Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/02/2024, 08:59
Static task
static1
Behavioral task
behavioral1
Sample
80a7dbee8158a3b6fde39bceceec0635c414145c069852a9047d06c124361d6d.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
80a7dbee8158a3b6fde39bceceec0635c414145c069852a9047d06c124361d6d.exe
Resource
win10v2004-20240226-en
General
-
Target
80a7dbee8158a3b6fde39bceceec0635c414145c069852a9047d06c124361d6d.exe
-
Size
2.1MB
-
MD5
36883a998e16240311949a43f5c1ecb7
-
SHA1
50edc4c84eb8c15ab1653433700fce86af60f0b0
-
SHA256
80a7dbee8158a3b6fde39bceceec0635c414145c069852a9047d06c124361d6d
-
SHA512
c9321e31756ff0e2d4ff115293a4e44399ef8fcde3a470e0d7e989f107776a1d6c383f12815ea19d57820d39e94e4bbb40deae5d695ec5fa4e2d055fb59d95a0
-
SSDEEP
49152:MwdhBkGMb18MLjRkRl+2HxYc0vFuvNX/oj6nPtI:MwdhBkGMb188jaz+2RY
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,\"C:\\Users\\Admin\\AppData\\Local\\Pic1fPBkmq\\LOHejsSdpL.exe\" -s" 80a7dbee8158a3b6fde39bceceec0635c414145c069852a9047d06c124361d6d.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 80a7dbee8158a3b6fde39bceceec0635c414145c069852a9047d06c124361d6d.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 23 raw.githubusercontent.com 24 raw.githubusercontent.com 30 raw.githubusercontent.com 32 raw.githubusercontent.com 35 raw.githubusercontent.com -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 80a7dbee8158a3b6fde39bceceec0635c414145c069852a9047d06c124361d6d.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1