Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 07:38
Behavioral task
behavioral1
Sample
98d8ad3d04e00e250c447ed67f08c4a3.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
98d8ad3d04e00e250c447ed67f08c4a3.exe
Resource
win10v2004-20231222-en
General
-
Target
98d8ad3d04e00e250c447ed67f08c4a3.exe
-
Size
12.3MB
-
MD5
98d8ad3d04e00e250c447ed67f08c4a3
-
SHA1
4d5c89af51f63d3689ce56d9a666ba15732229a3
-
SHA256
0513d4c04b29a4a2671a12f7c1213f7536d4ca979c99287bc9e156f5416583cc
-
SHA512
b94e0722b5b46c4674f1ab9ec028bc18e46eea969a2578fdf9bc47b1a80f6fe4727b65b2e6692329dc3b9f24450800b7cbe16d4db149b78f8e36367c513ec7ec
-
SSDEEP
393216:4fLHvRcgV3jrz7O+auf/diuiG6d8VmLjzAkxbIs440oG:GLHvRP3j/y+Ff/UG6SVgxbIT40z
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2392-1-0x0000000000400000-0x0000000001B55000-memory.dmp vmprotect behavioral1/memory/2392-4-0x0000000000400000-0x0000000001B55000-memory.dmp vmprotect behavioral1/memory/2392-48-0x0000000000400000-0x0000000001B55000-memory.dmp vmprotect behavioral1/memory/2392-49-0x0000000000400000-0x0000000001B55000-memory.dmp vmprotect -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 98d8ad3d04e00e250c447ed67f08c4a3.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2392 98d8ad3d04e00e250c447ed67f08c4a3.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2392 98d8ad3d04e00e250c447ed67f08c4a3.exe 2392 98d8ad3d04e00e250c447ed67f08c4a3.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2664 wmic.exe Token: SeSecurityPrivilege 2664 wmic.exe Token: SeTakeOwnershipPrivilege 2664 wmic.exe Token: SeLoadDriverPrivilege 2664 wmic.exe Token: SeSystemProfilePrivilege 2664 wmic.exe Token: SeSystemtimePrivilege 2664 wmic.exe Token: SeProfSingleProcessPrivilege 2664 wmic.exe Token: SeIncBasePriorityPrivilege 2664 wmic.exe Token: SeCreatePagefilePrivilege 2664 wmic.exe Token: SeBackupPrivilege 2664 wmic.exe Token: SeRestorePrivilege 2664 wmic.exe Token: SeShutdownPrivilege 2664 wmic.exe Token: SeDebugPrivilege 2664 wmic.exe Token: SeSystemEnvironmentPrivilege 2664 wmic.exe Token: SeRemoteShutdownPrivilege 2664 wmic.exe Token: SeUndockPrivilege 2664 wmic.exe Token: SeManageVolumePrivilege 2664 wmic.exe Token: 33 2664 wmic.exe Token: 34 2664 wmic.exe Token: 35 2664 wmic.exe Token: SeIncreaseQuotaPrivilege 2664 wmic.exe Token: SeSecurityPrivilege 2664 wmic.exe Token: SeTakeOwnershipPrivilege 2664 wmic.exe Token: SeLoadDriverPrivilege 2664 wmic.exe Token: SeSystemProfilePrivilege 2664 wmic.exe Token: SeSystemtimePrivilege 2664 wmic.exe Token: SeProfSingleProcessPrivilege 2664 wmic.exe Token: SeIncBasePriorityPrivilege 2664 wmic.exe Token: SeCreatePagefilePrivilege 2664 wmic.exe Token: SeBackupPrivilege 2664 wmic.exe Token: SeRestorePrivilege 2664 wmic.exe Token: SeShutdownPrivilege 2664 wmic.exe Token: SeDebugPrivilege 2664 wmic.exe Token: SeSystemEnvironmentPrivilege 2664 wmic.exe Token: SeRemoteShutdownPrivilege 2664 wmic.exe Token: SeUndockPrivilege 2664 wmic.exe Token: SeManageVolumePrivilege 2664 wmic.exe Token: 33 2664 wmic.exe Token: 34 2664 wmic.exe Token: 35 2664 wmic.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2392 98d8ad3d04e00e250c447ed67f08c4a3.exe 2392 98d8ad3d04e00e250c447ed67f08c4a3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2664 2392 98d8ad3d04e00e250c447ed67f08c4a3.exe 28 PID 2392 wrote to memory of 2664 2392 98d8ad3d04e00e250c447ed67f08c4a3.exe 28 PID 2392 wrote to memory of 2664 2392 98d8ad3d04e00e250c447ed67f08c4a3.exe 28 PID 2392 wrote to memory of 2664 2392 98d8ad3d04e00e250c447ed67f08c4a3.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\98d8ad3d04e00e250c447ed67f08c4a3.exe"C:\Users\Admin\AppData\Local\Temp\98d8ad3d04e00e250c447ed67f08c4a3.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\Wbem\wmic.exewmic BaseBoard get SerialNumber2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2664
-