Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 08:43
Static task
static1
Behavioral task
behavioral1
Sample
98f96a313a3db7f91d7fcf2289d9fddb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
98f96a313a3db7f91d7fcf2289d9fddb.exe
Resource
win10v2004-20231222-en
General
-
Target
98f96a313a3db7f91d7fcf2289d9fddb.exe
-
Size
747KB
-
MD5
98f96a313a3db7f91d7fcf2289d9fddb
-
SHA1
4cbd53ad72060451f57f882908836885f92ebf26
-
SHA256
fdb59711e7e5ac8dd3b213754bd9077f880ef146524a92d0fc8ddb8570663d59
-
SHA512
31a7188f50925a4878a747a70a5c9c0d77a9bafffb69fbe38e964f8b89e6eb5cbcdf1d24150d58fa413f94412e84a82a7716a52f2d52a8ad2e7291e42c205540
-
SSDEEP
12288:vWZ/Wq0F5cfOaRW5AOFmLp42TBlFN8BRvOX2Iknjam5I2ViP2m81IcylBv:eVKFuBRW5AOMLzdjaRvTIknOVWa
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2712 msn.cc -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\msn\msn.cc 98f96a313a3db7f91d7fcf2289d9fddb.exe File opened for modification C:\Program Files\msn\msn.cc 98f96a313a3db7f91d7fcf2289d9fddb.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2656 98f96a313a3db7f91d7fcf2289d9fddb.exe Token: SeDebugPrivilege 2712 msn.cc -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2712 msn.cc -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2720 2712 msn.cc 29 PID 2712 wrote to memory of 2720 2712 msn.cc 29 PID 2712 wrote to memory of 2720 2712 msn.cc 29 PID 2712 wrote to memory of 2720 2712 msn.cc 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\98f96a313a3db7f91d7fcf2289d9fddb.exe"C:\Users\Admin\AppData\Local\Temp\98f96a313a3db7f91d7fcf2289d9fddb.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
C:\Program Files\msn\msn.cc"C:\Program Files\msn\msn.cc"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\EXPLORER.EXEEXPLORER.EXE2⤵PID:2720
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
747KB
MD598f96a313a3db7f91d7fcf2289d9fddb
SHA14cbd53ad72060451f57f882908836885f92ebf26
SHA256fdb59711e7e5ac8dd3b213754bd9077f880ef146524a92d0fc8ddb8570663d59
SHA51231a7188f50925a4878a747a70a5c9c0d77a9bafffb69fbe38e964f8b89e6eb5cbcdf1d24150d58fa413f94412e84a82a7716a52f2d52a8ad2e7291e42c205540