Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 17:51
Static task
static1
Behavioral task
behavioral1
Sample
a26180892ad229612d66ec389876ea0c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a26180892ad229612d66ec389876ea0c.exe
Resource
win10v2004-20240221-en
General
-
Target
a26180892ad229612d66ec389876ea0c.exe
-
Size
27KB
-
MD5
a26180892ad229612d66ec389876ea0c
-
SHA1
d5216afbd33e2aad4805a1570fce706b31c1249b
-
SHA256
a0b35a0402a7b2a154eede3f2a17b48e72ee19f2c214d88a1ccf863bf5130e2f
-
SHA512
559bba8f61f59cbefa0574b7acc74777409e6ebc75efe5161b21213f7bba458cef4be58686bdf8a2fb8cef0df1739cd62264b7218c8318dfeccfff6d3a2aa301
-
SSDEEP
384:FE9injM/18TD+UdGvO375WswgUefZrpihrKJ+8jClje9WY4IQYt8wCuzgpNNxOYf:F/jMd/83TBLfhwhrUChh3Iz4NKY7HT
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\sens\Parameters\ServiceDll = "%ProgramFiles(x86)%\\Common Files\\Microsoft Shared\\MSInfo\\zyplxixv.dll" a26180892ad229612d66ec389876ea0c.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SENS\Parameters\ServiceDll = "%ProgramFiles(x86)%\\Common Files\\Microsoft Shared\\MSInfo\\zyplxixv.dll" a26180892ad229612d66ec389876ea0c.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\sens\Parameters\ServiceDll = "%ProgramFiles(x86)%\\Common Files\\Microsoft Shared\\MSInfo\\zyplxixv.dll" a26180892ad229612d66ec389876ea0c.exe -
Loads dropped DLL 3 IoCs
pid Process 1912 a26180892ad229612d66ec389876ea0c.exe 1912 a26180892ad229612d66ec389876ea0c.exe 1912 a26180892ad229612d66ec389876ea0c.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\COMMON Files\Microsoft Shared\MSInfo\zyplxixv.sys a26180892ad229612d66ec389876ea0c.exe File created C:\Program Files\COMMON Files\Microsoft Shared\MSInfo\zyplxixv.drv a26180892ad229612d66ec389876ea0c.exe File opened for modification C:\Program Files\COMMON Files\Microsoft Shared\MSInfo\zyplxixv.dll a26180892ad229612d66ec389876ea0c.exe File created C:\Program Files\COMMON Files\Microsoft Shared\MSInfo\zyplxixv.dll a26180892ad229612d66ec389876ea0c.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1912 a26180892ad229612d66ec389876ea0c.exe 1912 a26180892ad229612d66ec389876ea0c.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 664 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1912 a26180892ad229612d66ec389876ea0c.exe Token: SeLoadDriverPrivilege 1912 a26180892ad229612d66ec389876ea0c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1912 a26180892ad229612d66ec389876ea0c.exe -
Suspicious use of WriteProcessMemory 1 IoCs
description pid Process procid_target PID 1912 wrote to memory of 2520 1912 a26180892ad229612d66ec389876ea0c.exe 73
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\a26180892ad229612d66ec389876ea0c.exe"C:\Users\Admin\AppData\Local\Temp\a26180892ad229612d66ec389876ea0c.exe"1⤵
- Sets DLL path for service in the registry
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD58ce495c4608871b543d796ad6f2b9832
SHA17f1815342a1b3da4a5474a6f4278bade4f85230d
SHA256c12eb3b8bb3f8e38a43d9c5bc02418944ef0e270340aaa24b285eb3b83a63fa4
SHA51286d883f4d1c788d920c6a2af8485088b59addbf6fb523ad1e58419a266ed050ca0fac4b102b1a17c3376382a1a357d37e3bc9f2c0cff2e6fe3f686fd1b30c445
-
Filesize
28KB
MD5b8739f1bc6b1405a2c5b05b652250d8e
SHA1d6012e55ab90f67f7da08b12f7da8644e95555dc
SHA256f268455ac5ea436f5a21eb24d1ef6d4fdd055f4fc4b97d81b8e6d863f0351591
SHA5128d70c05608013f6a1acd4e0e5a3ff1ee8980484ceae58fadb7dd8ef0e65a16065cb01f373f9a25f38c1ad9f72e5affc27fc410243f3756fd94242d828508c7cc