Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
09/04/2024, 16:57
240409-vgf2magd4z 909/04/2024, 16:54
240409-vevr1ach64 909/04/2024, 16:51
240409-vc161agc3x 9Analysis
-
max time kernel
104s -
max time network
82s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
09/04/2024, 16:54
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
winrm.exe
Resource
win10-20240404-en
10 signatures
300 seconds
General
-
Target
winrm.exe
-
Size
237KB
-
MD5
df064a338e25472686ea67ba3c01e780
-
SHA1
74ee5ba66f2593c40842607a7d322f2025c7d087
-
SHA256
dd8cef242016ac16e7d62b63dbb946481b751a339efb79911da1d4c654246097
-
SHA512
b4848baf036a380882734aad30c1e35fc8d3930b04af018767522ce29b4400ed366480f00fa8379985527aa044bc3c26adfdd8d3395cd09c50d40dac36abe3e9
-
SSDEEP
3072:K0F1weiSOsF1DUREGAltfZP+fqJIiJHnbsI+cnl2fZd+G:v1JiSoEGAlVpEqXnbsvcnI
Score
9/10
Malware Config
Signatures
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\compmgmt.msc mmc.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance CompMgmtLauncher.exe Key created \REGISTRY\USER\S-1-5-21-3699363923-1875576828-3287151903-1000_Classes\Local Settings CompMgmtLauncher.exe -
Runs net.exe
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2296 mmc.exe -
Suspicious behavior: LoadsDriver 64 IoCs
pid Process 2036 Process not Found 872 Process not Found 2800 Process not Found 1884 Process not Found 968 Process not Found 3100 Process not Found 2532 Process not Found 1068 Process not Found 3876 Process not Found 4316 Process not Found 4404 Process not Found 2428 Process not Found 1816 Process not Found 3352 Process not Found 4604 Process not Found 2836 Process not Found 1784 Process not Found 4100 Process not Found 2040 Process not Found 744 Process not Found 4332 Process not Found 3568 Process not Found 1420 Process not Found 2856 Process not Found 4816 Process not Found 4516 Process not Found 2748 Process not Found 292 Process not Found 512 Process not Found 2372 Process not Found 4252 Process not Found 1292 Process not Found 4548 Process not Found 2120 Process not Found 4196 Process not Found 1908 Process not Found 4852 Process not Found 4180 Process not Found 4652 Process not Found 1824 Process not Found 4636 Process not Found 2060 Process not Found 1432 Process not Found 940 Process not Found 1668 Process not Found 5116 Process not Found 404 Process not Found 4884 Process not Found 4116 Process not Found 3920 Process not Found 3628 Process not Found 4220 Process not Found 3912 Process not Found 4836 Process not Found 1788 Process not Found 1464 Process not Found 4184 Process not Found 2068 Process not Found 168 Process not Found 1308 Process not Found 4016 Process not Found 4296 Process not Found 1336 Process not Found 4472 Process not Found -
Suspicious use of AdjustPrivilegeToken 27 IoCs
description pid Process Token: 33 2296 mmc.exe Token: SeIncBasePriorityPrivilege 2296 mmc.exe Token: 33 2296 mmc.exe Token: SeIncBasePriorityPrivilege 2296 mmc.exe Token: SeSecurityPrivilege 2296 mmc.exe Token: 33 2296 mmc.exe Token: SeIncBasePriorityPrivilege 2296 mmc.exe Token: 33 2296 mmc.exe Token: SeIncBasePriorityPrivilege 2296 mmc.exe Token: 33 2296 mmc.exe Token: SeIncBasePriorityPrivilege 2296 mmc.exe Token: 33 2296 mmc.exe Token: SeIncBasePriorityPrivilege 2296 mmc.exe Token: 33 2296 mmc.exe Token: SeIncBasePriorityPrivilege 2296 mmc.exe Token: 33 2296 mmc.exe Token: SeIncBasePriorityPrivilege 2296 mmc.exe Token: 33 2296 mmc.exe Token: SeIncBasePriorityPrivilege 2296 mmc.exe Token: 33 2296 mmc.exe Token: SeIncBasePriorityPrivilege 2296 mmc.exe Token: 33 2296 mmc.exe Token: SeIncBasePriorityPrivilege 2296 mmc.exe Token: 33 2296 mmc.exe Token: SeIncBasePriorityPrivilege 2296 mmc.exe Token: 33 2296 mmc.exe Token: SeIncBasePriorityPrivilege 2296 mmc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 204 winrm.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2296 mmc.exe 2296 mmc.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 204 wrote to memory of 4544 204 winrm.exe 74 PID 204 wrote to memory of 4544 204 winrm.exe 74 PID 4544 wrote to memory of 3712 4544 cmd.exe 76 PID 4544 wrote to memory of 3712 4544 cmd.exe 76 PID 4544 wrote to memory of 1916 4544 cmd.exe 77 PID 4544 wrote to memory of 1916 4544 cmd.exe 77 PID 3712 wrote to memory of 4824 3712 net.exe 78 PID 3712 wrote to memory of 4824 3712 net.exe 78 PID 1296 wrote to memory of 2296 1296 CompMgmtLauncher.exe 84 PID 1296 wrote to memory of 2296 1296 CompMgmtLauncher.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\winrm.exe"C:\Users\Admin\AppData\Local\Temp\winrm.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:204 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c net localgroup "Administrators" | find "Admin"2⤵
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\system32\net.exenet localgroup "Administrators"3⤵
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup "Administrators"4⤵PID:4824
-
-
-
C:\Windows\system32\find.exefind "Admin"3⤵PID:1916
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:2068
-
C:\Windows\system32\CompMgmtLauncher.exe"C:\Windows\system32\CompMgmtLauncher.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\system32\compmgmt.msc" /s2⤵
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2296
-