Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 07:20
Static task
static1
Behavioral task
behavioral1
Sample
c3036f061c756b0279703655c6ccc1f58b0d2d560ba94924599099b1c73ecbf3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c3036f061c756b0279703655c6ccc1f58b0d2d560ba94924599099b1c73ecbf3.exe
Resource
win10v2004-20240226-en
General
-
Target
c3036f061c756b0279703655c6ccc1f58b0d2d560ba94924599099b1c73ecbf3.exe
-
Size
1.8MB
-
MD5
63b9d980ce167685f61415d082dc681b
-
SHA1
603140235d53cef46e3bac28cdddd5206a1c4246
-
SHA256
c3036f061c756b0279703655c6ccc1f58b0d2d560ba94924599099b1c73ecbf3
-
SHA512
a4161de9bdd90a7260d086080970c3f06df8a99b8cb2db8339b6d105d5b37b47f6e362b7972a6a562263e7d70dc055d5050d5f4ca12215329146fc3b7ad4e25c
-
SSDEEP
49152:zi39+084E6W4W8+m/oX49aXZmMA88DOKmX:G+HVb4W8b+49unDfTX
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2560 sg.tmp 2768 svchost.exe -
Loads dropped DLL 4 IoCs
pid Process 3048 c3036f061c756b0279703655c6ccc1f58b0d2d560ba94924599099b1c73ecbf3.exe 3048 c3036f061c756b0279703655c6ccc1f58b0d2d560ba94924599099b1c73ecbf3.exe 3048 c3036f061c756b0279703655c6ccc1f58b0d2d560ba94924599099b1c73ecbf3.exe 2768 svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeBackupPrivilege 3048 c3036f061c756b0279703655c6ccc1f58b0d2d560ba94924599099b1c73ecbf3.exe Token: SeRestorePrivilege 3048 c3036f061c756b0279703655c6ccc1f58b0d2d560ba94924599099b1c73ecbf3.exe Token: 33 3048 c3036f061c756b0279703655c6ccc1f58b0d2d560ba94924599099b1c73ecbf3.exe Token: SeIncBasePriorityPrivilege 3048 c3036f061c756b0279703655c6ccc1f58b0d2d560ba94924599099b1c73ecbf3.exe Token: SeCreateGlobalPrivilege 3048 c3036f061c756b0279703655c6ccc1f58b0d2d560ba94924599099b1c73ecbf3.exe Token: 33 3048 c3036f061c756b0279703655c6ccc1f58b0d2d560ba94924599099b1c73ecbf3.exe Token: SeIncBasePriorityPrivilege 3048 c3036f061c756b0279703655c6ccc1f58b0d2d560ba94924599099b1c73ecbf3.exe Token: 33 3048 c3036f061c756b0279703655c6ccc1f58b0d2d560ba94924599099b1c73ecbf3.exe Token: SeIncBasePriorityPrivilege 3048 c3036f061c756b0279703655c6ccc1f58b0d2d560ba94924599099b1c73ecbf3.exe Token: SeRestorePrivilege 2560 sg.tmp Token: 35 2560 sg.tmp Token: SeSecurityPrivilege 2560 sg.tmp Token: SeSecurityPrivilege 2560 sg.tmp -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2512 3048 c3036f061c756b0279703655c6ccc1f58b0d2d560ba94924599099b1c73ecbf3.exe 28 PID 3048 wrote to memory of 2512 3048 c3036f061c756b0279703655c6ccc1f58b0d2d560ba94924599099b1c73ecbf3.exe 28 PID 3048 wrote to memory of 2512 3048 c3036f061c756b0279703655c6ccc1f58b0d2d560ba94924599099b1c73ecbf3.exe 28 PID 3048 wrote to memory of 2512 3048 c3036f061c756b0279703655c6ccc1f58b0d2d560ba94924599099b1c73ecbf3.exe 28 PID 3048 wrote to memory of 2560 3048 c3036f061c756b0279703655c6ccc1f58b0d2d560ba94924599099b1c73ecbf3.exe 30 PID 3048 wrote to memory of 2560 3048 c3036f061c756b0279703655c6ccc1f58b0d2d560ba94924599099b1c73ecbf3.exe 30 PID 3048 wrote to memory of 2560 3048 c3036f061c756b0279703655c6ccc1f58b0d2d560ba94924599099b1c73ecbf3.exe 30 PID 3048 wrote to memory of 2560 3048 