Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 07:48
Static task
static1
Behavioral task
behavioral1
Sample
a8ae10b43cbf4e3344e0184b33a699b19a29866bc1e41201ace1a995e8ca3149.lnk
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a8ae10b43cbf4e3344e0184b33a699b19a29866bc1e41201ace1a995e8ca3149.lnk
Resource
win10v2004-20240319-en
General
-
Target
a8ae10b43cbf4e3344e0184b33a699b19a29866bc1e41201ace1a995e8ca3149.lnk
-
Size
1KB
-
MD5
9e51506816ad620c9e6474c52a9004a6
-
SHA1
1c3484db28964f43ee9587bc0260d86ac7e7cc0c
-
SHA256
a8ae10b43cbf4e3344e0184b33a699b19a29866bc1e41201ace1a995e8ca3149
-
SHA512
e7bcb6c45b9044ef237ee607b1dffb3358dc3807dac138a90827a5915871eee094462380a086b8415826e52dd072cb30ded9caed8a9cd0d9f3581834f7eb7f28
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeBackupPrivilege 2464 Robocopy.exe Token: SeRestorePrivilege 2464 Robocopy.exe Token: SeSecurityPrivilege 2464 Robocopy.exe Token: SeTakeOwnershipPrivilege 2464 Robocopy.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2548 2884 cmd.exe 29 PID 2884 wrote to memory of 2548 2884 cmd.exe 29 PID 2884 wrote to memory of 2548 2884 cmd.exe 29 PID 2548 wrote to memory of 2464 2548 cmd.exe 30 PID 2548 wrote to memory of 2464 2548 cmd.exe 30 PID 2548 wrote to memory of 2464 2548 cmd.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\a8ae10b43cbf4e3344e0184b33a699b19a29866bc1e41201ace1a995e8ca3149.lnk1⤵
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "robocopy . C:\Windows\Tasks /NODCOPY /NFL /NDL /NJH /NJS /NC /NS /NP > nul & start C:\Windows\Tasks\CCleanerReactivator.exe > nul"2⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\system32\Robocopy.exerobocopy . C:\Windows\Tasks /NODCOPY /NFL /NDL /NJH /NJS /NC /NS /NP3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2464
-
-