Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 21:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
90242a96e37b75f170b8db3e9fb3fec4.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
90242a96e37b75f170b8db3e9fb3fec4.exe
Resource
win10v2004-20231222-en
4 signatures
150 seconds
General
-
Target
90242a96e37b75f170b8db3e9fb3fec4.exe
-
Size
99KB
-
MD5
90242a96e37b75f170b8db3e9fb3fec4
-
SHA1
93b9029ec2acb8c06ff9d67bbdcbaa6b097212db
-
SHA256
e50598436ced893edd06e45175503a768af450b34559db324367dcff12655bf8
-
SHA512
a75cb6ea5b7e5008ea14d4f61568633f1e663c4d2eae5c0ec1a6e2e30195bee12022dee0a0639572e9d55c65d4ac37463ce8e38442f91623adfd9e2dfaf6fe71
-
SSDEEP
1536:xEFixcgoD1O7hMC+IAl03JyXtyiViiYHY0aYAlPci/pvGX14H75okX:yMxV17h1+/lmetyiUiY4WAl0iR9/
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\winsrv.exe" 90242a96e37b75f170b8db3e9fb3fec4.exe -
Deletes itself 1 IoCs
pid Process 2656 cmd.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\windows.hlp 90242a96e37b75f170b8db3e9fb3fec4.exe File opened for modification C:\Windows\SysWOW64\windows.hlp 90242a96e37b75f170b8db3e9fb3fec4.exe File created C:\Windows\SysWOW64\winsrv.exe 90242a96e37b75f170b8db3e9fb3fec4.exe File opened for modification C:\Windows\SysWOW64\winsrv.exe 90242a96e37b75f170b8db3e9fb3fec4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1700 90242a96e37b75f170b8db3e9fb3fec4.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2656 1700 90242a96e37b75f170b8db3e9fb3fec4.exe 28 PID 1700 wrote to memory of 2656 1700 90242a96e37b75f170b8db3e9fb3fec4.exe 28 PID 1700 wrote to memory of 2656 1700 90242a96e37b75f170b8db3e9fb3fec4.exe 28 PID 1700 wrote to memory of 2656 1700 90242a96e37b75f170b8db3e9fb3fec4.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\90242a96e37b75f170b8db3e9fb3fec4.exe"C:\Users\Admin\AppData\Local\Temp\90242a96e37b75f170b8db3e9fb3fec4.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\90242A~1.EXE > nul2⤵
- Deletes itself
PID:2656
-