Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/01/2024, 04:48
Static task
static1
Behavioral task
behavioral1
Sample
29e3ae47c7df4b865065a3fde56483fd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
29e3ae47c7df4b865065a3fde56483fd.exe
Resource
win10v2004-20231215-en
General
-
Target
29e3ae47c7df4b865065a3fde56483fd.exe
-
Size
4.7MB
-
MD5
29e3ae47c7df4b865065a3fde56483fd
-
SHA1
61fefecb5575cde7bbcffad97671f19aa53479e4
-
SHA256
f4953dd47a1a35b12a94ce5c4fc5af2da86882070366a1684b8896a16bf636ec
-
SHA512
c2fb61e9d866c2c0114066b30a923949323b8824106aab2f1c0d5ab9e33b7afd2f40bf28288f26daaaf690ef2c547a0b4d1827d7b081173b9e08c5f76a235afe
-
SSDEEP
98304:Z3lXv+AIYyh+rUJ6K4RXf4M73r/BfohM+DmeDMpgTV:b+44+rUJ6K4RgqoXjYpg
Malware Config
Signatures
-
Detect Socks5Systemz Payload 3 IoCs
resource yara_rule behavioral1/memory/2584-79-0x0000000002BA0000-0x0000000002C42000-memory.dmp family_socks5systemz behavioral1/memory/2584-82-0x0000000002BA0000-0x0000000002C42000-memory.dmp family_socks5systemz behavioral1/memory/2584-91-0x0000000002BA0000-0x0000000002C42000-memory.dmp family_socks5systemz -
Socks5Systemz
Socks5Systemz is a botnet written in C++.
-
Executes dropped EXE 3 IoCs
pid Process 2716 29e3ae47c7df4b865065a3fde56483fd.tmp 2736 jsbaseclasses.exe 2584 jsbaseclasses.exe -
Loads dropped DLL 5 IoCs
pid Process 1896 29e3ae47c7df4b865065a3fde56483fd.exe 2716 29e3ae47c7df4b865065a3fde56483fd.tmp 2716 29e3ae47c7df4b865065a3fde56483fd.tmp 2716 29e3ae47c7df4b865065a3fde56483fd.tmp 2716 29e3ae47c7df4b865065a3fde56483fd.tmp -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 45.155.250.90 -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2716 29e3ae47c7df4b865065a3fde56483fd.tmp 2716 29e3ae47c7df4b865065a3fde56483fd.tmp -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 2736 jsbaseclasses.exe Token: SeSecurityPrivilege 2584 jsbaseclasses.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2716 29e3ae47c7df4b865065a3fde56483fd.tmp -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1896 wrote to memory of 2716 1896 29e3ae47c7df4b865065a3fde56483fd.exe 15 PID 1896 wrote to memory of 2716 1896 29e3ae47c7df4b865065a3fde56483fd.exe 15 PID 1896 wrote to memory of 2716 1896 29e3ae47c7df4b865065a3fde56483fd.exe 15 PID 1896 wrote to memory of 2716 1896 29e3ae47c7df4b865065a3fde56483fd.exe 15 PID 1896 wrote to memory of 2716 1896 29e3ae47c7df4b865065a3fde56483fd.exe 15 PID 1896 wrote to memory of 2716 1896 29e3ae47c7df4b865065a3fde56483fd.exe 15 PID 1896 wrote to memory of 2716 1896 29e3ae47c7df4b865065a3fde56483fd.exe 15 PID 2716 wrote to memory of 2844 2716 29e3ae47c7df4b865065a3fde56483fd.tmp 29 PID 2716 wrote to memory of 2844 2716 29e3ae47c7df4b865065a3fde56483fd.tmp 29 PID 2716 wrote to memory of 2844 2716 29e3ae47c7df4b865065a3fde56483fd.tmp 29 PID 2716 wrote to memory of 2844 2716 29e3ae47c7df4b865065a3fde56483fd.tmp 29 PID 2716 wrote to memory of 2736 2716 29e3ae47c7df4b865065a3fde56483fd.tmp 31 PID 2716 wrote to memory of 2736 2716 29e3ae47c7df4b865065a3fde56483fd.tmp 31 PID 2716 wrote to memory of 2736 2716 29e3ae47c7df4b865065a3fde56483fd.tmp 31 PID 2716 wrote to memory of 2736 2716 29e3ae47c7df4b865065a3fde56483fd.tmp 31 PID 2844 wrote to memory of 2668 2844 net.exe 30 PID 2844 wrote to memory of 2668 2844 net.exe 30 PID 2844 wrote to memory of 2668 2844 net.exe 30 PID 2844 wrote to memory of 2668 2844 net.exe 30 PID 2716 wrote to memory of 2584 2716 29e3ae47c7df4b865065a3fde56483fd.tmp 33 PID 2716 wrote to memory of 2584 2716 29e3ae47c7df4b865065a3fde56483fd.tmp 33 PID 2716 wrote to memory of 2584 2716 29e3ae47c7df4b865065a3fde56483fd.tmp 33 PID 2716 wrote to memory of 2584 2716 29e3ae47c7df4b865065a3fde56483fd.tmp 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\29e3ae47c7df4b865065a3fde56483fd.exe"C:\Users\Admin\AppData\Local\Temp\29e3ae47c7df4b865065a3fde56483fd.