Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 13:14
Static task
static1
Behavioral task
behavioral1
Sample
9982bc0277110ed35b4fff016cc3cc67.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9982bc0277110ed35b4fff016cc3cc67.exe
Resource
win10v2004-20231215-en
General
-
Target
9982bc0277110ed35b4fff016cc3cc67.exe
-
Size
764KB
-
MD5
9982bc0277110ed35b4fff016cc3cc67
-
SHA1
9219cae7122368786aabdfc34587d61dc5a66eea
-
SHA256
aadb31d7bd157b482c0a24116b08f83f2f9495be8c9dacbedeeb91804462ce55
-
SHA512
51b971fb626e18d268894478468f3b6139a20880ff9200c45c8b3a1fd77358702d3cab7eec971d26ea4bca5ebc634528dddb894214ee9a462371a5f209ce8954
-
SSDEEP
12288:N6lg9NDK9jbrW5AwGwHDx1fKIWnxvVtO2tjvP5cU7MoShS/JXKCqLR:c+9Y9/rW5AjixF+xvjO2tRWinq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 876 G_Server2.03.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\G_Server2.03.exe 9982bc0277110ed35b4fff016cc3cc67.exe File opened for modification C:\Windows\G_Server2.03.exe 9982bc0277110ed35b4fff016cc3cc67.exe File created C:\Windows\DELME.BAT 9982bc0277110ed35b4fff016cc3cc67.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2812 9982bc0277110ed35b4fff016cc3cc67.exe Token: SeDebugPrivilege 876 G_Server2.03.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 876 G_Server2.03.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 876 wrote to memory of 852 876 G_Server2.03.exe 85 PID 876 wrote to memory of 852 876 G_Server2.03.exe 85 PID 2812 wrote to memory of 1708 2812 9982bc0277110ed35b4fff016cc3cc67.exe 86 PID 2812 wrote to memory of 1708 2812 9982bc0277110ed35b4fff016cc3cc67.exe 86 PID 2812 wrote to memory of 1708 2812 9982bc0277110ed35b4fff016cc3cc67.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\9982bc0277110ed35b4fff016cc3cc67.exe"C:\Users\Admin\AppData\Local\Temp\9982bc0277110ed35b4fff016cc3cc67.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\DELME.BAT2⤵PID:1708
-
-
C:\Windows\G_Server2.03.exeC:\Windows\G_Server2.03.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Program Files\Internet ExplorER\IEXPLORE.EXE"C:\Program Files\Internet ExplorER\IEXPLORE.EXE"2⤵PID:852
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
190B
MD53253caf75d9dd8a802a0a202d45ed207
SHA1d3ec907bed1662434ea7b76f9eb19cbb881f53ed
SHA256d50bc85cfda01e5227bae42414b1cee7c4077348651662c45d835a77f2bdc370
SHA512c58a68b935b7e35b38c61ffe66c169a36c29a7c33336b2ead17cc01ef637f88bab70ec02ba23abcc66e9c55135dd01d325319a3554bbe95758da5ab068ce75e1
-
Filesize
764KB
MD59982bc0277110ed35b4fff016cc3cc67
SHA19219cae7122368786aabdfc34587d61dc5a66eea
SHA256aadb31d7bd157b482c0a24116b08f83f2f9495be8c9dacbedeeb91804462ce55
SHA51251b971fb626e18d268894478468f3b6139a20880ff9200c45c8b3a1fd77358702d3cab7eec971d26ea4bca5ebc634528dddb894214ee9a462371a5f209ce8954