Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27/04/2024, 20:17

General

  • Target

    a3bd5e5538c1d97608d726deec76249cbec22962b6c86f6b727c7b5222ed0c69.exe

  • Size

    198KB

  • MD5

    bb90e2e55198bb82b96b6aa129626a7d

  • SHA1

    f2225dc69cc8f05c938beede8cb3256619f17f1f

  • SHA256

    a3bd5e5538c1d97608d726deec76249cbec22962b6c86f6b727c7b5222ed0c69

  • SHA512

    63fe2e2c0d392bb8bd666c559dc0efd7f35eb39ddd110ad19221876612cac57a7379af03714df295093ccbdcbf49a1a23689651809e8373bd2aba1c1030e6f77

  • SSDEEP

    6144:rBs27MMLyX5HXXXDTXXXOGqIII+pXXX5AYjKXXXDoXXXG6XXXxXXXLIIIEAkOCOE:rK20HXXX/XXXFqIIIcXXX5j2XXXcXXXl

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3bd5e5538c1d97608d726deec76249cbec22962b6c86f6b727c7b5222ed0c69.exe
    "C:\Users\Admin\AppData\Local\Temp\a3bd5e5538c1d97608d726deec76249cbec22962b6c86f6b727c7b5222ed0c69.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2972
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\A3BD5E~1.EXE > nul
      2⤵
      • Deletes itself
      PID:2136
  • C:\Windows\Debug\zskhost.exe
    C:\Windows\Debug\zskhost.exe
    1⤵
    • Executes dropped EXE
    • Checks processor information in registry
    PID:1708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\debug\zskhost.exe

    Filesize

    198KB

    MD5

    13a92321183f2dbbfa09abc08f3abdf0

    SHA1

    190f4115d4469868498e631aa531824fb5002770

    SHA256

    430bb164999db9ede3474ccf54c0332ffe6b9e22c3d58ca6941d4bb6e5967882

    SHA512

    0076c3f3fc78e7af4e4b309e81cd764cc4af59b6271bc309ba0896c4e4d515f28a04accc0806a2a0138b0f4f341c89f138bda7842668f2cf167128c1d31dffe4