Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 14:06
Static task
static1
Behavioral task
behavioral1
Sample
cb99b97464bc521a09aaf995875e6d6b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cb99b97464bc521a09aaf995875e6d6b.exe
Resource
win10v2004-20231215-en
General
-
Target
cb99b97464bc521a09aaf995875e6d6b.exe
-
Size
24KB
-
MD5
cb99b97464bc521a09aaf995875e6d6b
-
SHA1
e2ebbc32a8a257cddfe92054132becb6d40815bb
-
SHA256
3e84365f940e104ccd43d1ad7f5955c7f0b7a73e9e52c86ed91ef7666034db04
-
SHA512
86aa385da1b5234071d0119b1d34f4aa3686d75f76bad312f9c6e573a3e5cf784210d77062fc485c8215ff06458a3399e861d17bcfb7072f77c5a95ffc9ccda1
-
SSDEEP
384:E3eVES+/xwGkRKJ/olM61qmTTMVF9/q5qDG0:bGS+ZfbJ/oO8qYoAGv
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Start GeekBuddy = "C:\\Program Files\\Common Files\\Microsoft Shared\\Web Folders\\1033\\spoolsv.exe" cb99b97464bc521a09aaf995875e6d6b.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\Web Folders\1033\spoolsv.exe cb99b97464bc521a09aaf995875e6d6b.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2852 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 4180 NETSTAT.EXE 2704 ipconfig.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2852 tasklist.exe Token: SeDebugPrivilege 4180 NETSTAT.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3572 cb99b97464bc521a09aaf995875e6d6b.exe 3572 cb99b97464bc521a09aaf995875e6d6b.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3572 wrote to memory of 1680 3572 cb99b97464bc521a09aaf995875e6d6b.exe 85 PID 3572 wrote to memory of 1680 3572 cb99b97464bc521a09aaf995875e6d6b.exe 85 PID 3572 wrote to memory of 1680 3572 cb99b97464bc521a09aaf995875e6d6b.exe 85 PID 1680 wrote to memory of 3704 1680 cmd.exe 87 PID 1680 wrote to memory of 3704 1680 cmd.exe 87 PID 1680 wrote to memory of 3704 1680 cmd.exe 87 PID 1680 wrote to memory of 2704 1680 cmd.exe 88 PID 1680 wrote to memory of 2704 1680 cmd.exe 88 PID 1680 wrote to memory of 2704 1680 cmd.exe 88 PID 1680 wrote to memory of 2852 1680 cmd.exe 89 PID 1680 wrote to memory of 2852 1680 cmd.exe 89 PID 1680 wrote to memory of 2852 1680 cmd.exe 89 PID 1680 wrote to memory of 4112 1680 cmd.exe 91 PID 1680 wrote to memory of 4112 1680 cmd.exe 91 PID 1680 wrote to memory of 4112 1680 cmd.exe 91 PID 4112 wrote to memory of 4712 4112 net.exe 92 PID 4112 wrote to memory of 4712 4112 net.exe 92 PID 4112 wrote to memory of 4712 4112 net.exe 92 PID 1680 wrote to memory of 4180 1680 cmd.exe 93 PID 1680 wrote to memory of 4180 1680 cmd.exe 93 PID 1680 wrote to memory of 4180 1680 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb99b97464bc521a09aaf995875e6d6b.exe"C:\Users\Admin\AppData\Local\Temp\cb99b97464bc521a09aaf995875e6d6b.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\SysWOW64\cmd.execmd /c ver >c:\windows\temp\flash.log & cmd /c set >>c:\windows\temp\flash.log & ipconfig /all >>c:\windows\temp\flash.log & tasklist >>c:\windows\temp\flash.log & net start>>c:\windows\temp\flash.log & netstat -an >>c:\windows\temp\flash.log2⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\cmd.execmd /c set3⤵PID:3704
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:2704
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
C:\Windows\SysWOW64\net.exenet start3⤵
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start4⤵PID:4712
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXEnetstat -an3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:4180
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD552e054f1aa7b63b3992b7224e637a592
SHA1375fd2f9cd081db34929876806627b0d6f075144
SHA256b32194a6814ed02790c71addacc72b55a994b07c85f07e01ac15688e78f0d9a9
SHA512600f215434d2195810efb14080d7fe6838f39c361380d8fe786b0d8499c3caa8c5a8e6a84c3e8760aff36e51b0271579acdd541e92806b9fa5755b71e0280021