Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 01:46
Static task
static1
Behavioral task
behavioral1
Sample
8de8edb7626af095177456f5b9cfdabe.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8de8edb7626af095177456f5b9cfdabe.exe
Resource
win10v2004-20231215-en
General
-
Target
8de8edb7626af095177456f5b9cfdabe.exe
-
Size
24KB
-
MD5
8de8edb7626af095177456f5b9cfdabe
-
SHA1
4c4ff5264055fc6f7caaf11d27de66ad74393dac
-
SHA256
2f486ac06475d028efd565e7b720a8f833f700af8b117003c2725f27ae1b47e2
-
SHA512
927c5b07cbc747c4f2986878f65622e93b01210319f8c533f5fa17dfc351084f62c69c141089cfbadd82c023f0cac047146e599de08eb6947799f36b8424c723
-
SSDEEP
384:E3eVES+/xwGkRKJilM61qmTTMVF9/q510:bGS+ZfbJiO8qYoAa
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" 8de8edb7626af095177456f5b9cfdabe.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe 8de8edb7626af095177456f5b9cfdabe.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1616 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 3560 ipconfig.exe 4720 NETSTAT.EXE -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1616 tasklist.exe Token: SeDebugPrivilege 4720 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2448 8de8edb7626af095177456f5b9cfdabe.exe 2448 8de8edb7626af095177456f5b9cfdabe.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2448 wrote to memory of 3008 2448 8de8edb7626af095177456f5b9cfdabe.exe 86 PID 2448 wrote to memory of 3008 2448 8de8edb7626af095177456f5b9cfdabe.exe 86 PID 2448 wrote to memory of 3008 2448 8de8edb7626af095177456f5b9cfdabe.exe 86 PID 3008 wrote to memory of 3672 3008 cmd.exe 87 PID 3008 wrote to memory of 3672 3008 cmd.exe 87 PID 3008 wrote to memory of 3672 3008 cmd.exe 87 PID 3008 wrote to memory of 3560 3008 cmd.exe 88 PID 3008 wrote to memory of 3560 3008 cmd.exe 88 PID 3008 wrote to memory of 3560 3008 cmd.exe 88 PID 3008 wrote to memory of 1616 3008 cmd.exe 89 PID 3008 wrote to memory of 1616 3008 cmd.exe 89 PID 3008 wrote to memory of 1616 3008 cmd.exe 89 PID 3008 wrote to memory of 2052 3008 cmd.exe 91 PID 3008 wrote to memory of 2052 3008 cmd.exe 91 PID 3008 wrote to memory of 2052 3008 cmd.exe 91 PID 2052 wrote to memory of 1072 2052 net.exe 92 PID 2052 wrote to memory of 1072 2052 net.exe 92 PID 2052 wrote to memory of 1072 2052 net.exe 92 PID 3008 wrote to memory of 4720 3008 cmd.exe 93 PID 3008 wrote to memory of 4720 3008 cmd.exe 93 PID 3008 wrote to memory of 4720 3008 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\8de8edb7626af095177456f5b9cfdabe.exe"C:\Users\Admin\AppData\Local\Temp\8de8edb7626af095177456f5b9cfdabe.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\cmd.execmd /c set3⤵PID:3672
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:3560
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1616
-
-
C:\Windows\SysWOW64\net.exenet start3⤵
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start4⤵PID:1072
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:4720
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5533c0bd3f0ca60cdb652d1f7e96fa28c
SHA13dbe3e40d9b29a1067aabcce32e752526c9ab6fc
SHA2565859fb5efab294c91cd2714979603c08cf7648bd8cf9f00c8d9d83c320848c45
SHA51234750cf69b7b2a5288cefed40cd4171260a4d0b2e6d623c9dc1ded6430be0a17a7ac58e3a41cb05ca28c6218b867cd01da40d292687a9161bd1e21b0452816fa