Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/03/2024, 03:50
Static task
static1
Behavioral task
behavioral1
Sample
f5078cf0b6c1c40c51987ab9de59c3b128f639b54ad2f40251d1f3096bf809f0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f5078cf0b6c1c40c51987ab9de59c3b128f639b54ad2f40251d1f3096bf809f0.exe
Resource
win10v2004-20240226-en
General
-
Target
f5078cf0b6c1c40c51987ab9de59c3b128f639b54ad2f40251d1f3096bf809f0.exe
-
Size
14KB
-
MD5
155547ac9f5b12577c3f224928ba3db7
-
SHA1
929c6df8df5f04c1591f8128e00a717c55353fdd
-
SHA256
f5078cf0b6c1c40c51987ab9de59c3b128f639b54ad2f40251d1f3096bf809f0
-
SHA512
04a2a34e1ce01c474e73bfa5de01889ff16c665b9f2ae1d2a667c74ac23b53350f90a817bdf554283bb1f37af5fbbf6887372f8138658f041a100c09a62d4a76
-
SSDEEP
192:vZcpE/exr76ZLvdKHfgtxpyuTWuWMkrdE7dOS2WvB6Wv:vZzercTmeyeg99ZWZ6Wv
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\eventvwr.msc mmc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2420 dw20.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeSecurityPrivilege 2248 mmc.exe Token: 33 2248 mmc.exe Token: SeIncBasePriorityPrivilege 2248 mmc.exe Token: 33 2248 mmc.exe Token: SeIncBasePriorityPrivilege 2248 mmc.exe Token: 33 2248 mmc.exe Token: SeIncBasePriorityPrivilege 2248 mmc.exe Token: 33 2248 mmc.exe Token: SeIncBasePriorityPrivilege 2248 mmc.exe Token: 33 2248 mmc.exe Token: SeIncBasePriorityPrivilege 2248 mmc.exe Token: 33 2248 mmc.exe Token: SeIncBasePriorityPrivilege 2248 mmc.exe Token: 33 2248 mmc.exe Token: SeIncBasePriorityPrivilege 2248 mmc.exe Token: 33 2248 mmc.exe Token: SeIncBasePriorityPrivilege 2248 mmc.exe Token: 33 2248 mmc.exe Token: SeIncBasePriorityPrivilege 2248 mmc.exe Token: 33 2248 mmc.exe Token: SeIncBasePriorityPrivilege 2248 mmc.exe Token: 33 2248 mmc.exe Token: SeIncBasePriorityPrivilege 2248 mmc.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2484 mmc.exe 2248 mmc.exe 2248 mmc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2484 2164 f5078cf0b6c1c40c51987ab9de59c3b128f639b54ad2f40251d1f3096bf809f0.exe 28 PID 2164 wrote to memory of 2484 2164 f5078cf0b6c1c40c51987ab9de59c3b128f639b54ad2f40251d1f3096bf809f0.exe 28 PID 2164 wrote to memory of 2484 2164 f5078cf0b6c1c40c51987ab9de59c3b128f639b54ad2f40251d1f3096bf809f0.exe 28 PID 2164 wrote to memory of 2484 2164 f5078cf0b6c1c40c51987ab9de59c3b128f639b54ad2f40251d1f3096bf809f0.exe 28 PID 2484 wrote to memory of 2248 2484 mmc.exe 29 PID 2484 wrote to memory of 2248 2484 mmc.exe 29 PID 2484 wrote to memory of 2248 2484 mmc.exe 29 PID 2484 wrote to memory of 2248 2484 mmc.exe 29 PID 2248 wrote to memory of 2420 2248 mmc.exe 30 PID 2248 wrote to memory of 2420 2248 mmc.exe 30 PID 2248 wrote to memory of 2420 2248 mmc.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5078cf0b6c1c40c51987ab9de59c3b128f639b54ad2f40251d1f3096bf809f0.exe"C:\Users\Admin\AppData\Local\Temp\f5078cf0b6c1c40c51987ab9de59c3b128f639b54ad2f40251d1f3096bf809f0.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\mmc.exemmc.exe /s C:\Windows\system32\eventvwr.msc2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\system32\mmc.exe"C:\Windows\system32\eventvwr.msc" /s C:\Windows\system32\eventvwr.msc3⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 13124⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:2420
-
-
-