Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2024, 13:41
Static task
static1
Behavioral task
behavioral1
Sample
7a66d3fd37418d12ba159af02eb8cb2e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7a66d3fd37418d12ba159af02eb8cb2e.exe
Resource
win10v2004-20231215-en
General
-
Target
7a66d3fd37418d12ba159af02eb8cb2e.exe
-
Size
24KB
-
MD5
7a66d3fd37418d12ba159af02eb8cb2e
-
SHA1
dea89513d02e6c126e57bab7372c604b0d94e954
-
SHA256
7a3d7474a31f1d3972d23d8c5f8ce4aa3ffb76d16b2d234358e0bb6c1ced3fd6
-
SHA512
86ae235ed217c2e4bead9d097185d6c239a3739f6b486b36c81dd3259e7e1b3c1ee71f611319660905c3fc4e466356c73bce4a50694ebf7df80e0994511b59e4
-
SSDEEP
384:E3eVES+/xwGkRKJwYP4vlM61qmTTMVF9/q5n0:bGS+ZfbJevO8qYoA0
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" 7a66d3fd37418d12ba159af02eb8cb2e.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe 7a66d3fd37418d12ba159af02eb8cb2e.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4428 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 4304 ipconfig.exe 4284 NETSTAT.EXE -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4428 tasklist.exe Token: SeDebugPrivilege 4284 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1524 7a66d3fd37418d12ba159af02eb8cb2e.exe 1524 7a66d3fd37418d12ba159af02eb8cb2e.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1524 wrote to memory of 3992 1524 7a66d3fd37418d12ba159af02eb8cb2e.exe 87 PID 1524 wrote to memory of 3992 1524 7a66d3fd37418d12ba159af02eb8cb2e.exe 87 PID 1524 wrote to memory of 3992 1524 7a66d3fd37418d12ba159af02eb8cb2e.exe 87 PID 3992 wrote to memory of 804 3992 cmd.exe 90 PID 3992 wrote to memory of 804 3992 cmd.exe 90 PID 3992 wrote to memory of 804 3992 cmd.exe 90 PID 3992 wrote to memory of 4304 3992 cmd.exe 91 PID 3992 wrote to memory of 4304 3992 cmd.exe 91 PID 3992 wrote to memory of 4304 3992 cmd.exe 91 PID 3992 wrote to memory of 4428 3992 cmd.exe 92 PID 3992 wrote to memory of 4428 3992 cmd.exe 92 PID 3992 wrote to memory of 4428 3992 cmd.exe 92 PID 3992 wrote to memory of 4064 3992 cmd.exe 94 PID 3992 wrote to memory of 4064 3992 cmd.exe 94 PID 3992 wrote to memory of 4064 3992 cmd.exe 94 PID 4064 wrote to memory of 4924 4064 net.exe 95 PID 4064 wrote to memory of 4924 4064 net.exe 95 PID 4064 wrote to memory of 4924 4064 net.exe 95 PID 3992 wrote to memory of 4284 3992 cmd.exe 96 PID 3992 wrote to memory of 4284 3992 cmd.exe 96 PID 3992 wrote to memory of 4284 3992 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a66d3fd37418d12ba159af02eb8cb2e.exe"C:\Users\Admin\AppData\Local\Temp\7a66d3fd37418d12ba159af02eb8cb2e.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\SysWOW64\cmd.execmd /c set3⤵PID:804
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:4304
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4428
-
-
C:\Windows\SysWOW64\net.exenet start3⤵
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start4⤵PID:4924
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:4284
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD517ac9dc2664eb509e76a52c6b6f9d934
SHA1f78a9e65dca91f2c25d71594a5d83f29ea4d230a
SHA256b905b4d8b6b6fae95d9203aa5175364e5c01a35352af2afbedcd42183ea969b1
SHA512da315bf7eb46d13b99ce3b58a952d27b91c07d509c92ac8c96273d219cc9227b82769ab3f54b5de56bd07f1d7acf29ef4a0c33092c0e2407fd8c0afe3df64231