Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 05:32
Static task
static1
Behavioral task
behavioral1
Sample
0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe
Resource
win10v2004-20240508-en
General
-
Target
0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe
-
Size
8.7MB
-
MD5
ec8e8acd33199e6890c68ba94e2f88c3
-
SHA1
6a21fb844acd21301ed9477343b6e667c08c18eb
-
SHA256
0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95
-
SHA512
60609ad513571ada650b201d3bf91fb4a84e8a4b3c2d9d9ccf9a49bf5b948eeb078bd306bd4b264855247bc254e15c97c7ce814b573f4c1854997f26469f84f1
-
SSDEEP
196608:TL5h5tG5490qJX9eJih9RisOyce2wS5l1BhEhXyg+AoRm/mS/:35nGo0w9eJ4RiPVe2wS5HEhXR+AoR
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3988 netsh.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3376 0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe -
Kills process with taskkill 1 IoCs
pid Process 4144 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3376 0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe 3376 0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe 3376 0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe 3376 0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe 3376 0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe 3376 0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4144 taskkill.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3376 0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe 3376 0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3376 wrote to memory of 432 3376 0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe 85 PID 3376 wrote to memory of 432 3376 0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe 85 PID 3376 wrote to memory of 432 3376 0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe 85 PID 432 wrote to memory of 3988 432 cmd.exe 87 PID 432 wrote to memory of 3988 432 cmd.exe 87 PID 432 wrote to memory of 3988 432 cmd.exe 87 PID 3376 wrote to memory of 4144 3376 0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe 97 PID 3376 wrote to memory of 4144 3376 0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe 97 PID 3376 wrote to memory of 4144 3376 0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe"C:\Users\Admin\AppData\Local\Temp\0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\SysWOW64\cmd.execmd.exe /c NetSh Advfirewall set allprofiles state off2⤵
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SysWOW64\netsh.exeNetSh Advfirewall set allprofiles state off3⤵
- Modifies Windows Firewall
PID:3988
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /IM "0481a0e6b354f6c12b9edeaab12ddfcb40efa5bdf7f06dd3e85e63ad546dcc95.exe" /F /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4144
-