Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 18:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Axiom Free Temp.exe
Resource
win7-20240508-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
Axiom Free Temp.exe
Resource
win10v2004-20240611-en
3 signatures
150 seconds
General
-
Target
Axiom Free Temp.exe
-
Size
168KB
-
MD5
461a1663734d622fc49e4a03b17d284d
-
SHA1
52505039993d7c19cc28debbaef474f5ab61c745
-
SHA256
f55ff667003f1cb9794a487a925a6c86e9043fda46ec2ab30f8926fd5f509f59
-
SHA512
b3c95a238ba90e72658cf2d0844f8d00dff13715110090d41031a15d0c35b082e857f5fdbc7c30deeda1164764f68bfa02fa4b89d522406c4b11b9dccca8b94d
-
SSDEEP
3072:Lhnks0n7phfmxymej1ic0UmJTQSaMm5/6aoP1D:1tU/mxyhjGvWljoP1D
Score
8/10
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\ZdJXRVjjGwDyNsHgiZuUgePFcIg\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\ZdJXRVjjGwDyNsHgiZuUgePFcIg" Axiom Free Temp.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 1232 Axiom Free Temp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 1232 Axiom Free Temp.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1232 Axiom Free Temp.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1232 wrote to memory of 2096 1232 Axiom Free Temp.exe 29 PID 1232 wrote to memory of 2096 1232 Axiom Free Temp.exe 29 PID 1232 wrote to memory of 2096 1232 Axiom Free Temp.exe 29 PID 1232 wrote to memory of 2128 1232 Axiom Free Temp.exe 30 PID 1232 wrote to memory of 2128 1232 Axiom Free Temp.exe 30 PID 1232 wrote to memory of 2128 1232 Axiom Free Temp.exe 30 PID 1232 wrote to memory of 2332 1232 Axiom Free Temp.exe 31 PID 1232 wrote to memory of 2332 1232 Axiom Free Temp.exe 31 PID 1232 wrote to memory of 2332 1232 Axiom Free Temp.exe 31 PID 1232 wrote to memory of 2348 1232 Axiom Free Temp.exe 32 PID 1232 wrote to memory of 2348 1232 Axiom Free Temp.exe 32 PID 1232 wrote to memory of 2348 1232 Axiom Free Temp.exe 32 PID 1232 wrote to memory of 3064 1232 Axiom Free Temp.exe 33 PID 1232 wrote to memory of 3064 1232 Axiom Free Temp.exe 33 PID 1232 wrote to memory of 3064 1232 Axiom Free Temp.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\Axiom Free Temp.exe"C:\Users\Admin\AppData\Local\Temp\Axiom Free Temp.exe"1⤵
- Sets service image path in registry
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c color 52⤵PID:2096
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2128
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2332
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2348
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3064
-