Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
09/04/2024, 16:57
240409-vgf2magd4z 909/04/2024, 16:54
240409-vevr1ach64 909/04/2024, 16:51
240409-vc161agc3x 9Analysis
-
max time kernel
135s -
max time network
136s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
09/04/2024, 16:57
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
winrm.exe
Resource
win10-20240404-en
4 signatures
150 seconds
General
-
Target
winrm.exe
-
Size
237KB
-
MD5
df064a338e25472686ea67ba3c01e780
-
SHA1
74ee5ba66f2593c40842607a7d322f2025c7d087
-
SHA256
dd8cef242016ac16e7d62b63dbb946481b751a339efb79911da1d4c654246097
-
SHA512
b4848baf036a380882734aad30c1e35fc8d3930b04af018767522ce29b4400ed366480f00fa8379985527aa044bc3c26adfdd8d3395cd09c50d40dac36abe3e9
-
SSDEEP
3072:K0F1weiSOsF1DUREGAltfZP+fqJIiJHnbsI+cnl2fZd+G:v1JiSoEGAlVpEqXnbsvcnI
Score
9/10
Malware Config
Signatures
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Runs net.exe
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1472 winrm.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1472 wrote to memory of 2780 1472 winrm.exe 73 PID 1472 wrote to memory of 2780 1472 winrm.exe 73 PID 2780 wrote to memory of 4164 2780 cmd.exe 75 PID 2780 wrote to memory of 4164 2780 cmd.exe 75 PID 2780 wrote to memory of 4728 2780 cmd.exe 76 PID 2780 wrote to memory of 4728 2780 cmd.exe 76 PID 4164 wrote to memory of 2532 4164 net.exe 77 PID 4164 wrote to memory of 2532 4164 net.exe 77 PID 4420 wrote to memory of 424 4420 cmd.exe 85 PID 4420 wrote to memory of 424 4420 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\winrm.exe"C:\Users\Admin\AppData\Local\Temp\winrm.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c net localgroup "Administrators" | find "Admin"2⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\system32\net.exenet localgroup "Administrators"3⤵
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup "Administrators"4⤵PID:2532
-
-
-
C:\Windows\system32\find.exefind "Admin"3⤵PID:4728
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\System32\winrm.cmd" "1⤵
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\system32\cscript.execscript //nologo "C:\Windows\System32\winrm.vbs"2⤵PID:424
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3556