Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
13/06/2024, 06:10
240613-gxea3sxamg 8Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
13/06/2024, 06:10
Static task
static1
Behavioral task
behavioral1
Sample
e6de332ad778f7a7cf160efa60656c3ac960dc77806905493d5cffe58ee1de16.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
e6de332ad778f7a7cf160efa60656c3ac960dc77806905493d5cffe58ee1de16.exe
Resource
win10v2004-20240611-en
General
-
Target
e6de332ad778f7a7cf160efa60656c3ac960dc77806905493d5cffe58ee1de16.exe
-
Size
223KB
-
MD5
3955af54fbac1e43c945f447d92e4108
-
SHA1
53c5552c3649619e4e8c6a907b94573f47130fa4
-
SHA256
e6de332ad778f7a7cf160efa60656c3ac960dc77806905493d5cffe58ee1de16
-
SHA512
fa028a040a5f075296aebab7f63a59b6cbba32ee0964dfc08768396cc012ff5d861191e2478914d79d4a424c3bba110505a58b97376c44c716f0b1ea70551037
-
SSDEEP
3072:tneBqhy5aVLOwqI8sgwoEHXfwaNUM+/ORSs5G2Ms4f6TFZbhgvbUxzJ8Y:tETlsgOfDt+/V6JQO98
Malware Config
Signatures
-
Creates new service(s) 2 TTPs
-
Possible privilege escalation attempt 2 IoCs
pid Process 2764 takeown.exe 2608 icacls.exe -
Deletes itself 1 IoCs
pid Process 2924 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2432 wmpnetwk.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 2764 takeown.exe 2608 icacls.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files\Windows Media Player\background.jpg e6de332ad778f7a7cf160efa60656c3ac960dc77806905493d5cffe58ee1de16.exe File created C:\Program Files\Windows Media Player\mpsvc.dll e6de332ad778f7a7cf160efa60656c3ac960dc77806905493d5cffe58ee1de16.exe File created C:\Program Files\Windows Media Player\wmpnetwk.exe e6de332ad778f7a7cf160efa60656c3ac960dc77806905493d5cffe58ee1de16.exe File created C:\Program Files\Windows Media Player\wmixedwk.exe e6de332ad778f7a7cf160efa60656c3ac960dc77806905493d5cffe58ee1de16.exe File opened for modification C:\Program Files\Windows Media Player\wmixedwk.exe e6de332ad778f7a7cf160efa60656c3ac960dc77806905493d5cffe58ee1de16.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1236 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1976 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2764 takeown.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2468 2368 e6de332ad778f7a7cf160efa60656c3ac960dc77806905493d5cffe58ee1de16.exe 29 PID 2368 wrote to memory of 2468 2368 e6de332ad778f7a7cf160efa60656c3ac960dc77806905493d5cffe58ee1de16.exe 29 PID 2368 wrote to memory of 2468 2368 e6de332ad778f7a7cf160efa60656c3ac960dc77806905493d5cffe58ee1de16.exe 29 PID 2468 wrote to memory of 2764 2468 cmd.exe 31 PID 2468 wrote to memory of 2764 2468 cmd.exe 31 PID 2468 wrote to memory of 2764 2468 cmd.exe 31 PID 2468 wrote to memory of 2608 2468 cmd.exe 32 PID 2468 wrote to memory of 2608 2468 cmd.exe 32 PID 2468 wrote to memory of 2608 2468 cmd.exe 32 PID 2368 wrote to memory of 2444 2368 e6de332ad778f7a7cf160efa60656c3ac960dc77806905493d5cffe58ee1de16.exe 34 PID 2368 wrote to memory of 2444 2368 e6de332ad778f7a7cf160efa60656c3ac960dc77806905493d5cffe58ee1de16.exe 34 PID 2368 wrote to memory of 2444 2368 e6de332ad778f7a7cf160efa60656c3ac960dc77806905493d5cffe58ee1de16.exe 34 PID 2368 wrote to memory of 2924 2368 e6de332ad778f7a7cf160efa60656c3ac960dc77806905493d5cffe58ee1de16.exe 36 PID 2368 wrote to memory of 2924 2368 e6de332ad778f7a7cf160efa60656c3ac960dc77806905493d5cffe58ee1de16.exe 36 PID 2368 wrote to memory of 2924 2368 e6de332ad778f7a7cf160efa60656c3ac960dc77806905493d5cffe58ee1de16.exe 36 PID 2444 wrote to memory of 1236 2444 cmd.exe 38 PID 2444 wrote to memory of 1236 2444 cmd.exe 38 PID 2444 wrote to memory of 1236 2444 cmd.exe 38 PID 2924 wrote to memory of 1976 2924 cmd.exe 39 PID 2924 wrote to memory of 1976 2924 cmd.exe 39 PID 2924 wrote to memory of 1976 2924 cmd.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6de332ad778f7a7cf160efa60656c3ac960dc77806905493d5cffe58ee1de16.exe"C:\Users\Admin\AppData\Local\Temp\e6de332ad778f7a7cf160efa60656c3ac960dc77806905493d5cffe58ee1de16.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" cmd /c takeown /f "C:\Program Files\Windows Media Player\wmpnetwk.exe" && icacls "C:\Program Files\Windows Media Player\wmpnetwk.exe" /grant administrators:F2⤵
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\system32\takeown.exetakeown /f "C:\Program Files\Windows Media Player\wmpnetwk.exe"3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2764
-
-
C:\Windows\system32\icacls.exeicacls "C:\Program Files\Windows Media Player\wmpnetwk.exe" /grant administrators:F3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2608
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" cmd /c sc create "Accecss Auto Connetcion Manager" binPath= "C:\Program Files\Windows Media Player\wmixedwk.exe" START= auto DISPLAYNAME= "WebServer" TYPE= own2⤵
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\system32\sc.exesc create "Accecss Auto Connetcion Manager" binPath= "C:\Program Files\Windows Media Player\wmixedwk.exe" START= auto DISPLAYNAME= "WebServer" TYPE= own3⤵
- Launches sc.exe
PID:1236
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\kkxqbh.bat" "2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 33⤵
- Runs ping.exe
PID:1976
-
-
-
C:\Program Files\Windows Media Player\wmpnetwk.exe"C:\Program Files\Windows Media Player\wmpnetwk.exe"1⤵
- Executes dropped EXE
PID:2432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD590b85ffbdeead1be861d59134ea985b0
SHA155e9859aa7dba87678e7c529b571fdf6b7181339
SHA256ed0dc979eed9ab9933c49204d362de575c7112a792633fda75bb5d1dab50a5c2
SHA5128a1c10bbfe5651ab25bf36f4e8f2f65424c8e1004696c8141498b99ea2fbd7b3e5fae4d2cfee6835f7ff46bd2333602f4d8ac4a0f5b8e9757adb176332a3afce
-
Filesize
135B
MD544a3af72a2e7efad7f05b5b264f2b133
SHA1cfd7c8451a0c6e8123328b18f96bec50d04b50ab
SHA256471ff503db8bd1d39701d587ec4f2d3c97c2843a53e812fe726c970f7306fbb4
SHA5123d2009c7d4b82fd970ced78fe97b0d5ed08ca7a33480969deb5345195e50877e5efe8f80eeca86c63c5f87cc3779f7f9aba47eb1cca1c29656cb4f74bfd4e14a