Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
07/05/2024, 15:07
240507-shcz9aeg94 1007/05/2024, 15:06
240507-sgvhxacc6v 507/05/2024, 14:33
240507-rxbv3adh92 7Analysis
-
max time kernel
266s -
max time network
261s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 14:33
Static task
static1
Behavioral task
behavioral1
Sample
9b7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9b7.exe
Resource
win10v2004-20240419-en
General
-
Target
9b7.exe
-
Size
1.2MB
-
MD5
3e045f1fa7e08692418b1a21673ed3ec
-
SHA1
41f9dc3023e480d6722cb18e16ce06395b644165
-
SHA256
9b72da9d930ab568e000d6b8d833e673206fe655831ac2b7d794263818f8977a
-
SHA512
e366df7a99809ad1548a8a88aeb961b1acd3431420b8035baf7c7670955833581e6b9594280e0996264f07d4feedaabbb759ad2e2ce16398ab819a9a15da7712
-
SSDEEP
24576:EqDEvCTbMWu7rQYlBQcBiT6rprG8azO9n4WH9A+8zhy0V2J:ETvC/MTQYxsWR7azCn4WuLrM
Malware Config
Signatures
-
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4372 set thread context of 4892 4372 9b7.exe 86 PID 4892 set thread context of 3456 4892 svchost.exe 56 PID 4892 set thread context of 4112 4892 svchost.exe 95 PID 4112 set thread context of 3456 4112 finger.exe 56 -
description ioc Process Key created \Registry\User\S-1-5-21-17203666-93769886-2545153620-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 finger.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4892 svchost.exe 4892 svchost.exe 4892 svchost.exe 4892 svchost.exe 4892 svchost.exe 4892 svchost.exe 4892 svchost.exe 4892 svchost.exe 4892 svchost.exe 4892 svchost.exe 4892 svchost.exe 4892 svchost.exe 4892 svchost.exe 4892 svchost.exe 4892 svchost.exe 4892 svchost.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 4372 9b7.exe 4892 svchost.exe 3456 Explorer.EXE 3456 Explorer.EXE 4112 finger.exe 4112 finger.exe 4112 finger.exe 4112 finger.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3456 Explorer.EXE Token: SeCreatePagefilePrivilege 3456 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4372 9b7.exe 4372 9b7.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4372 9b7.exe 4372 9b7.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3456 Explorer.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4372 wrote to memory of 4892 4372 9b7.exe 86 PID 4372 wrote to memory of 4892 4372 9b7.exe 86 PID 4372 wrote to memory of 4892 4372 9b7.exe 86 PID 4372 wrote to memory of 4892 4372 9b7.exe 86 PID 3456 wrote to memory of 4112 3456 Explorer.EXE 95 PID 3456 wrote to memory of 4112 3456 Explorer.EXE 95 PID 3456 wrote to memory of 4112 3456 Explorer.EXE 95 PID 4112 wrote to memory of 2800 4112 finger.exe 110 PID 4112 wrote to memory of 2800 4112 finger.exe 110 PID 4112 wrote to memory of 2800 4112 finger.exe 110
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\9b7.exe"C:\Users\Admin\AppData\Local\Temp\9b7.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\9b7.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:4892
-
-
-
C:\Windows\SysWOW64\finger.exe"C:\Windows\SysWOW64\finger.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:2800
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD5368bffaed84bc1dbffec8bb31ed9dfdf
SHA121c7ad2ab70cbe8ef4f1c259a2e91c1a7ceec70d
SHA256b01ff2279a65c0b16bd5b41e9f4eefeafd37d96b0363a1d8729aa6a0bb8d56bd
SHA51290a1049c6e8ec973c17365532caf74bd42ca17bf860ddae633bb26e2ffc9ded25de7cef0782dd0bf36fbb34c74b58c83afc9e5f58a8e998f9d9c7d5234eddc95