Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
115s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 08:23
Behavioral task
behavioral1
Sample
DeathNetv7.1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
DeathNetv7.1.exe
Resource
win10v2004-20231215-en
General
-
Target
DeathNetv7.1.exe
-
Size
6.7MB
-
MD5
a7534b98272a21d058c5873636adacee
-
SHA1
debf2595890bf9dacf16c707d0ffc7efc98f410b
-
SHA256
570214111b2a2381015c3607441a5645eac508a8267b6fc007a861fc07ef17ec
-
SHA512
5ad6f1b18ad282796de33deca061be51d3f3806d37e5e1ccafbb675df1ff1f1c352da4fe6e6a8171674929dd293dedfd70344050baf7e4056dfdfdf80ddff7ce
-
SSDEEP
196608:ylSCTWeeA3tlKXqXWnAGQIz6qu7ikZCN78VgbKqKeJ:GSCTWeeGlKjArIxky78mbMe
Malware Config
Signatures
-
Loads dropped DLL 12 IoCs
pid Process 4284 DeathNetv7.1.exe 4284 DeathNetv7.1.exe 4284 DeathNetv7.1.exe 4284 DeathNetv7.1.exe 4284 DeathNetv7.1.exe 4284 DeathNetv7.1.exe 4284 DeathNetv7.1.exe 4284 DeathNetv7.1.exe 4284 DeathNetv7.1.exe 4284 DeathNetv7.1.exe 4284 DeathNetv7.1.exe 4284 DeathNetv7.1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4236 powershell.exe 4236 powershell.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: 35 4284 DeathNetv7.1.exe Token: SeDebugPrivilege 4236 powershell.exe Token: SeIncreaseQuotaPrivilege 4236 powershell.exe Token: SeSecurityPrivilege 4236 powershell.exe Token: SeTakeOwnershipPrivilege 4236 powershell.exe Token: SeLoadDriverPrivilege 4236 powershell.exe Token: SeSystemProfilePrivilege 4236 powershell.exe Token: SeSystemtimePrivilege 4236 powershell.exe Token: SeProfSingleProcessPrivilege 4236 powershell.exe Token: SeIncBasePriorityPrivilege 4236 powershell.exe Token: SeCreatePagefilePrivilege 4236 powershell.exe Token: SeBackupPrivilege 4236 powershell.exe Token: SeRestorePrivilege 4236 powershell.exe Token: SeShutdownPrivilege 4236 powershell.exe Token: SeDebugPrivilege 4236 powershell.exe Token: SeSystemEnvironmentPrivilege 4236 powershell.exe Token: SeRemoteShutdownPrivilege 4236 powershell.exe Token: SeUndockPrivilege 4236 powershell.exe Token: SeManageVolumePrivilege 4236 powershell.exe Token: 33 4236 powershell.exe Token: 34 4236 powershell.exe Token: 35 4236 powershell.exe Token: 36 4236 powershell.exe Token: SeIncreaseQuotaPrivilege 4236 powershell.exe Token: SeSecurityPrivilege 4236 powershell.exe Token: SeTakeOwnershipPrivilege 4236 powershell.exe Token: SeLoadDriverPrivilege 4236 powershell.exe Token: SeSystemProfilePrivilege 4236 powershell.exe Token: SeSystemtimePrivilege 4236 powershell.exe Token: SeProfSingleProcessPrivilege 4236 powershell.exe Token: SeIncBasePriorityPrivilege 4236 powershell.exe Token: SeCreatePagefilePrivilege 4236 powershell.exe Token: SeBackupPrivilege 4236 powershell.exe Token: