Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 21:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
90242a96e37b75f170b8db3e9fb3fec4.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
90242a96e37b75f170b8db3e9fb3fec4.exe
Resource
win10v2004-20231222-en
4 signatures
150 seconds
General
-
Target
90242a96e37b75f170b8db3e9fb3fec4.exe
-
Size
99KB
-
MD5
90242a96e37b75f170b8db3e9fb3fec4
-
SHA1
93b9029ec2acb8c06ff9d67bbdcbaa6b097212db
-
SHA256
e50598436ced893edd06e45175503a768af450b34559db324367dcff12655bf8
-
SHA512
a75cb6ea5b7e5008ea14d4f61568633f1e663c4d2eae5c0ec1a6e2e30195bee12022dee0a0639572e9d55c65d4ac37463ce8e38442f91623adfd9e2dfaf6fe71
-
SSDEEP
1536:xEFixcgoD1O7hMC+IAl03JyXtyiViiYHY0aYAlPci/pvGX14H75okX:yMxV17h1+/lmetyiUiY4WAl0iR9/
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\winsrv.exe" 90242a96e37b75f170b8db3e9fb3fec4.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\winsrv.exe 90242a96e37b75f170b8db3e9fb3fec4.exe File opened for modification C:\Windows\SysWOW64\winsrv.exe 90242a96e37b75f170b8db3e9fb3fec4.exe File created C:\Windows\SysWOW64\windows.hlp 90242a96e37b75f170b8db3e9fb3fec4.exe File opened for modification C:\Windows\SysWOW64\windows.hlp 90242a96e37b75f170b8db3e9fb3fec4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4160 90242a96e37b75f170b8db3e9fb3fec4.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4160 wrote to memory of 5020 4160 90242a96e37b75f170b8db3e9fb3fec4.exe 84 PID 4160 wrote to memory of 5020 4160 90242a96e37b75f170b8db3e9fb3fec4.exe 84 PID 4160 wrote to memory of 5020 4160 90242a96e37b75f170b8db3e9fb3fec4.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\90242a96e37b75f170b8db3e9fb3fec4.exe"C:\Users\Admin\AppData\Local\Temp\90242a96e37b75f170b8db3e9fb3fec4.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\90242A~1.EXE > nul2⤵PID:5020
-