c3036f061c756b0279703655c6ccc1f58b0d2d560ba94924599099b1c73ecbf3.exe 30 PID 3048 wrote to memory of 2768 3048 c3036f061c756b0279703655c6ccc1f58b0d2d560ba94924599099b1c73ecbf3.exe 32 PID 3048 wrote to memory of 2768 3048 c3036f061c756b0279703655c6ccc1f58b0d2d560ba94924599099b1c73ecbf3.exe 32 PID 3048 wrote to memory of 2768 3048 c3036f061c756b0279703655c6ccc1f58b0d2d560ba94924599099b1c73ecbf3.exe 32 PID 3048 wrote to memory of 2768 3048 c3036f061c756b0279703655c6ccc1f58b0d2d560ba94924599099b1c73ecbf3.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3036f061c756b0279703655c6ccc1f58b0d2d560ba94924599099b1c73ecbf3.exe"C:\Users\Admin\AppData\Local\Temp\c3036f061c756b0279703655c6ccc1f58b0d2d560ba94924599099b1c73ecbf3.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\system32\cmd.execmd.exe /c set2⤵PID:2512
-
-
C:\Users\Admin\AppData\Local\Temp\~2277640203249909706~\sg.tmp7zG_exe x "C:\Users\Admin\AppData\Local\Temp\c3036f061c756b0279703655c6ccc1f58b0d2d560ba94924599099b1c73ecbf3.exe" -y -aos -o"C:\Users\Admin\AppData\Local\Temp\~6043619361850576355"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
C:\Users\Admin\AppData\Local\Temp\~6043619361850576355\svchost.exe"C:\Users\Admin\AppData\Local\Temp\~6043619361850576355\svchost.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26KB
MD5457f1e9754479c07bfa7925fd743bdfa
SHA1d2c99cca4749da75f5b3dd624943e425205f3828
SHA2562fa643f7c1a47a1c9423d4602e32bed58aa7adf1a40ee112e0ce8c7767f438c2
SHA51211b781260b8a76624663053723789c346e97248e5bc0db1a425a73ee5384ec6e78b25d8e95a28c4b2fd48e6b4ae06872e07fd8a47c2dd80224e606504ac65ab9
-
Filesize
833KB
MD59a25c9f4ae1ae0206d0ac670fc26bfb0
SHA1ab9e4e3c92a722d0ccec78a5843d99b29d5a65e5
SHA2567e78f5183d1539b90445356a7069b0f610d9b8c69c2be228e5952fe807d1791b
SHA512ed7c65b387f8a3aeb06a3e06ed6444a928bdaff816391220a633dbbc18b6d8db65e86889ed1ba9e48d8e88dbb3cae4867a7c3a1ff12f473f36f03639a5b711d1
-
Filesize
8KB
MD5dba37d8ab5a06fb6cc1b37d0c613e2b3
SHA154264241b53fb99e1bba03d75afe0a21576db50e
SHA25617968ac6fd3bd4cc7acd0db56a2baf0e2cd250b1690e695ccbe5aa74a1c46838
SHA512beaf395deb50ab2376c019df0d4b51142c7107fd52fa9d8b0f50af456c22dfd59b844b65c842476377194b426779b84ec94e752c7990a6e72e1cd8a70975f24a
-
Filesize
715KB
MD57c4718943bd3f66ebdb47ccca72c7b1e
SHA1f9edfaa7adb8fa528b2e61b2b251f18da10a6969
SHA2564cc32d00338fc7b206a7c052297acf9ac304ae7de9d61a2475a116959c1524fc
SHA512e18c40d646fa4948f90f7471da55489df431f255041ebb6dcef86346f91078c9b27894e27216a4b2fe2a1c5e501c7953c77893cf696930123d28a322d49e1516
-
Filesize
378KB
MD5ebffef560e5e5da5f4898bcd2fe0a773
SHA184e6daa167fc03668261d297440853e9600c41f4
SHA2563b1cc30faa19a802c07767e094c93c5e3574188f58c656671d14dabe2c119253
SHA512fa9ad26689ffe598b620790ce998ee82a52642937bcbf99b508fc058bdbba74150f2ff5904ec30cc621048ffffec15cee199b28f87890c0456728fc4ea66285e
-
Filesize
14KB
MD5dff9e593c345d81e33c26d64ab2becd9
SHA1445192a954e980c30cf4cffff3321aa6f20b58ec
SHA2569bbf2866987131a7de85209faffaa8bbec7ae3136bacc89fd5f87f7753c3355b
SHA512dab911ea39abace7cde34e1f5af1c1a4d850e595334cb215f38bfe91266f14c643bc068f92d39fde049bd1f33208037edb1c5a48c90a1dfd946336b63a51512c