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\is-SF4S4.tmp\29e3ae47c7df4b865065a3fde56483fd.tmp"C:\Users\Admin\AppData\Local\Temp\is-SF4S4.tmp\29e3ae47c7df4b865065a3fde56483fd.tmp" /SL5="$4010C,4678638,54272,C:\Users\Admin\AppData\Local\Temp\29e3ae47c7df4b865065a3fde56483fd.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\net.exe"C:\Windows\system32\net.exe" helpmsg 283⤵
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 helpmsg 284⤵PID:2668
-
-
-
C:\Users\Admin\AppData\Local\JS Base Classes\jsbaseclasses.exe"C:\Users\Admin\AppData\Local\JS Base Classes\jsbaseclasses.exe" -i3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Users\Admin\AppData\Local\JS Base Classes\jsbaseclasses.exe"C:\Users\Admin\AppData\Local\JS Base Classes\jsbaseclasses.exe" -s3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
191KB
MD58557a68499ee848599c12dc22d966518
SHA12c66caa4fd8dae7b871495b6eca71d5367a04aaf
SHA256252626b97a6c902acf06a9a10bc63363bcb9ded7e4e4a57ca29949e9d88d027a
SHA51267a51e47a7a9d1234a0df659cd4280d58dfe5da9e37eae956d91d0df58778ff07b030b786efe7f80da6bb6abf273fe6ae9ae8df362e2a21d1540668b400e364d
-
Filesize
165KB
MD5f19dd671dd68b22304f3eb069ecd4374
SHA1ca9ebe8b7cdd733ae48894bdee40922c59130a56
SHA2564eb9d0bfaaaa60e25b59f3b492eec7db8b4a12aad0735ec0c9dbbc5aa24e2b26
SHA512473ff87f1162ad6949c32ea870f418c541ebaba69341797205c647e2664e8f692fd2f6af5fd56c3417c5efa0f921cf0135d95eb6908f2109014f53d16cb98413
-
Filesize
64KB
MD57a37871cb87cc19e41b4f95231cf80fa
SHA1cb4c3a7e1968f36c55a646c0410fd285a6f405b2
SHA2566787ee55e2141ea9e76329a8233b7fa39b872fc8fece2819e1ec54e92280e3fe
SHA512038abe637baf8c738835ebcfa88cb670c2768245666e31dc5a33272a0ba080d6c9500d0c7622483cdaf7cc1c701340fe0b7c038e784ffa6673d8ccefda21fe3d
-
Filesize
226KB
MD5cc15d887e014673ad7eb05b9797fb3f4
SHA15fc826d263eeacfcfe535808e39c9e2cbe677033
SHA2562f20715ff805cdb4bfa9ec7d378832d6c9389751006d94c9cffc95051c6edeea
SHA5128cc73a8820710cadae9bd739ab5690ae2a264ae12d56cd71ac79ef3a5982577d0deaef5c88841f7cad355950f56e231d10ee19a1c3972a32a67cfb4f88174593
-
Filesize
301KB
MD52b132d31965a93057662ccb2da617ed2
SHA14f559d13a72d7fa7e517343dcff00347f75550e7
SHA256d4fc4b37dc2114149b145997c9740608f03ea17bffe3f21338f7c59af57a79c0
SHA512cec1c87114fc278b83248bd778fa2c39a751a4700bc82f1a284d2531087894dc7799936895ac3d5111f0a84584b75d90ed2e45391eb441251e6bf23a2f217bd2
-
Filesize
172KB
MD555d07d9078eac1fe61b246c993ab9940
SHA1ba7483c1359e81ffc7ebf7404926cbe3d0705d0c
SHA25658adf1ae0d8ab774fc528a51a4d77c1cccd5a4cbdf96f04e8c6bec1ca8df2d25
SHA5125a8993f05e1a4c48d73f7f940e6a5813e8e56f76c0b446debe3ba40d82ea3ff863f10787be8c53de5abec086ef46adae94007de630ae0b324ac63ab932cb02a9
-
Filesize
353KB
MD575c8aea0f174c56f81b2461a53a43683
SHA1af94e41f5ae53abb882f22dc2b2635962756d96e
SHA2564e4a9aab959638db65bb45329c7e9e3c75c61c648910fe35d8a948cd6838dc41
SHA5125bb49980df269ce3168c813dca7cf355dd699ae491a14fb83bf4a26837f63961fa7caeee5223b484b6d236f25378202bfcb299aedc1dc4500ef93ab485935c9b
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3