Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 06:08
Static task
static1
Behavioral task
behavioral1
Sample
a1234afaf3fec88126e282ddb4ccb052.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a1234afaf3fec88126e282ddb4ccb052.exe
Resource
win10v2004-20240221-en
General
-
Target
a1234afaf3fec88126e282ddb4ccb052.exe
-
Size
687KB
-
MD5
a1234afaf3fec88126e282ddb4ccb052
-
SHA1
8c00e0df60feec0254a54cd0edb4327cdac2cdb8
-
SHA256
dccca60d7f67e773dce519de7e535f95880d08c6692966693592467fdfedc72b
-
SHA512
c0ecb2ff756225c446f34abb45503ecd52547dc63da42db5229f759fb30001fa42b1c7a877740fe23095fa0b6e367f6cbc38f34d53d9de20b328d4e70b3479e3
-
SSDEEP
12288:rKqI/NVA4LuX1rTcMYWnXUOC+0b4ZCOh+F3Z4mxxODRw2RaeoWgxRBuMr:rZI/NulfXYeU/Tc0Oh+QmX8RwaaeqTxr
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2280 4.exe 4008 server.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a1234afaf3fec88126e282ddb4ccb052.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\server.exe 4.exe File created C:\Windows\uninstal.bat 4.exe File created C:\Windows\server.exe 4.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ server.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" server.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" server.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" server.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" server.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2280 4.exe Token: SeDebugPrivilege 4008 server.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4008 server.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3780 wrote to memory of 2280 3780 a1234afaf3fec88126e282ddb4ccb052.exe 89 PID 3780 wrote to memory of 2280 3780 a1234afaf3fec88126e282ddb4ccb052.exe 89 PID 3780 wrote to memory of 2280 3780 a1234afaf3fec88126e282ddb4ccb052.exe 89 PID 4008 wrote to memory of 1652 4008 server.exe 91 PID 4008 wrote to memory of 1652 4008 server.exe 91 PID 2280 wrote to memory of 4520 2280 4.exe 92 PID 2280 wrote to memory of 4520 2280 4.exe 92 PID 2280 wrote to memory of 4520 2280 4.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1234afaf3fec88126e282ddb4ccb052.exe"C:\Users\Admin\AppData\Local\Temp\a1234afaf3fec88126e282ddb4ccb052.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\uninstal.bat3⤵PID:4520
-
-
-
C:\Windows\server.exeC:\Windows\server.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:1652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
449KB
MD5eff865c27a4ab96bc5f0ba832a93b803
SHA1358b2b529d381acf718853de300252d4733140e2
SHA2566a372078a02a7c49886262c69123d209d8308ca8b8b2107c551c28f90626f8ef
SHA512933a024d2dfba32eead85eea7cfc1b436f5dd939d04d933e2eb546603b9542454ccb4a86503fb80cd2525763ac22383e903c2ea01ee11851bae05245655ee532
-
Filesize
57KB
MD5dad3ecac9a41a91890ffcc1892b7d769
SHA1ea176c891080efe72ecef31a9de2daa4c0d0d17a
SHA256701ab2d922ee3e1ce488046482b3b6054da69d64eca32437636440ae2345b9e7
SHA512ebc634847e57ed83615aef3096b498ea55d8752c337b9fd51b1f0c1092a99beb4171cbc2cd28d4b54699aef12663e3b648472045ed24224b0b3bfebf9485c912
-
Filesize
775KB
MD5dae06df43424b36cb828a7f6e7ff5f6a
SHA1c29eb9c664b0370a98869b6380f8777ac0018c05
SHA2564a08e89e44a7c7f333f5716120a3cb0fa8f14ae3559adc8f1bd7eadcc0ac5d63
SHA5129648ca7578133a5ee62666426a1c53b5a20ac59f9f204d826b6bce2df46a4340086ac259ab6b9d096c633f32af840ced3dfb3bb6029984095ff9762a302cc300
-
Filesize
150B
MD55edd682a8b1f2bf873300774f954ab03
SHA12cca4e743d02dbccf31b784ea26a60c03dcc9637
SHA256a34c51ec5d2ac66ef75719e7dee61b6e89e74d054712438da2585ec92ce0865a
SHA512916f0e846a38f63aae996e2a3957fa24fed3bcaa6add68c529e3cc0aa063dca49b98d42c92317bfc2f43d745c492e1e1e6f5db0c986b9682f4b9b0cf0afd7bd2