Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
50s -
max time network
53s -
platform
windows11-21h2_x64 -
resource
win11-20240214-en -
resource tags
arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system -
submitted
20/02/2024, 18:46
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
TEST_ranodm_things.exe
Resource
win11-20240214-en
5 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
TEST_ranodm_things.exe
-
Size
4.2MB
-
MD5
cd5cbd2a7014349ddf809f63ac161443
-
SHA1
88d748bd9c1fd90809de4ff4fbadfecb9b2dd0a1
-
SHA256
6ded493c628879e253cf0ed8b08b404e67143f20a039616f6967a1aac249d67c
-
SHA512
8b6a91b52c2991638e11594b44d131b1b11bf1391d930ad88691dba4c33ba175fa79731af4600a7620a786410374d964a7960c3916e8b8e318ea3c17ac3c5f24
-
SSDEEP
98304:g0jE0CBdh4jTelA0bPcVpzj3yyqi0pjTlMMm07VZBqF:DjEhhaiA8kVpIisTl/7RZe
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "126" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4290799360" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = 99ebff004cc2ff000091f8000078d4000067c000003e9200001a6800f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292114432" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 4116 shutdown.exe Token: SeRemoteShutdownPrivilege 4116 shutdown.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3112 PickerHost.exe 4604 LogonUI.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3468 wrote to memory of 2328 3468 TEST_ranodm_things.exe 80 PID 3468 wrote to memory of 2328 3468 TEST_ranodm_things.exe 80 PID 3468 wrote to memory of 2328 3468 TEST_ranodm_things.exe 80 PID 2328 wrote to memory of 4116 2328 cmd.exe 82 PID 2328 wrote to memory of 4116 2328 cmd.exe 82 PID 2328 wrote to memory of 4116 2328 cmd.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\TEST_ranodm_things.exe"C:\Users\Admin\AppData\Local\Temp\TEST_ranodm_things.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k shutdown -s & color a & dir/s2⤵
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\shutdown.exeshutdown -s3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4116
-
-
-
C:\Windows\System32\PickerHost.exeC:\Windows\System32\PickerHost.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:3112
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3a0f855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4604