Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28/07/2024, 01:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe
Resource
win7-20240708-en
6 signatures
150 seconds
General
-
Target
0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe
-
Size
10.0MB
-
MD5
0df2bec1762644d811440aeac1bf570f
-
SHA1
4b185a16e75369435b9816a111d2b02445bbb041
-
SHA256
0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e
-
SHA512
d6c2a56c6eed704e5d092484c7151b60d95f915e7069693d10e14395bdbf96f579a212fa9978a5996ad443cb097c85fe17d530749dbb93410935491be5d6bfa9
-
SSDEEP
196608:LsPk1QL2ginFlPuSFQgm3asoogknF6hBTv8KGg:wPMQLXujPuSFdmK1eqo
Malware Config
Signatures
-
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2888 sc.exe 1884 sc.exe 2196 sc.exe 2864 sc.exe -
Kills process with taskkill 16 IoCs
pid Process 2700 taskkill.exe 1804 taskkill.exe 2652 taskkill.exe 1144 taskkill.exe 1940 taskkill.exe 3012 taskkill.exe 2020 taskkill.exe 2596 taskkill.exe 952 taskkill.exe 2788 taskkill.exe 1188 taskkill.exe 836 taskkill.exe 1684 taskkill.exe 2796 taskkill.exe 2660 taskkill.exe 2640 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 1684 taskkill.exe Token: SeDebugPrivilege 2796 taskkill.exe Token: SeDebugPrivilege 2700 taskkill.exe Token: SeDebugPrivilege 3012 taskkill.exe Token: SeDebugPrivilege 2660 taskkill.exe Token: SeDebugPrivilege 2640 taskkill.exe Token: SeDebugPrivilege 2652 taskkill.exe Token: SeDebugPrivilege 1804 taskkill.exe Token: SeDebugPrivilege 1144 taskkill.exe Token: SeDebugPrivilege 2020 taskkill.exe Token: SeDebugPrivilege 2596 taskkill.exe Token: SeDebugPrivilege 952 taskkill.exe Token: SeDebugPrivilege 2788 taskkill.exe Token: SeDebugPrivilege 1188 taskkill.exe Token: SeDebugPrivilege 836 taskkill.exe Token: SeDebugPrivilege 1940 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2536 wrote to memory of 832 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 31 PID 2536 wrote to memory of 832 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 31 PID 2536 wrote to memory of 832 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 31 PID 2536 wrote to memory of 1824 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 32 PID 2536 wrote to memory of 1824 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 32 PID 2536 wrote to memory of 1824 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 32 PID 2536 wrote to memory of 2572 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 33 PID 2536 wrote to memory of 2572 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 33 PID 2536 wrote to memory of 2572 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 33 PID 2536 wrote to memory of 2540 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 34 PID 2536 wrote to memory of 2540 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 34 PID 2536 wrote to memory of 2540 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 34 PID 2536 wrote to memory of 2016 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 35 PID 2536 wrote to memory of 2016 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 35 PID 2536 wrote to memory of 2016 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 35 PID 2536 wrote to memory of 2056 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 36 PID 2536 wrote to memory of 2056 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 36 PID 2536 wrote to memory of 2056 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 36 PID 2536 wrote to memory of 2912 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 37 PID 2536 wrote to memory of 2912 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 37 PID 2536 wrote to memory of 2912 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 37 PID 832 wrote to memory of 1684 832 cmd.exe 38 PID 832 wrote to memory of 1684 832 cmd.exe 38 PID 832 wrote to memory of 1684 832 cmd.exe 38 PID 2572 wrote to memory of 2796 2572 cmd.exe 39 PID 2572 wrote to memory of 2796 2572 cmd.exe 39 PID 2572 wrote to memory of 2796 2572 cmd.exe 39 PID 2016 wrote to memory of 3012 2016 cmd.exe 40 PID 2016 wrote to memory of 3012 2016 cmd.exe 40 PID 2016 wrote to memory of 3012 2016 cmd.exe 40 PID 1824 wrote to memory of 2700 1824 cmd.exe 41 PID 1824 wrote to memory of 2700 1824 cmd.exe 41 PID 1824 wrote to memory of 2700 1824 cmd.exe 41 PID 2540 wrote to memory of 2196 2540 cmd.exe 42 PID 2540 wrote to memory of 2196 2540 cmd.exe 42 PID 2540 wrote to memory of 2196 2540 cmd.exe 42 PID 2912 wrote to memory of 320 2912 cmd.exe 43 PID 2912 wrote to memory of 320 2912 cmd.exe 43 PID 2912 wrote to memory of 320 2912 cmd.exe 43 PID 2536 wrote to memory of 2780 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 45 PID 2536 wrote to memory of 2780 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 45 PID 2536 wrote to memory of 2780 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 45 PID 2536 wrote to memory of 2772 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 46 PID 2536 wrote to memory of 2772 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 46 PID 2536 wrote to memory of 2772 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 46 PID 2536 wrote to memory of 2720 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 47 PID 2536 wrote to memory of 2720 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 47 PID 2536 wrote to memory of 2720 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 47 PID 2536 wrote to memory of 2000 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 48 PID 2536 wrote to memory of 2000 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 48 PID 2536 wrote to memory of 2000 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 48 PID 2536 wrote to memory of 2608 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 49 PID 2536 wrote to memory of 2608 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 49 PID 2536 wrote to memory of 2608 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 49 PID 2536 wrote to memory of 2604 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 50 PID 2536 wrote to memory of 2604 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 50 PID 2536 wrote to memory of 2604 2536 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 50 PID 2772 wrote to memory of 2640 2772 cmd.exe 51 PID 2772 wrote to memory of 2640 2772 cmd.exe 51 PID 2772 wrote to memory of 2640 2772 cmd.exe 51 PID 2780 wrote to memory of 2652 2780 cmd.exe 52 PID 2780 wrote to memory of 2652 2780 cmd.exe 52 PID 2780 wrote to memory of 2652 2780 cmd.exe 52 PID 2720 wrote to memory of 2660 2720 cmd.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe"C:\Users\Admin\AppData\Local\Temp\0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\system32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
-
-
C:\Windows\system32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2700
-
-
-
C:\Windows\system32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
-
-
C:\Windows\system32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:2196
-
-
-
C:\Windows\system32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
-
-
C:\Windows\system32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&12⤵PID:2056
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe" MD52⤵
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe" MD53⤵PID:320
-
-
-
C:\Windows\system32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2652
-
-
-
C:\Windows\system32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
-
C:\Windows\system32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
-
C:\Windows\system32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:2000
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:2864
-
-
-
C:\Windows\system32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&12⤵PID:2608
-
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1804
-
-
-
C:\Windows\system32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&12⤵PID:2604
-
-
C:\Windows\system32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:1608
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1144
-
-
-
C:\Windows\system32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&12⤵PID:316
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2020
-
-
-
C:\Windows\system32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:1816
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
-
C:\Windows\system32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:2516
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:2888
-
-
-
C:\Windows\system32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&12⤵PID:1748
-
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
-
-
C:\Windows\system32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&12⤵PID:1576
-
-
C:\Windows\system32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:2708
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:836
-
-
-
C:\Windows\system32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&12⤵PID:1536
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:952
-
-
-
C:\Windows\system32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:2140
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1188
-
-
-
C:\Windows\system32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:2012
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:1884
-
-
-
C:\Windows\system32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&12⤵PID:2036
-
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1940
-
-
-
C:\Windows\system32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&12⤵PID:1376
-