Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
28/07/2024, 01:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe
Resource
win7-20240708-en
6 signatures
150 seconds
General
-
Target
0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe
-
Size
10.0MB
-
MD5
0df2bec1762644d811440aeac1bf570f
-
SHA1
4b185a16e75369435b9816a111d2b02445bbb041
-
SHA256
0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e
-
SHA512
d6c2a56c6eed704e5d092484c7151b60d95f915e7069693d10e14395bdbf96f579a212fa9978a5996ad443cb097c85fe17d530749dbb93410935491be5d6bfa9
-
SSDEEP
196608:LsPk1QL2ginFlPuSFQgm3asoogknF6hBTv8KGg:wPMQLXujPuSFdmK1eqo
Malware Config
Signatures
-
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4424 sc.exe 2328 sc.exe 4216 sc.exe 1476 sc.exe -
Kills process with taskkill 16 IoCs
pid Process 1956 taskkill.exe 180 taskkill.exe 988 taskkill.exe 512 taskkill.exe 3552 taskkill.exe 2244 taskkill.exe 2624 taskkill.exe 3248 taskkill.exe 2408 taskkill.exe 864 taskkill.exe 4996 taskkill.exe 3620 taskkill.exe 3848 taskkill.exe 1020 taskkill.exe 5088 taskkill.exe 4976 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 3848 taskkill.exe Token: SeDebugPrivilege 1020 taskkill.exe Token: SeDebugPrivilege 1956 taskkill.exe Token: SeDebugPrivilege 3552 taskkill.exe Token: SeDebugPrivilege 5088 taskkill.exe Token: SeDebugPrivilege 180 taskkill.exe Token: SeDebugPrivilege 2408 taskkill.exe Token: SeDebugPrivilege 4976 taskkill.exe Token: SeDebugPrivilege 3248 taskkill.exe Token: SeDebugPrivilege 3620 taskkill.exe Token: SeDebugPrivilege 988 taskkill.exe Token: SeDebugPrivilege 4996 taskkill.exe Token: SeDebugPrivilege 2244 taskkill.exe Token: SeDebugPrivilege 2624 taskkill.exe Token: SeDebugPrivilege 512 taskkill.exe Token: SeDebugPrivilege 864 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4288 wrote to memory of 2484 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 87 PID 4288 wrote to memory of 2484 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 87 PID 4288 wrote to memory of 4900 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 88 PID 4288 wrote to memory of 4900 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 88 PID 4288 wrote to memory of 1104 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 89 PID 4288 wrote to memory of 1104 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 89 PID 4288 wrote to memory of 3968 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 90 PID 4288 wrote to memory of 3968 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 90 PID 4288 wrote to memory of 2688 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 91 PID 4288 wrote to memory of 2688 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 91 PID 4288 wrote to memory of 1776 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 92 PID 4288 wrote to memory of 1776 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 92 PID 4288 wrote to memory of 212 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 93 PID 4288 wrote to memory of 212 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 93 PID 4900 wrote to memory of 3848 4900 cmd.exe 94 PID 4900 wrote to memory of 3848 4900 cmd.exe 94 PID 3968 wrote to memory of 4424 3968 cmd.exe 96 PID 3968 wrote to memory of 4424 3968 cmd.exe 96 PID 2484 wrote to memory of 1956 2484 cmd.exe 97 PID 2484 wrote to memory of 1956 2484 cmd.exe 97 PID 212 wrote to memory of 3896 212 cmd.exe 95 PID 212 wrote to memory of 3896 212 cmd.exe 95 PID 1104 wrote to memory of 1020 1104 cmd.exe 98 PID 1104 wrote to memory of 1020 1104 cmd.exe 98 PID 2688 wrote to memory of 3552 2688 cmd.exe 99 PID 2688 wrote to memory of 3552 2688 cmd.exe 99 PID 4288 wrote to memory of 1980 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 101 PID 4288 wrote to memory of 1980 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 101 PID 4288 wrote to memory of 2188 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 102 PID 4288 wrote to memory of 2188 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 102 PID 4288 wrote to memory of 2152 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 103 PID 4288 wrote to memory of 2152 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 103 PID 4288 wrote to memory of 3028 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 104 PID 4288 wrote to memory of 3028 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 104 PID 4288 wrote to memory of 4140 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 105 PID 4288 wrote to memory of 4140 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 105 PID 4288 wrote to memory of 1108 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 106 PID 4288 wrote to memory of 1108 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 106 PID 2152 wrote to memory of 5088 2152 cmd.exe 107 PID 2152 wrote to memory of 5088 2152 cmd.exe 107 PID 4140 wrote to memory of 180 4140 cmd.exe 108 PID 4140 wrote to memory of 180 4140 cmd.exe 108 PID 1980 wrote to memory of 2408 1980 cmd.exe 109 PID 1980 wrote to memory of 2408 1980 cmd.exe 109 PID 3028 wrote to memory of 2328 3028 cmd.exe 110 PID 3028 wrote to memory of 2328 3028 cmd.exe 110 PID 2188 wrote to memory of 4976 2188 cmd.exe 111 PID 2188 wrote to memory of 4976 2188 cmd.exe 111 PID 4288 wrote to memory of 1396 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 112 PID 4288 wrote to memory of 1396 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 112 PID 4288 wrote to memory of 3720 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 113 PID 4288 wrote to memory of 3720 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 113 PID 4288 wrote to memory of 4212 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 114 PID 4288 wrote to memory of 4212 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 114 PID 4288 wrote to memory of 3096 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 115 PID 4288 wrote to memory of 3096 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 115 PID 4288 wrote to memory of 3576 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 116 PID 4288 wrote to memory of 3576 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 116 PID 4288 wrote to memory of 4120 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 117 PID 4288 wrote to memory of 4120 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 117 PID 4288 wrote to memory of 5040 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 118 PID 4288 wrote to memory of 5040 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 118 PID 4288 wrote to memory of 1052 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 119 PID 4288 wrote to memory of 1052 4288 0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe"C:\Users\Admin\AppData\Local\Temp\0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3848
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1020
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:4424
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3552
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&12⤵PID:1776
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe" MD52⤵
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\0b9f153a21e94859500bfde94d1bd93e7ff44716b9f12c5271576e41f34aec8e.exe" MD53⤵PID:3896
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4976
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5088
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:2328
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:180
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&12⤵PID:1108
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:1396
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:512
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&12⤵PID:3720
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3248
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:4212
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2244
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:3096
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:4216
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&12⤵PID:3576
-
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:988
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&12⤵PID:4120
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:5040
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2624
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T >nul 2>&12⤵PID:1052
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq wireshark*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3620
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:3196
-
C:\Windows\system32\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4996
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:1172
-
C:\Windows\system32\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:1476
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c taskkill /IM HTTPDebuggerSvc.exe /F >nul 2>&12⤵PID:2452
-
C:\Windows\system32\taskkill.exetaskkill /IM HTTPDebuggerSvc.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:864
-
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c @RD /S /Q "C:\Users\%username%\AppData\Local\Microsoft\Windows\INetCache\IE" >nul 2>&12⤵PID:4992
-