Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 00:44
Static task
static1
Behavioral task
behavioral1
Sample
980b0a5a2e1928152808095ff28cf618.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
980b0a5a2e1928152808095ff28cf618.exe
Resource
win10v2004-20231222-en
General
-
Target
980b0a5a2e1928152808095ff28cf618.exe
-
Size
24KB
-
MD5
980b0a5a2e1928152808095ff28cf618
-
SHA1
d12903e7421d5b7d5f1621af45e201b6a1b004f5
-
SHA256
5ccfc8bd24542e624bcda0a41fcf9f4071fe3af15d8132accbfd32623dde168c
-
SHA512
00984ed57ae6553fbe52ae1b1a6a055d0ece3ccc6b77fae513afd76241ea3fd6701f52d34fdec190ca4917c4d4010da2033465e6ccf376722a4df545d14ab904
-
SSDEEP
384:E3eVES+/xwGkRKJlXlM61qmTTMVF9/q5Mv0:bGS+ZfbJJO8qYoAX
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" 980b0a5a2e1928152808095ff28cf618.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe 980b0a5a2e1928152808095ff28cf618.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4304 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 4312 ipconfig.exe 4480 NETSTAT.EXE -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4304 tasklist.exe Token: SeDebugPrivilege 4480 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1000 980b0a5a2e1928152808095ff28cf618.exe 1000 980b0a5a2e1928152808095ff28cf618.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1000 wrote to memory of 4704 1000 980b0a5a2e1928152808095ff28cf618.exe 83 PID 1000 wrote to memory of 4704 1000 980b0a5a2e1928152808095ff28cf618.exe 83 PID 1000 wrote to memory of 4704 1000 980b0a5a2e1928152808095ff28cf618.exe 83 PID 4704 wrote to memory of 5016 4704 cmd.exe 85 PID 4704 wrote to memory of 5016 4704 cmd.exe 85 PID 4704 wrote to memory of 5016 4704 cmd.exe 85 PID 4704 wrote to memory of 4312 4704 cmd.exe 86 PID 4704 wrote to memory of 4312 4704 cmd.exe 86 PID 4704 wrote to memory of 4312 4704 cmd.exe 86 PID 4704 wrote to memory of 4304 4704 cmd.exe 87 PID 4704 wrote to memory of 4304 4704 cmd.exe 87 PID 4704 wrote to memory of 4304 4704 cmd.exe 87 PID 4704 wrote to memory of 3312 4704 cmd.exe 89 PID 4704 wrote to memory of 3312 4704 cmd.exe 89 PID 4704 wrote to memory of 3312 4704 cmd.exe 89 PID 3312 wrote to memory of 3920 3312 net.exe 90 PID 3312 wrote to memory of 3920 3312 net.exe 90 PID 3312 wrote to memory of 3920 3312 net.exe 90 PID 4704 wrote to memory of 4480 4704 cmd.exe 91 PID 4704 wrote to memory of 4480 4704 cmd.exe 91 PID 4704 wrote to memory of 4480 4704 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\980b0a5a2e1928152808095ff28cf618.exe"C:\Users\Admin\AppData\Local\Temp\980b0a5a2e1928152808095ff28cf618.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\SysWOW64\cmd.execmd /c set3⤵PID:5016
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:4312
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4304
-
-
C:\Windows\SysWOW64\net.exenet start3⤵
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start4⤵PID:3920
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:4480
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5f79a53205081207942138ed58fba4043
SHA11ff174576df3c59f710c12482dab63cdd340e3ac
SHA256f11e1a8909db0a00dd2b6123cf9f9ed59ad3a23e4045924c9c5af6a4a1734249
SHA51231d7cc1c1350883846d2198d7540c7980cac388ee566fd280bd5365294b5cbd830f5165d6f75cfc5eaafb7654e06f466af3bda6b542a3b0d116a1f4ec65d00a0