Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
23s -
max time network
25s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 08:59
Static task
static1
Behavioral task
behavioral1
Sample
k1XJSSO.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
k1XJSSO.exe
Resource
win10v2004-20240709-en
Errors
General
-
Target
k1XJSSO.exe
-
Size
90KB
-
MD5
1c7f572b36e436360fcbf142aad58689
-
SHA1
bf60b1168ad8aa921501fa37b3a66edbc6ef5936
-
SHA256
22e2f0cb23c47b359f8eca3872596e6d4c67033568bba09ac0043bf1f5b1a314
-
SHA512
9596c7c534ede05082bd80245116df7ba0f4d0d88465ebd3d83579d7dbfdddf72ecad01ea19c1795fda089aeb070a58adf8883f5d7a72bb9144edf0930323a2a
-
SSDEEP
1536:H7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfvwoOl:b7DhdC6kzWypvaQ0FxyNTBfvo
Malware Config
Signatures
-
Delays execution with timeout.exe 1 IoCs
pid Process 412 timeout.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2700 tasklist.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "193" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeShutdownPrivilege 3488 shutdown.exe Token: SeRemoteShutdownPrivilege 3488 shutdown.exe Token: SeDebugPrivilege 2700 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5016 LogonUI.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3260 wrote to memory of 4092 3260 k1XJSSO.exe 84 PID 3260 wrote to memory of 4092 3260 k1XJSSO.exe 84 PID 4092 wrote to memory of 412 4092 cmd.exe 87 PID 4092 wrote to memory of 412 4092 cmd.exe 87 PID 4092 wrote to memory of 3488 4092 cmd.exe 90 PID 4092 wrote to memory of 3488 4092 cmd.exe 90 PID 4092 wrote to memory of 2700 4092 cmd.exe 92 PID 4092 wrote to memory of 2700 4092 cmd.exe 92 PID 4092 wrote to memory of 2004 4092 cmd.exe 93 PID 4092 wrote to memory of 2004 4092 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\k1XJSSO.exe"C:\Users\Admin\AppData\Local\Temp\k1XJSSO.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\AA2A.tmp\AA2B.tmp\AA2C.bat C:\Users\Admin\AppData\Local\Temp\k1XJSSO.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\system32\timeout.exetimeout /t 203⤵
- Delays execution with timeout.exe
PID:412
-
-
C:\Windows\system32\shutdown.exeshutdown /s /t 0 /f3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3488
-
-
C:\Windows\system32\tasklist.exetasklist /FI "WINDOWTITLE eq Recursive File Renamer and Fake Ransomware"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
C:\Windows\system32\find.exefind /I /N "cmd.exe"3⤵PID:2004
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39b0855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:5016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b6e1919a9ca970827428552753afb18c
SHA11838733ac35d669133de530f4a007b3e07bf52ad
SHA256a5e9d19b518f9ff6c1b7921cc1d36af8aef7ca7c14c996a11a8fc337f9c277da
SHA512e8ca15278f02086594b1ad134bbd09a7f101bda9f908f028e4585382a6d4ae04e202f3773fec8a88f8fd7f66b45f21b462e4b7e053b2301145c84f0cee64c26b