SeRestorePrivilege 4236 powershell.exe Token: SeShutdownPrivilege 4236 powershell.exe Token: SeDebugPrivilege 4236 powershell.exe Token: SeSystemEnvironmentPrivilege 4236 powershell.exe Token: SeRemoteShutdownPrivilege 4236 powershell.exe Token: SeUndockPrivilege 4236 powershell.exe Token: SeManageVolumePrivilege 4236 powershell.exe Token: 33 4236 powershell.exe Token: 34 4236 powershell.exe Token: 35 4236 powershell.exe Token: 36 4236 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1576 wrote to memory of 4284 1576 DeathNetv7.1.exe 86 PID 1576 wrote to memory of 4284 1576 DeathNetv7.1.exe 86 PID 4284 wrote to memory of 4236 4284 DeathNetv7.1.exe 87 PID 4284 wrote to memory of 4236 4284 DeathNetv7.1.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\DeathNetv7.1.exe"C:\Users\Admin\AppData\Local\Temp\DeathNetv7.1.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\DeathNetv7.1.exe"C:\Users\Admin\AppData\Local\Temp\DeathNetv7.1.exe"2⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -NoLogo -NonInteractive -Command -3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4236
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD588dadc5e4d5c118532392f2217d09660
SHA1d2ece42f50c991a8b28c0add4475302edcf20aa6
SHA25627e4d40ef18a4b1a3d60523f50da3df07aba730faf8cf713d4c904cc0310842d
SHA512482d6be2f67f6a2fd35e5f1000ab86822b4d190691f7cf37675d1dfd40838b726c99eb2df4d199752d0fb24619d08a3a3acfa16f3af61f9a89c4f9508852f477
-
Filesize
87KB
MD50e675d4a7a5b7ccd69013386793f68eb
SHA16e5821ddd8fea6681bda4448816f39984a33596b
SHA256bf5ff4603557c9959acec995653d052d9054ad4826df967974efd2f377c723d1
SHA512cae69a90f92936febde67dacd6ce77647cb3b3ed82bb66463cd9047e90723f633aa2fc365489de09fecdc510be15808c183b12e6236b0893af19633f6a670e66
-
Filesize
87KB
MD54079b0e80ef0f97ce35f272410bd29fe
SHA119ef1b81a1a0b3286bac74b6af9a18ed381bf92c
SHA256466d21407f5b589b20c464c51bfe2be420e5a586a7f394908448545f16b08b33
SHA51221cd5a848f69b0d1715e62dca89d1501f7f09edfe0fa2947cfc473ca72ed3355bfccd32c3a0cdd5f65311e621c89ddb67845945142a4b1bdc5c70e7f7b99ed67
-
Filesize
129KB
MD52f21f50d2252e3083555a724ca57b71e
SHA149ec351d569a466284b8cc55ee9aeaf3fbf20099
SHA25609887f07f4316057d3c87e3a907c2235dc6547e54ed4f5f9125f99e547d58bce
SHA512e71ff1e63105f51a4516498cd09f8156d7208758c5dc9a74e7654844e5cefc6e84f8fe98a1f1bd7a459a98965fbe913cb5edb552fffa1e33dfda709f918dddeb
-
Filesize
266KB
MD5ffa3400512beeb602ffae7c5895b231b
SHA1a200ca5cfa9b7600e9a6544acd625ca189824814
SHA25600cd2844a63920a7a09cc61364ef556643c9d05c9ed3885b28f2ef6f81acc5f7
SHA512e4533ed3fcb8236863527703040c20736cbd36e8fc0a2d0698121a17d72c6848a38538a8962bc1e941a81087b5853619dcbf35540e322aedf5eb860bd1d03f77
-
Filesize
38KB
MD5c3b19ad5381b9832e313a448de7c5210
