Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
51s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
28/04/2024, 19:57
Static task
static1
Behavioral task
behavioral1
Sample
ProcessMonitor.zip
Resource
win10v2004-20240419-en
General
-
Target
ProcessMonitor.zip
-
Size
3.3MB
-
MD5
3ef2eedf8139b1f51d9561fd8f9fee9a
-
SHA1
e6769c1ec6d7367a450e304d554470bb0413900f
-
SHA256
b556dcac41dc01f7310936fbd57d202eaecd00ff580398957b7125fd404728ae
-
SHA512
4b1479914fdcddc94846ab6cde66976a61a04f8475e59970cb24b5583c40997d9f19eba81016ef69297d87779bb333b9f6d34357b9fdbfdb39448a1a85b36f00
-
SSDEEP
98304:K6FoCGKZsQnafN/FqpbX/893Sxv8RE/6DdHrloE55PHAKZo:K6FnG4syes9/88xvh6hHrKE55IKu
Malware Config
Signatures
-
Drops file in Drivers directory 6 IoCs
description ioc Process File opened for modification C:\Windows\system32\Drivers\PROCMON24.SYS Procmon64.exe File created C:\Windows\system32\Drivers\PROCMON24.SYS Procmon64.exe File opened for modification C:\Windows\system32\Drivers\PROCMON24.SYS Procmon64.exe File created C:\Windows\system32\Drivers\PROCMON24.SYS Procmon64.exe File opened for modification C:\Windows\system32\Drivers\PROCMON24.SYS Procmon64.exe File created C:\Windows\system32\Drivers\PROCMON24.SYS Procmon64.exe -
Sets service image path in registry 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\PROCMON24\ImagePath = "\\??\\C:\\Windows\\system32\\Drivers\\PROCMON24.SYS" Procmon64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\PROCMON24\ImagePath = "\\??\\C:\\Windows\\system32\\Drivers\\PROCMON24.SYS" Procmon64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\PROCMON24\ImagePath = "\\??\\C:\\Windows\\system32\\Drivers\\PROCMON24.SYS" Procmon64.exe -
Executes dropped EXE 2 IoCs
pid Process 1260 Procmon64.exe 3896 Procmon64.exe -
Modifies registry class 28 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000_Classes\ProcMon.Logfile.1 Procmon64.exe Set value (str) \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000_Classes\.PML\ = "ProcMon.Logfile.1" Procmon64.exe Key created \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000_Classes\ProcMon.Logfile.1 Procmon64.exe Set value (str) \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000_Classes\ProcMon.Logfile.1\DefaultIcon\ = "\"C:\\Users\\Admin\\Desktop\\New folder\\Procmon64.exe\",0" Procmon64.exe Set value (str) \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000_Classes\.PML\ = "ProcMon.Logfile.1" Procmon64.exe Key created \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000_Classes\ProcMon.Logfile.1 Procmon64.exe Key created \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000_Classes\ProcMon.Logfile.1\shell\open\command Procmon64.exe Key created \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000_Classes\ProcMon.Logfile.1\shell\open\command Procmon64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Procmon.exe Key created \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000_Classes\.PML Procmon64.exe Set value (str) \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000_Classes\ProcMon.Logfile.1\DefaultIcon\ = "\"C:\\Users\\Admin\\Desktop\\New folder\\Procmon.exe\",0" Procmon64.exe Set value (str) \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000_Classes\.PML\ = "ProcMon.Logfile.1" Procmon64.exe Set value (str) \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000_Classes\ProcMon.Logfile.1\shell\open\command\ = "\"C:\\Users\\Admin\\Desktop\\New folder\\Procmon.exe\" /OpenLog \"%1\"" Procmon64.exe Key created \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000_Classes\.PML Procmon64.exe Key created \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000_Classes\ProcMon.Logfile.1\shell\open\command Procmon64.exe Set value (str) \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000_Classes\ProcMon.Logfile.1\ = "ProcMon Log File" Procmon64.exe Key created \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000_Classes\ProcMon.Logfile.1\shell\open Procmon64.exe Set value (str) \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000_Classes\ProcMon.Logfile.1\DefaultIcon\ = "\"C:\\Users\\Admin\\Desktop\\New folder\\Procmon.exe\",0" Procmon64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Procmon.exe Key created \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000_Classes\ProcMon.Logfile.1\DefaultIcon Procmon64.exe Set value (str) \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000_Classes\ProcMon.Logfile.1\shell\open\command\ = "\"C:\\Users\\Admin\\Desktop\\New folder\\Procmon.exe\" /OpenLog \"%1\"" Procmon64.exe Key created \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000_Classes\.PML Procmon64.exe Key created \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000_Classes\ProcMon.Logfile.1\shell Procmon64.exe Set value (str) \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000_Classes\ProcMon.Logfile.1\ = "ProcMon Log File" Procmon64.exe Set value (str) \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000_Classes\ProcMon.Logfile.1\ = "ProcMon Log File" Procmon64.exe Key created \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000_Classes\ProcMon.Logfile.1\DefaultIcon Procmon64.exe Set value (str) \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000_Classes\ProcMon.Logfile.1\shell\open\command\ = "\"C:\\Users\\Admin\\Desktop\\New folder\\Procmon64.exe\" /OpenLog \"%1\"" Procmon64.exe Key created \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000_Classes\ProcMon.Logfile.1\DefaultIcon Procmon64.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 1260 Procmon64.exe 228 Procmon64.exe 3896 Procmon64.exe -
Suspicious behavior: LoadsDriver 3 IoCs
pid Process 1260 Procmon64.exe 228 Procmon64.exe 3896 Procmon64.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1260 Procmon64.exe Token: SeLoadDriverPrivilege 1260 Procmon64.exe Token: SeDebugPrivilege 228 Procmon64.exe Token: SeLoadDriverPrivilege 228 Procmon64.exe Token: SeDebugPrivilege 3896 Procmon64.exe Token: SeLoadDriverPrivilege 3896 Procmon64.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 1260 Procmon64.exe 1260 Procmon64.exe 1260 Procmon64.exe 228 Procmon64.exe 228 Procmon64.exe 228 Procmon64.exe 3896 Procmon64.exe 3896 Procmon64.exe 3896 Procmon64.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2224 wrote to memory of 1260 2224 Procmon.exe 104 PID 2224 wrote to memory of 1260 2224 Procmon.exe 104 PID 1984 wrote to memory of 3896 1984 Procmon.exe 109 PID 1984 wrote to memory of 3896 1984 Procmon.exe 109
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\ProcessMonitor.zip1⤵PID:3544
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4112
-
C:\Users\Admin\Desktop\New folder\Procmon.exe"C:\Users\Admin\Desktop\New folder\Procmon.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\Procmon64.exe"C:\Users\Admin\AppData\Local\Temp\Procmon64.exe" /originalpath "C:\Users\Admin\Desktop\New folder\Procmon.exe"2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1260
-
-
C:\Users\Admin\Desktop\New folder\Procmon64.exe"C:\Users\Admin\Desktop\New folder\Procmon64.exe"1⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:228
-
C:\Users\Admin\Desktop\New folder\Procmon.exe"C:\Users\Admin\Desktop\New folder\Procmon.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\Procmon64.exe"C:\Users\Admin\AppData\Local\Temp\Procmon64.exe" /originalpath "C:\Users\Admin\Desktop\New folder\Procmon.exe"2⤵
- Drops file in Drivers directory
- Sets service image path in registry
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD56b3a6712990ed09dd166c281ec7bee30
SHA18a85f03252d045009ce0b90adaac537e17f89167
SHA256a1b8c40f6da56961081dfee34a252fc667d22c7a22f30269d51f3f409111e787
SHA512d1baa1f83ab6fc37d939d8db74ba825507e53dc9fc0fa07c5957fccdabc05cc50f66e0db85b54478805e5aef9e1a8f14b262a4b68f43c8a8b62a089dc7be6a44