Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 12:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d60ee95adae91d23da4b7196787ee37e.exe
Resource
win7-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
d60ee95adae91d23da4b7196787ee37e.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
d60ee95adae91d23da4b7196787ee37e.exe
-
Size
250KB
-
MD5
d60ee95adae91d23da4b7196787ee37e
-
SHA1
fe195b24f7ad7b7da5bfe25cc330cf92f8129880
-
SHA256
193ce35e09ff2ccbae58dddff060f286750c0a61cba1da6983c0d138c6ca240f
-
SHA512
efe47335bedf80408d53506b5fc73ffb96e923963473370a9bbfd4ab4f13b948dd4e26d7364f81e6f9381be14bf6aae6f57a8fc915b553fda9e29913cebc6a39
-
SSDEEP
6144:2cjlsubtn6BV+/1PSSggDhBkLq2pjMoyYKRKESBv:7iuZ6Bq1aMWqBTSV
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Local\\Temp\\D60EE9~1.EXE," d60ee95adae91d23da4b7196787ee37e.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\userinit = "C:\\Users\\Admin\\AppData\\Local\\Temp\\D60EE9~1.EXE" d60ee95adae91d23da4b7196787ee37e.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\1078ccc3 = "F7óÄ8\x04+Ýòæ" d60ee95adae91d23da4b7196787ee37e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\System = "C:\\Users\\Admin\\AppData\\Local\\Temp\\D60EE9~1.EXE" d60ee95adae91d23da4b7196787ee37e.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe 1952 d60ee95adae91d23da4b7196787ee37e.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 1952 d60ee95adae91d23da4b7196787ee37e.exe Token: SeSecurityPrivilege 1952 d60ee95adae91d23da4b7196787ee37e.exe Token: SeSecurityPrivilege 1952 d60ee95adae91d23da4b7196787ee37e.exe Token: SeSecurityPrivilege 1952 d60ee95adae91d23da4b7196787ee37e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d60ee95adae91d23da4b7196787ee37e.exe"C:\Users\Admin\AppData\Local\Temp\d60ee95adae91d23da4b7196787ee37e.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1952