SHA151777d53e1ea5592efede1ed349418345b55f367
SHA256bdf4a536f783958357d2e0055debdc3cf7790ee28beb286452eec0354a346bdc
SHA5127f8d3b79a58612e850d18e8952d14793e974483c688b5daee217baaa83120fd50d1e036ca4a1b59d748b22951744377257d2a8f094a4b4de1f79fecd4bf06afb
-
Filesize
251KB
MD5a567a2ecb4737e5b70500eac25f23049
SHA1951673dd1a8b5a7f774d34f61b765da2b4026cab
SHA256a4cba6d82369c57cb38a32d4dacb99225f58206d2dd9883f6fc0355d6ddaec3d
SHA51297f3b1c20c9a7ed52d9781d1e47f4606579faeae4d98ba09963b99cd2f13426dc0fc2aeb4bb3af18ed584c8ba9d5b6358d8e34687a1d5f74a3954b3f84d12349
-
Filesize
74KB
MD5d7e7a7592338ce88e131f858a84deec6
SHA13add8cd9fbbf7f5fa40d8a972d9ac18282dcf357
SHA2564ba5d0e236711bdcb29ce9c3138406f7321bd00587b6b362b4ace94379cf52d5
SHA51296649296e8ccdc06d6787902185e21020a700436fc7007b2aa6464d0af7f9eb66a4485b3d46461106ac5f1d35403183daa1925e842e7df6f2db9e3e833b18fb4
-
Filesize
120KB
MD5d429ff3fd91943ad8539c076c2a0c75f
SHA1bb6611ddca8ebe9e4790f20366b89253a27aed02
SHA25645c8b99ba9e832cab85e9d45b5601b7a1d744652e7f756ec6a6091e1d8398dd4
SHA512019178eecb9fb3d531e39854685a53fa3df5a84b1424e4a195f0a51ca0587d1524fd8fbd6d4360188ea9c2f54d7019c7d335ec6dc5471128159153c2287b0e18
-
Filesize
761KB
MD5f3c04facda456d02534231e84137c917
SHA1c0fb81279a6998f2f5b7b2bc80f458ec1d047cd3
SHA2567f4a3dce0cebd74d6a2e66b8135acbfe4e7e882a1aeb71208cb88d426b6cc42a
SHA512fe47210889971881749e2841be77b915098c3dcc3b58844352354060d30c9ae464eac6e817ea4670c637a7c9995c78f52c6e2e7ed4b64d3d1be0ce241b52d9a7
-
Filesize
2.4MB
MD5022a61849adab67e3a59bcf4d0f1c40b
SHA1fca2e1e8c30767c88f7ab5b42fe2bd9abb644672
SHA2562a57183839c3e9cc4618fb1994c40e47672a8b6daffaa76c5f89cf2542b02c2f
SHA51294ac596181f0887af7bf02a7ce31327ad443bb7fe2d668217953e0f0c782d19296a80de965008118708afd9bda14fd8c78f49785ebf7abcc37d166b692e88246
-
Filesize
517KB
MD54ec3c7fe06b18086f83a18ffbb3b9b55
SHA131d66ffab754fe002914bff2cf58c7381f8588d9
SHA2569d35d8dd9854a4d4205ae4eafe28c92f8d0e3ac7c494ac4a6a117f6e4b45170c
SHA512d53ee1f7c082a27ace38bf414529d25223c46bfae1be0a1fbe0c5eab10a7b10d23571fd9812c3be591c34059a4c0028699b4bf50736582b06a17ae1ef1b5341e
-
Filesize
3.7MB
MD562125a78b9be5ac58c3b55413f085028
SHA146c643f70dd3b3e82ab4a5d1bc979946039e35b2
SHA25617c29e6188b022f795092d72a1fb58630a7c723d70ac5bc3990b20cd2eb2a51f
SHA512e63f4aa8fc5cd1569ae401e283bc8e1445859131eb0db76581b941f1085670c549cbc3fedf911a21c1237b0f3f66f62b10c60e88b923fa058f7fafee18dd0fa4
-
Filesize
26KB
MD5c30e5eccf9c62b0b0bc57ed591e16cc0
SHA124aece32d4f215516ee092ab72471d1e15c3ba24
SHA25656d1a971762a1a56a73bdf64727e416ffa9395b8af4efcd218f5203d744e1268
SHA5123e5c58428d4c166a3d6d3e153b46c4a57cca2e402001932ec90052c4689b7f5ba4c5f122d1a66d282b2a0a0c9916dc5a5b5e5f6dfc952cdb62332ac29cb7b36a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82