Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1195s -
max time network
1200s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 18:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Axiom Free Temp.exe
Resource
win7-20240611-en
2 signatures
300 seconds
Behavioral task
behavioral2
Sample
Axiom Free Temp.exe
Resource
win10v2004-20240508-en
5 signatures
300 seconds
General
-
Target
Axiom Free Temp.exe
-
Size
168KB
-
MD5
461a1663734d622fc49e4a03b17d284d
-
SHA1
52505039993d7c19cc28debbaef474f5ab61c745
-
SHA256
f55ff667003f1cb9794a487a925a6c86e9043fda46ec2ab30f8926fd5f509f59
-
SHA512
b3c95a238ba90e72658cf2d0844f8d00dff13715110090d41031a15d0c35b082e857f5fdbc7c30deeda1164764f68bfa02fa4b89d522406c4b11b9dccca8b94d
-
SSDEEP
3072:Lhnks0n7phfmxymej1ic0UmJTQSaMm5/6aoP1D:1tU/mxyhjGvWljoP1D
Score
8/10
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\CnMGLkRhdIlKrtGqJCEvCNgWDG\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\CnMGLkRhdIlKrtGqJCEvCNgWDG" Axiom Free Temp.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 1200 Axiom Free Temp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 1200 Axiom Free Temp.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1200 Axiom Free Temp.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1200 wrote to memory of 4816 1200 Axiom Free Temp.exe 92 PID 1200 wrote to memory of 4816 1200 Axiom Free Temp.exe 92 PID 1200 wrote to memory of 3504 1200 Axiom Free Temp.exe 93 PID 1200 wrote to memory of 3504 1200 Axiom Free Temp.exe 93 PID 1200 wrote to memory of 4960 1200 Axiom Free Temp.exe 97 PID 1200 wrote to memory of 4960 1200 Axiom Free Temp.exe 97 PID 1200 wrote to memory of 4980 1200 Axiom Free Temp.exe 98 PID 1200 wrote to memory of 4980 1200 Axiom Free Temp.exe 98 PID 1200 wrote to memory of 4760 1200 Axiom Free Temp.exe 101 PID 1200 wrote to memory of 4760 1200 Axiom Free Temp.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\Axiom Free Temp.exe"C:\Users\Admin\AppData\Local\Temp\Axiom Free Temp.exe"1⤵
- Sets service image path in registry
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c color 52⤵PID:4816
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3504
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4960
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4980
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3852,i,1067197275908310731,12785105794523264014,262144 --variations-seed-version --mojo-platform-channel-handle=3920 /prefetch:81⤵PID:3160
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4128,i,1067197275908310731,12785105794523264014,262144 --variations-seed-version --mojo-platform-channel-handle=4144 /prefetch:81⤵PID:4028