Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

09/04/2024, 16:57

240409-vgf2magd4z 9

09/04/2024, 16:54

240409-vevr1ach64 9

09/04/2024, 16:51

240409-vc161agc3x 9

Analysis

  • max time kernel
    135s
  • max time network
    136s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    09/04/2024, 16:57

General

  • Target

    winrm.exe

  • Size

    237KB

  • MD5

    df064a338e25472686ea67ba3c01e780

  • SHA1

    74ee5ba66f2593c40842607a7d322f2025c7d087

  • SHA256

    dd8cef242016ac16e7d62b63dbb946481b751a339efb79911da1d4c654246097

  • SHA512

    b4848baf036a380882734aad30c1e35fc8d3930b04af018767522ce29b4400ed366480f00fa8379985527aa044bc3c26adfdd8d3395cd09c50d40dac36abe3e9

  • SSDEEP

    3072:K0F1weiSOsF1DUREGAltfZP+fqJIiJHnbsI+cnl2fZd+G:v1JiSoEGAlVpEqXnbsvcnI

Score
9/10

Malware Config

Signatures

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\winrm.exe
    "C:\Users\Admin\AppData\Local\Temp\winrm.exe"
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1472
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd.exe" /c net localgroup "Administrators" | find "Admin"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2780
      • C:\Windows\system32\net.exe
        net localgroup "Administrators"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4164
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 localgroup "Administrators"
          4⤵
            PID:2532
        • C:\Windows\system32\find.exe
          find "Admin"
          3⤵
            PID:4728
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Windows\System32\winrm.cmd" "
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:4420
        • C:\Windows\system32\cscript.exe
          cscript //nologo "C:\Windows\System32\winrm.vbs"
          2⤵
            PID:424
        • C:\Windows\System32\rundll32.exe
          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
          1⤵
            PID:3556

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1472-0-0x00000232028E0000-0x0000023202920000-memory.dmp

            Filesize

            256KB

          • memory/1472-1-0x00007FFA2DF70000-0x00007FFA2E95C000-memory.dmp

            Filesize

            9.9MB

          • memory/1472-2-0x0000023202CE0000-0x0000023202CF0000-memory.dmp

            Filesize

            64KB

          • memory/1472-3-0x0000023202CE0000-0x0000023202CF0000-memory.dmp

            Filesize

            64KB

          • memory/1472-4-0x00007FFA2DF70000-0x00007FFA2E95C000-memory.dmp

            Filesize

            9.9MB