Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
24/04/2024, 19:14
Behavioral task
behavioral1
Sample
test.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
test.exe
Resource
win10v2004-20240226-en
General
-
Target
test.exe
-
Size
5.0MB
-
MD5
e9a24c7a42f9b296cc1e31dc3ea73b2b
-
SHA1
06e9607fb973400f0f110854ce90382965cd43d9
-
SHA256
03ee5437a1dad818f417db18dd50e16bc08c890b442874d841cd1a6a643c4010
-
SHA512
48af794e0042ce3cea37ff11e3f9b74d0a8e463018fc827d7ef459cc58252a5f436632c19b5d4674a6b54f02543005a294ef94f86d46d1ecff574ba6fab0464b
-
SSDEEP
98304:XrdCegVSGMzByLXMfivQayGnOht5RTc7kjRX1LNNDw7:waGMlyLXvvQdmmt5RTcGzLNe7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4484 3T86IGQCZM.exe -
resource yara_rule behavioral2/memory/2212-0-0x00007FF65CCA0000-0x00007FF65D6C0000-memory.dmp vmprotect behavioral2/files/0x0006000000000026-6.dat vmprotect behavioral2/memory/4484-8-0x00007FF6B0D90000-0x00007FF6B1773000-memory.dmp vmprotect -
Gathers network information 2 TTPs 3 IoCs
Uses commandline utility to view network configuration.
pid Process 4948 ipconfig.exe 4572 ipconfig.exe 1548 ipconfig.exe -
Kills process with taskkill 2 IoCs
pid Process 4760 taskkill.exe 832 taskkill.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2092 PING.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 832 taskkill.exe Token: SeDebugPrivilege 4760 taskkill.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2212 test.exe 4484 3T86IGQCZM.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 2212 wrote to memory of 1960 2212 test.exe 92 PID 2212 wrote to memory of 1960 2212 test.exe 92 PID 1960 wrote to memory of 1616 1960 cmd.exe 93 PID 1960 wrote to memory of 1616 1960 cmd.exe 93 PID 1616 wrote to memory of 2072 1616 net.exe 94 PID 1616 wrote to memory of 2072 1616 net.exe 94 PID 2212 wrote to memory of 2872 2212 test.exe 95 PID 2212 wrote to memory of 2872 2212 test.exe 95 PID 2872 wrote to memory of 1404 2872 cmd.exe 96 PID 2872 wrote to memory of 1404 2872 cmd.exe 96 PID 2212 wrote to memory of 2800 2212 test.exe 97 PID 2212 wrote to memory of 2800 2212 test.exe 97 PID 2800 wrote to memory of 832 2800 cmd.exe 98 PID 2800 wrote to memory of 832 2800 cmd.exe 98 PID 2212 wrote to memory of 232 2212 test.exe 100 PID 2212 wrote to memory of 232 2212 test.exe 100 PID 232 wrote to memory of 4572 232 cmd.exe 101 PID 232 wrote to memory of 4572 232 cmd.exe 101 PID 2212 wrote to memory of 5076 2212 test.exe 102 PID 2212 wrote to memory of 5076 2212 test.exe 102 PID 5076 wrote to memory of 1548 5076 cmd.exe 103 PID 5076 wrote to memory of 1548 5076 cmd.exe 103 PID 2212 wrote to memory of 4484 2212 test.exe 112 PID 2212 wrote to memory of 4484 2212 test.exe 112 PID 2212 wrote to memory of 4912 2212 test.exe 113 PID 2212 wrote to memory of 4912 2212 test.exe 113 PID 4912 wrote to memory of 2092 4912 cmd.exe 115 PID 4912 wrote to memory of 2092 4912 cmd.exe 115 PID 4484 wrote to memory of 908 4484 3T86IGQCZM.exe 116 PID 4484 wrote to memory of 908 4484 3T86IGQCZM.exe 116 PID 908 wrote to memory of 3588 908 cmd.exe 117 PID 908 wrote to memory of 3588 908 cmd.exe 117 PID 3588 wrote to memory of 1120 3588 net.exe 118 PID 3588 wrote to memory of 1120 3588 net.exe 118 PID 4484 wrote to memory of 4940 4484 3T86IGQCZM.exe 119 PID 4484 wrote to memory of 4940 4484 3T86IGQCZM.exe 119 PID 4940 wrote to memory of 5052 4940 cmd.exe 120 PID 4940 wrote to memory of 5052 4940 cmd.exe 120 PID 4484 wrote to memory of 1860 4484 3T86IGQCZM.exe 121 PID 4484 wrote to memory of 1860 4484 3T86IGQCZM.exe 121 PID 1860 wrote to memory of 4760 1860 cmd.exe 122 PID 1860 wrote to memory of 4760 1860 cmd.exe 122 PID 4484 wrote to memory of 1112 4484 3T86IGQCZM.exe 124 PID 4484 wrote to memory of 1112 4484 3T86IGQCZM.exe 124 PID 1112 wrote to memory of 4948 1112 cmd.exe 125 PID 1112 wrote to memory of 4948 1112 cmd.exe 125
Processes
-
C:\Users\Admin\AppData\Local\Temp\test.exe"C:\Users\Admin\AppData\Local\Temp\test.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net start w32time2⤵
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\system32\net.exenet start w32time3⤵
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start w32time4⤵PID:2072
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c w32tm /resync /nowait2⤵
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\system32\w32tm.exew32tm /resync /nowait3⤵PID:1404
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /IM RainbowSix.exe /f2⤵
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\system32\taskkill.exetaskkill /IM RainbowSix.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:832
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /flushdns2⤵
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\system32\ipconfig.exeipconfig /flushdns3⤵
- Gathers network information
PID:4572
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /flushdns2⤵
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\system32\ipconfig.exeipconfig /flushdns3⤵
- Gathers network information
PID:1548
-
-
-
C:\Users\Admin\AppData\Local\Temp\3T86IGQCZM.exe"C:\Users\Admin\AppData\Local\Temp\3T86IGQCZM.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c net start w32time3⤵
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\system32\net.exenet start w32time4⤵
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start w32time5⤵PID:1120
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c w32tm /resync /nowait3⤵
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\system32\w32tm.exew32tm /resync /nowait4⤵PID:5052
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill /IM RainbowSix.exe /f3⤵
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\system32\taskkill.exetaskkill /IM RainbowSix.exe /f4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4760
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /flushdns3⤵
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\system32\ipconfig.exeipconfig /flushdns4⤵
- Gathers network information
PID:4948
-
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\test.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:2092
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5000 --field-trial-handle=2656,i,16940681401824032220,151921362336696246,262144 --variations-seed-version /prefetch:81⤵PID:2856
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.9MB
MD5c01c4d326d65d94e05361c30821b2dbd
SHA116c0e2a2dff1e06cbdc5036d13a7444edc469193
SHA2566a79b18a0b6ce048bd93586272612296073c5b7c252e13f378914a9d2d7fc9a2
SHA51269ef9d5870d76e8175f5749b8ab24e9574c021fa8c2a0b0ea088bcd2ad93373efac252295395eb6f0d5896474d9f22275948dd79baded12a634e97e72f50abed