2632 cmd.exe 31 PID 2632 wrote to memory of 2776 2632 cmd.exe 32 PID 2632 wrote to memory of 2776 2632 cmd.exe 32 PID 2632 wrote to memory of 2776 2632 cmd.exe 32 PID 2632 wrote to memory of 2776 2632 cmd.exe 32 PID 2632 wrote to memory of 2548 2632 cmd.exe 33 PID 2632 wrote to memory of 2548 2632 cmd.exe 33 PID 2632 wrote to memory of 2548 2632 cmd.exe 33 PID 2632 wrote to memory of 2548 2632 cmd.exe 33 PID 2548 wrote to memory of 1624 2548 skype.exe 36 PID 2548 wrote to memory of 1624 2548 skype.exe 36 PID 2548 wrote to memory of 1624 2548 skype.exe 36 PID 2548 wrote to memory of 1624 2548 skype.exe 36 PID 2548 wrote to memory of 1624 2548 skype.exe 36 PID 2548 wrote to memory of 1624 2548 skype.exe 36 PID 2548 wrote to memory of 1624 2548 skype.exe 36 PID 1216 wrote to memory of 1776 1216 Explorer.EXE 37 PID 1216 wrote to memory of 1776 1216 Explorer.EXE 37 PID 1216 wrote to memory of 1776 1216 Explorer.EXE 37 PID 1216 wrote to memory of 1776 1216 Explorer.EXE 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\U prilogu lista novih narudzbi.exe"C:\Users\Admin\AppData\Local\Temp\U prilogu lista novih narudzbi.exe"1⤵
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\skype.exe"C:\Users\Admin\AppData\Local\Temp\skype.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 14 > nul && copy "C:\Users\Admin\AppData\Local\Temp\skype.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe" && ping 127.0.0.1 -n 14 > nul && "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe"3⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 144⤵
- Runs ping.exe
PID:3040
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 144⤵
- Runs ping.exe
PID:2776
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"5⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
-
-
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
776KB
MD575c1a9a40b3594e87dfd526d5d02786e
SHA19da904b9ade761c097d214a2fa823edc219522da
SHA256be6c4cf0c6c048a2a1c98374746b282bae9c7eb191ec193a747b47910ade5aa1
SHA512808bda7370c3c5c00faca7a088b059baa59545f17bd8167964565379dbf77d0093824cc4496c7154dc65b83dea92e118027e737ac640a6cd697928f6f81ed7a9