Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 17:56
Static task
static1
Behavioral task
behavioral1
Sample
virussign.com_9d0c08e9397f1b734de76cfce378f320.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
virussign.com_9d0c08e9397f1b734de76cfce378f320.exe
Resource
win10v2004-20240426-en
General
-
Target
virussign.com_9d0c08e9397f1b734de76cfce378f320.exe
-
Size
12KB
-
MD5
9d0c08e9397f1b734de76cfce378f320
-
SHA1
bae676d1e7c3fe8d86bb252e040087a35f9c965e
-
SHA256
fc7291766af24760ecc65ce9ea7e342ded300d8d7f4c883b7055ec0f060ecaf5
-
SHA512
7587af76f33e1013a3336f84e23deaedf4d95d218f657c5bf3dd4da452c3291a267f9cc5c87e70921e1cb25005589aa165b410afd1e7fdc2e762dac3ddca0f01
-
SSDEEP
384:1L7li/2zxq2DcEQvdhcJKLTp/NK9xa+E:VxM/Q9c+E
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2744 tmp1ED7.tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 2744 tmp1ED7.tmp.exe -
Loads dropped DLL 1 IoCs
pid Process 1964 virussign.com_9d0c08e9397f1b734de76cfce378f320.exe -
Uses the VBS compiler for execution 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1964 virussign.com_9d0c08e9397f1b734de76cfce378f320.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2344 1964 virussign.com_9d0c08e9397f1b734de76cfce378f320.exe 28 PID 1964 wrote to memory of 2344 1964 virussign.com_9d0c08e9397f1b734de76cfce378f320.exe 28 PID 1964 wrote to memory of 2344 1964 virussign.com_9d0c08e9397f1b734de76cfce378f320.exe 28 PID 1964 wrote to memory of 2344 1964 virussign.com_9d0c08e9397f1b734de76cfce378f320.exe 28 PID 2344 wrote to memory of 2520 2344 vbc.exe 30 PID 2344 wrote to memory of 2520 2344 vbc.exe 30 PID 2344 wrote to memory of 2520 2344 vbc.exe 30 PID 2344 wrote to memory of 2520 2344 vbc.exe 30 PID 1964 wrote to memory of 2744 1964 virussign.com_9d0c08e9397f1b734de76cfce378f320.exe 31 PID 1964 wrote to memory of 2744 1964 virussign.com_9d0c08e9397f1b734de76cfce378f320.exe 31 PID 1964 wrote to memory of 2744 1964 virussign.com_9d0c08e9397f1b734de76cfce378f320.exe 31 PID 1964 wrote to memory of 2744 1964 virussign.com_9d0c08e9397f1b734de76cfce378f320.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\virussign.com_9d0c08e9397f1b734de76cfce378f320.exe"C:\Users\Admin\AppData\Local\Temp\virussign.com_9d0c08e9397f1b734de76cfce378f320.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\l4zxscgc\l4zxscgc.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1FE0.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc3B7136664CB4547A036F438B761D9A2.TMP"3⤵PID:2520
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp1ED7.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp1ED7.tmp.exe" C:\Users\Admin\AppData\Local\Temp\virussign.com_9d0c08e9397f1b734de76cfce378f320.exe2⤵
- Deletes itself
- Executes dropped EXE
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD52bef879f76e86248e33dbb26c29c5327
SHA17f8b2a7e0566bd2477cd54c94e12afbfb3ec5706
SHA256d2bf3e94198b9bc5f600eff6907f06fbd398f103329ca99f1622cf3a330f7224
SHA512081d8bde408fa1173b0fe186ba385f63c33214ddcc0ca0b3b84ff6ea5c725297ebf9d66b1a06b6e1ef95ad11284c7b8819bf2af2efdcc9e14de8902c77840a16
-
Filesize
1KB
MD57fc56cd5bea98cb6222c7f67feed2ae4
SHA151666eab12a74fe5b9249835d6482df40cae23ba
SHA2566bde2c191ec39c034613a762da92f89aab5030f2e31e3da4e5e5133c47149556
SHA512a69fd0ac7bfc166490318d21fe31db0660a458e2fcb5d79d6c1611aee223f452e371f3aa1ed49d20a7930bb8830466683f114630b55109b32044343fa54c1e8e
-
Filesize
2KB
MD5743c0f1d6a8c07a7084a7e51101e40c2
SHA1adac4977b644007caa1f5d599e10385eaf402882
SHA2569c9371daa866166f7cbf5cd1bf81b103d61b162138678237e2b5f2abbbf08949
SHA512017e16f963697a1fe337747ec6841d743cdc860680d261a18b825f9777ba63403eaa5b2f747f5520b9b221f5a18e8bb564a54efd7b54c01c4f31120e168b5ba0
-
Filesize
273B
MD50e9d5269e5175bb8358a035fdad7f8a4
SHA13cdcfa2cc8c9d563a93ef478857a5347c60ee94e
SHA256b825949b76dc054e3a7d99deb476f162d5af26efe48508de19ef4d98b0aef181
SHA51221c61eb96e7310c3c5e0c8a0cf978de5c7212089560082b53991d49d602f6d7dab00e3c9277b48267a3d3839f3888e72ca9e2a964829d7bf65c1df66f5ac75b1
-
Filesize
12KB
MD58910ed1406f093095cfbc85e486bf887
SHA16fd8d7b775e4c5500e98fd307cc0b06aea679990
SHA256f738e8466888bc677c6f1492b222ccd0a87a287e0244c363bd18af9dd4398455
SHA51275ed6682cea83bce22f63ba1808f1e16e2b9f844a1ce1e10794d4dd1d0089f4336b8d6c9bb2ad421687e9ca4fb5805d85c0fa295691113e9cff57825695341f7
-
Filesize
1KB
MD5cfecafbfa51d4bac4795763991a0c286
SHA1a4f00001399f497d51182695d09a1b263ef232dc
SHA25694d6434e52f9d7f448a485735dbca36e77a0c2fb8f9638dc78d2d9f8eaed4365
SHA5122a000b854ff6eff3ad288d8797b10e46196d3d1bd448c74f3ff7eb273a4dd9a09fdab57ea8403c2178a91e787a510541f33bb759be8bad4e2538f8ef1c94e200