Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
28/01/2024, 20:59
Static task
static1
Behavioral task
behavioral1
Sample
7dfc8c3e6f3bb0bf9769fd8b295f518a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7dfc8c3e6f3bb0bf9769fd8b295f518a.exe
Resource
win10v2004-20231222-en
General
-
Target
7dfc8c3e6f3bb0bf9769fd8b295f518a.exe
-
Size
152KB
-
MD5
7dfc8c3e6f3bb0bf9769fd8b295f518a
-
SHA1
b9bea0cd567d4643de1dc9346cfefa53153e4f56
-
SHA256
e1b1263319cf49f75bf91965d0a26dd14aa78099b3acc4a0481c1082455d15b4
-
SHA512
b16c265532bdbf52fb18cad7172ca0e544bc923d1689ccc171d67bc8db2c6244c96b23d064d3743951bbde36ac6249bd10c8db0c29511db97816931b2927343d
-
SSDEEP
3072:1g+jB7s2eCUaFPmgRMNlPTGQQm6ytwZEsrYkK4Yg:1rjBbeC98gWNlPTGQQm6agrd
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3412 haZl0oh.exe 1916 haZl0oh.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\haZl0oh.exe haZl0oh.exe File opened for modification C:\Windows\SysWOW64\haZl0oh.exe haZl0oh.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3412 haZl0oh.exe 3412 haZl0oh.exe 3412 haZl0oh.exe 3412 haZl0oh.exe 3412 haZl0oh.exe 3412 haZl0oh.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3412 haZl0oh.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2736 wrote to memory of 3412 2736 7dfc8c3e6f3bb0bf9769fd8b295f518a.exe 26 PID 2736 wrote to memory of 3412 2736 7dfc8c3e6f3bb0bf9769fd8b295f518a.exe 26 PID 2736 wrote to memory of 3412 2736 7dfc8c3e6f3bb0bf9769fd8b295f518a.exe 26 PID 3412 wrote to memory of 4292 3412 haZl0oh.exe 30 PID 3412 wrote to memory of 4292 3412 haZl0oh.exe 30 PID 3412 wrote to memory of 4292 3412 haZl0oh.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\7dfc8c3e6f3bb0bf9769fd8b295f518a.exe"C:\Users\Admin\AppData\Local\Temp\7dfc8c3e6f3bb0bf9769fd8b295f518a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\haZl0oh.exehaZl0oh.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\haZl0oh.exe > nul3⤵PID:4292
-
-
-
C:\Windows\SysWOW64\haZl0oh.exeC:\Windows\SysWOW64\haZl0oh.exe1⤵
- Executes dropped EXE
PID:1916
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD50fb956b0b5796455b979144d1a3c55ac
SHA1b3abbb5eb5401bb2be7c9a5584a43f62b8ca327f
SHA25606e5edf3107e6c5542a7ae8cb71732387e52dd581904a13a2796bed9d19de186
SHA512b15e41b2ae9ca769aefd6620f3b3e19617f444c2c10a211888f9ad1cdf572633c53c88698aefb18cdccbe8322428d59fa997eff31f09a1b1befc8b0c55288781