Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
16/04/2024, 20:23
Static task
static1
Behavioral task
behavioral1
Sample
2cd97cb3d466e84fb5c77c556c74e5235014e909c7ad5e6477b22c4c855dae25.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
2cd97cb3d466e84fb5c77c556c74e5235014e909c7ad5e6477b22c4c855dae25.exe
Resource
win10v2004-20240226-en
General
-
Target
2cd97cb3d466e84fb5c77c556c74e5235014e909c7ad5e6477b22c4c855dae25.exe
-
Size
173KB
-
MD5
28a29eb3ba8879d946e7ad0895028f6a
-
SHA1
7871fe5dd6d8c663c8bd73c52d40bad1f63fdb22
-
SHA256
2cd97cb3d466e84fb5c77c556c74e5235014e909c7ad5e6477b22c4c855dae25
-
SHA512
1102c0dae4f04991f4766d7bcd905d8f6b1e34a2544558df2a286397162e3d6bba6a63ae4ea5f67e9cda399c9235bd2f876c480e925a6cec9fa84368274f1ab6
-
SSDEEP
3072:zoUvg4fqjO00Yhxuizc6QIFqC067xd8xYFa15e:zojV0Y3zc6QIFqCNFd81q
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2280 cwtsudd.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\Mozilla\cwtsudd.exe 2cd97cb3d466e84fb5c77c556c74e5235014e909c7ad5e6477b22c4c855dae25.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2280 cwtsudd.exe 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2280 cwtsudd.exe Token: SeDebugPrivilege 1244 Explorer.EXE -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2124 2cd97cb3d466e84fb5c77c556c74e5235014e909c7ad5e6477b22c4c855dae25.exe 2280 cwtsudd.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2280 1984 taskeng.exe 29 PID 1984 wrote to memory of 2280 1984 taskeng.exe 29 PID 1984 wrote to memory of 2280 1984 taskeng.exe 29 PID 1984 wrote to memory of 2280 1984 taskeng.exe 29 PID 2280 wrote to memory of 1244 2280 cwtsudd.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\2cd97cb3d466e84fb5c77c556c74e5235014e909c7ad5e6477b22c4c855dae25.exe"C:\Users\Admin\AppData\Local\Temp\2cd97cb3d466e84fb5c77c556c74e5235014e909c7ad5e6477b22c4c855dae25.exe"2⤵
- Drops file in Program Files directory
- Suspicious use of UnmapMainImage
PID:2124
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {BA1142BF-1AA1-4BF3-8BFB-31D07AE28C12} S-1-5-21-2610426812-2871295383-373749122-1000:UEITMFAB\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\PROGRA~3\Mozilla\cwtsudd.exeC:\PROGRA~3\Mozilla\cwtsudd.exe -ldxtpdk2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2280
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173KB
MD5e723bcdfddf71509ca31bc14ca22e860
SHA1002ab990e0aa369212a51182a63cf98c6cecc159
SHA2565b16f3391dd304aac6687c0054d5c6cd5e15ab92e764f3bcc4d7df973900a1b1
SHA5126e5ee335b853f894e7319f9b00a57edede504da060b77a2649d7a181df8d1df4f3369796ad84ea0bf5263104297810afc8550d03dc4b28f6bd249534a82a3a6f