Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 17:27
Static task
static1
Behavioral task
behavioral1
Sample
a8847841699d6a52ac3f93de6cececb92468a8f71b7c7752247c00c04e6c310b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a8847841699d6a52ac3f93de6cececb92468a8f71b7c7752247c00c04e6c310b.exe
Resource
win10v2004-20240611-en
General
-
Target
a8847841699d6a52ac3f93de6cececb92468a8f71b7c7752247c00c04e6c310b.exe
-
Size
5.7MB
-
MD5
f94a9131f449eb918f4dbeca0ddf1c3c
-
SHA1
62ce620a4c460bd8c426bd722e48e1097687cb62
-
SHA256
a8847841699d6a52ac3f93de6cececb92468a8f71b7c7752247c00c04e6c310b
-
SHA512
f4e9a1f572e0a44bfc87c0d5b829c0d9584843f410729e1844443ec0bd1ecf5f59612146648deb5f89b296a04b98612408e5534181b8b0f4253dc677ffb73109
-
SSDEEP
98304:b/6n94bDY2EBcBuq62V///4nAWakrn7S/IhWoaVVfs/VIsMF4JD8iulhq7NmXkVE:uMD+cpvJ/4H3nmghWoa/fsysMF4JD85n
Malware Config
Signatures
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions a8847841699d6a52ac3f93de6cececb92468a8f71b7c7752247c00c04e6c310b.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 996 a8847841699d6a52ac3f93de6cececb92468a8f71b7c7752247c00c04e6c310b.exe 996 a8847841699d6a52ac3f93de6cececb92468a8f71b7c7752247c00c04e6c310b.exe 996 a8847841699d6a52ac3f93de6cececb92468a8f71b7c7752247c00c04e6c310b.exe 996 a8847841699d6a52ac3f93de6cececb92468a8f71b7c7752247c00c04e6c310b.exe 996 a8847841699d6a52ac3f93de6cececb92468a8f71b7c7752247c00c04e6c310b.exe 996 a8847841699d6a52ac3f93de6cececb92468a8f71b7c7752247c00c04e6c310b.exe 996 a8847841699d6a52ac3f93de6cececb92468a8f71b7c7752247c00c04e6c310b.exe 996 a8847841699d6a52ac3f93de6cececb92468a8f71b7c7752247c00c04e6c310b.exe 996 a8847841699d6a52ac3f93de6cececb92468a8f71b7c7752247c00c04e6c310b.exe 996 a8847841699d6a52ac3f93de6cececb92468a8f71b7c7752247c00c04e6c310b.exe 996 a8847841699d6a52ac3f93de6cececb92468a8f71b7c7752247c00c04e6c310b.exe 996 a8847841699d6a52ac3f93de6cececb92468a8f71b7c7752247c00c04e6c310b.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeShutdownPrivilege 996 a8847841699d6a52ac3f93de6cececb92468a8f71b7c7752247c00c04e6c310b.exe Token: SeShutdownPrivilege 996 a8847841699d6a52ac3f93de6cececb92468a8f71b7c7752247c00c04e6c310b.exe Token: SeShutdownPrivilege 996 a8847841699d6a52ac3f93de6cececb92468a8f71b7c7752247c00c04e6c310b.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 996 a8847841699d6a52ac3f93de6cececb92468a8f71b7c7752247c00c04e6c310b.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 996 a8847841699d6a52ac3f93de6cececb92468a8f71b7c7752247c00c04e6c310b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8847841699d6a52ac3f93de6cececb92468a8f71b7c7752247c00c04e6c310b.exe"C:\Users\Admin\AppData\Local\Temp\a8847841699d6a52ac3f93de6cececb92468a8f71b7c7752247c00c04e6c310b.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
642B
MD59bb73a0d45036621f5d4b2d1f633faf8
SHA1023f4ca45793551287e6b8068326b98e87c73516
SHA25650b8cc49792986caa6f5380ef340c56c815462d4490defa31f4463f59eb44a02
SHA512760b4601fa9d006a00ccd54b3a5df16b11e892b0ff18b06f762fe81de08335454b7d5857f035e651ebbb6d3ed37f4c126c11f9a28309068e4575ca62aa3b731a
-
Filesize
6KB
MD5b812ef301515d9c424fc865dc1a09cc9
SHA10388b2c27b752fab465e60f80b334eb5ad727ed3
SHA256c7e61ac5961ff944a34488da6e333d10f3d3fbbace8098f674fb748b028e2757
SHA5124e3e1dc0a92e5c0301b1c3e6889a8398676a7b4ceb95c1815e1219ee1abaaa6755cfd969f12788815fd4be665f0ae3db58790718f4fd15684db4b889ad089a6d
-
Filesize
248B
MD50a6524146fba0f0ae5234a8a0311f9b8
SHA1c4b349b0e15853dfc45de1015d3ad03effdd47d1
SHA2567ad6850fde5ef564cf07a9e1f064d79f8cee9acddede7fb54cc51969cfe5fcf6
SHA5123f69702f6ef399b2049d7206f4dd6c6546afa90b801c195770ef6b937d2008ff2742ba6a15d7324428366b929bb3dee3ed7b6b0f905b9af636ad24b47944182e