Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 05:33
Static task
static1
Behavioral task
behavioral1
Sample
7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exe
Resource
win10v2004-20240802-en
General
-
Target
7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exe
-
Size
1.9MB
-
MD5
3d4f9458125b95f8b58dd0b88e7915d7
-
SHA1
f1a1df18357053ffd8317dfc55506b43caa47daa
-
SHA256
7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af
-
SHA512
feab5b7b668592efa4932c90c81425ac2ac6c40b14fdee500e2bb8ab29930854bd01a7225e9754560d92bb08d4a090be925ac4a5802c08b509a9f22058d89ed2
-
SSDEEP
49152:Hi39+084E6W4W8Vm/BL49aXZmMAdlR+WOK+hcY2q0e8:6+HVb4W8QR49unORImv
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\jiVdKxDCueTgvsqGIMxKXz\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\jiVdKxDCueTgvsqGIMxKXz" load.exe -
Executes dropped EXE 2 IoCs
pid Process 3216 sg.tmp 1940 load.exe -
Loads dropped DLL 7 IoCs
pid Process 1940 load.exe 1940 load.exe 1940 load.exe 1940 load.exe 1940 load.exe 1940 load.exe 1940 load.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2056 7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exe 2056 7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 1940 load.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeBackupPrivilege 2056 7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exe Token: SeRestorePrivilege 2056 7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exe Token: 33 2056 7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exe Token: SeIncBasePriorityPrivilege 2056 7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exe Token: 33 2056 7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exe Token: SeIncBasePriorityPrivilege 2056 7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exe Token: 33 2056 7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exe Token: SeIncBasePriorityPrivilege 2056 7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exe Token: SeRestorePrivilege 3216 sg.tmp Token: 35 3216 sg.tmp Token: SeSecurityPrivilege 3216 sg.tmp Token: SeSecurityPrivilege 3216 sg.tmp Token: 33 2056 7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exe Token: SeIncBasePriorityPrivilege 2056 7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exe Token: SeLoadDriverPrivilege 1940 load.exe Token: SeDebugPrivilege 2056 7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exe Token: 33 2056 7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exe Token: SeIncBasePriorityPrivilege 2056 7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exe Token: SeBackupPrivilege 4104 7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exe Token: SeRestorePrivilege 4104 7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exe Token: 33 4104 7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exe Token: SeIncBasePriorityPrivilege 4104 7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2344 2056 7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exe 84 PID 2056 wrote to memory of 2344 2056 7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exe 84 PID 2056 wrote to memory of 3216 2056 7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exe 86 PID 2056 wrote to memory of 3216 2056 7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exe 86 PID 2056 wrote to memory of 3216 2056 7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exe 86 PID 2056 wrote to memory of 628 2056 7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exe 89 PID 2056 wrote to memory of 628 2056 7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exe 89 PID 628 wrote to memory of 1940 628 cmd.exe 91 PID 628 wrote to memory of 1940 628 cmd.exe 91 PID 2056 wrote to memory of 4104 2056 7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exe 93 PID 2056 wrote to memory of 4104 2056 7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exe 93 PID 2056 wrote to memory of 4104 2056 7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exe 93 PID 4104 wrote to memory of 3328 4104 7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exe 94 PID 4104 wrote to memory of 3328 4104 7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exe"C:\Users\Admin\AppData\Local\Temp\7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c set2⤵PID:2344
