Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2024, 05:26
Static task
static1
Behavioral task
behavioral1
Sample
7f01121965b997f69eda48bbbfbd0092.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7f01121965b997f69eda48bbbfbd0092.exe
Resource
win10v2004-20231215-en
General
-
Target
7f01121965b997f69eda48bbbfbd0092.exe
-
Size
24KB
-
MD5
7f01121965b997f69eda48bbbfbd0092
-
SHA1
fd059dc8ef60657063c0cb0eb01444c5e028b779
-
SHA256
eeef9bf4f1a02b52a39aa2d160040a6dda28983c66377dab6e69a6b390be7f43
-
SHA512
0f9e691c7a39965d7ac8e8c4fbbc9a1303e0f9b1cea86292babeb532665e9811472b8e3cca76e4656eaece723e3be192391eae597f21573a3a0dda60688501f1
-
SSDEEP
384:E3eVES+/xwGkRKJYklM61qmTTMVF9/q5A0:bGS+ZfbJYkO8qYoA5
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" 7f01121965b997f69eda48bbbfbd0092.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe 7f01121965b997f69eda48bbbfbd0092.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 3768 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 3096 ipconfig.exe 2484 NETSTAT.EXE -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3768 tasklist.exe Token: SeDebugPrivilege 2484 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1484 7f01121965b997f69eda48bbbfbd0092.exe 1484 7f01121965b997f69eda48bbbfbd0092.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1484 wrote to memory of 3996 1484 7f01121965b997f69eda48bbbfbd0092.exe 84 PID 1484 wrote to memory of 3996 1484 7f01121965b997f69eda48bbbfbd0092.exe 84 PID 1484 wrote to memory of 3996 1484 7f01121965b997f69eda48bbbfbd0092.exe 84 PID 3996 wrote to memory of 3428 3996 cmd.exe 86 PID 3996 wrote to memory of 3428 3996 cmd.exe 86 PID 3996 wrote to memory of 3428 3996 cmd.exe 86 PID 3996 wrote to memory of 3096 3996 cmd.exe 87 PID 3996 wrote to memory of 3096 3996 cmd.exe 87 PID 3996 wrote to memory of 3096 3996 cmd.exe 87 PID 3996 wrote to memory of 3768 3996 cmd.exe 88 PID 3996 wrote to memory of 3768 3996 cmd.exe 88 PID 3996 wrote to memory of 3768 3996 cmd.exe 88 PID 3996 wrote to memory of 1816 3996 cmd.exe 90 PID 3996 wrote to memory of 1816 3996 cmd.exe 90 PID 3996 wrote to memory of 1816 3996 cmd.exe 90 PID 1816 wrote to memory of 3188 1816 net.exe 91 PID 1816 wrote to memory of 3188 1816 net.exe 91 PID 1816 wrote to memory of 3188 1816 net.exe 91 PID 3996 wrote to memory of 2484 3996 cmd.exe 92 PID 3996 wrote to memory of 2484 3996 cmd.exe 92 PID 3996 wrote to memory of 2484 3996 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f01121965b997f69eda48bbbfbd0092.exe"C:\Users\Admin\AppData\Local\Temp\7f01121965b997f69eda48bbbfbd0092.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\cmd.execmd /c set3⤵PID:3428
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:3096
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3768
-
-
C:\Windows\SysWOW64\net.exenet start3⤵
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start4⤵PID:3188
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:2484
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD54fd1579cd417756548790487fb1c3bb2
SHA1ee5d761f751cc7d7c8496dd18d91c23d7f52b6ab
SHA2562569ac7dbb43f539f9734bb0e67469981f19bfb067167b050ea26fb6a62eba9b
SHA51219c7fdc636ffd7b7b65c5a7effef37a42f8943f7381dfff230039d17bf3fd717346c3834fa6c6a3a81632423e1e24a626e1d015778fd8e947438df5e42b039ac