-
-
C:\Users\Admin\AppData\Local\Temp\~8416207314005962103~\sg.tmp7zG_exe x "C:\Users\Admin\AppData\Local\Temp\7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exe" -y -aoa -o"C:\Users\Admin\AppData\Local\Temp\~8405680493323536727"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3216
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\~8405680493323536727\11.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\~8405680493323536727\load.exeload.exe WIN950.sys3⤵
- Sets service image path in registry
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:1940
-
-
-
C:\Users\Admin\AppData\Local\Temp\7ab3d03e3b85e93b6867e3dfbf29a2b00b10b41718a1628b5ebeb3de2acdb9af.exePECMD**pecmd-cmd* EXEC -wd:C: -hide cmd /c "C:\Users\Admin\AppData\Local\Temp\~5740314116122048625.cmd"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SYSTEM32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\~5740314116122048625.cmd"3⤵PID:3328
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
373B
MD55a2d85c9ce239e69cd219943bbd4d727
SHA10333ee4d7b49000927737d3faaa16cb6d765b55b
SHA25664e714e36187fc91305ea94b4a56046501e39e7ada901b28c9211b9f2ca1b132
SHA512c66da39e809b70ed102022b0de213882bdcd6f2c70bcb94e9a90d1580b446ba9fcce260ed68688b9b32b34bc01f1e3fb7aeaf223658b64be1e1644f00f71fb5a
-
Filesize
48B
MD5c44c912ce8cb08c448cbd3fa8d84ecf0
SHA13bb4177aa12186056b1d4760d4046f77698edf17
SHA256d901413a2f4597832523af5f968b9b72bc003ecca4540206446467083adde38a
SHA5122ea057f2217dec4a04cc6d7e843662200f790919bf29281b274e90d5b888b1cb62778d56abadf996ee43fcb0405bb4d446505122aafbbe5dede7915d431bb0a9
-
Filesize
128KB
MD5f57fb935a9a76e151229f547c2204bba
SHA14021b804469816c3136b40c4ceb44c8d60ed15f5
SHA256a77277af540d411ae33d371cc6f54d7b0a1937e0c14db7666d32c22fc5dca9c0
SHA512cd9fc3fc460eba6a1b9f984b794940d28705ecb738df8595c2341abe4347141db14a9ff637c9f902e8742f5c48bbb61da7d5e231cc5b2bad2e8746c5a3e3e6ed
-
Filesize
17KB
MD56fb4ecd1afa698e1cd1f5680116f7aa7
SHA168eae39e8ea56a5e1d9657d7ac2a8be742dc5bc4
SHA256e1894b77d61abaf68e36c7dfee1d7662f43576ee498b6133aa9713f9dcdeab8e
SHA512b870c2e883df77a712d73668e8a0ec181c41f7d10bdd78bd25c616fddb024c6fa65edefdab334c95eb750f3f7d39a4ace144d660e934ea2d2f1ccc107b8be184
-
Filesize
556KB
MD5d5457ab33b79357d0c0acaa17119a44d
SHA1572d3003af20308bf13bcddbbe4d85c9dbc6de35
SHA2563dbf0e5076a5a3997f89e9e57d7452cc7f9d1dd131a16da44cdd288ca791eccb
SHA51290e752d1c0dd4f6b51df843055dc3ab31db3f10d53f2b608bade1048e8d5f1dd2f8398acd1f2e54eedea1103291ae56918c50e0902af1f74ab0a39e136826c62
-
Filesize
977KB
MD537dc8cc78ecbcd12f27e665b70baefa7
SHA146fb9910cc10c4c0c52b547700e1950ce233be89
SHA256b53add5b7bd6bb11fecc7be159885d0b75736d02423c11edc6eeb6f4bea80f6c
SHA512078b0b408510c07eac85518f03a9e3fac8e4c8e2e36ccb8cd26962498c7f5bedbd79f7034af3ebfef9984f85d81c9032446b1b5c156b2174a769657ea0ab60a1
-
Filesize
1.7MB
MD5c3130cfb00549a5a92da60e7f79f5fc9
SHA156c2e8fb1af609525b0f732bb67b806bddab3752
SHA256eee42eabc546e5aa760f8df7105fcf505abffcb9ec4bf54398436303e407a3f8
SHA51229bab5b441484bdfac9ec21cd4f0f7454af05bfd7d77f7d4662aeaeaa0d3e25439d52aa341958e7896701546b4a607d3c7a32715386c78b746dfae8529a70748
-
Filesize
58KB
MD5868fd5f1ab2d50204c6b046fe172d4b8
SHA1f2b43652ef62cba5f6f04f32f16b6b89819bc978
SHA256104e5817ece4831e9989d8937c8dfe55d581db6b5bc8e22a1b492ca872eda70e
SHA512402a0402b318539f26eac2fcd890700d2103f8eabd4b5289b64e2cdb5c30f4bb2b18f342c8a1ecc2cafb3f1d4258387a5300f9a86056f27b176b3fe995f9fc9d
-
Filesize
715KB
MD57c4718943bd3f66ebdb47ccca72c7b1e
SHA1f9edfaa7adb8fa528b2e61b2b251f18da10a6969
SHA2564cc32d00338fc7b206a7c052297acf9ac304ae7de9d61a2475a116959c1524fc
SHA512e18c40d646fa4948f90f7471da55489df431f255041ebb6dcef86346f91078c9b27894e27216a4b2fe2a1c5e501c7953c77893cf696930123d28a322d49e1516