Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/08/2024, 17:41
Static task
static1
Behavioral task
behavioral1
Sample
f971411d141b8cd01daf722fbb27cda0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f971411d141b8cd01daf722fbb27cda0N.exe
Resource
win10v2004-20240802-en
General
-
Target
f971411d141b8cd01daf722fbb27cda0N.exe
-
Size
1.6MB
-
MD5
f971411d141b8cd01daf722fbb27cda0
-
SHA1
175f22d2c05c9b224715bc18031b0186328e081e
-
SHA256
d92b514dd0e66b1cb40472b426dff155b9be982b3380eb26b1d27762107668fb
-
SHA512
bd91bfa8df9ecdcb2eae1ed651ade7616874002c7e9ac879664a6b715063a9295abe5a1f8daec66a82ea536d4880662540bfc1c7201eee4576b16a6f22df3089
-
SSDEEP
24576:luHcSjySebnZgqJAj9uhRKFiIhDbHpjyAwI+w3mqvYHpuOSXr:lkP+BZnrhEkIDjP5B2qvypuO6
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "userinit.exe,C:\\Windows\\system32\\ntos.exe," f971411d141b8cd01daf722fbb27cda0N.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\pathx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f971411d141b8cd01daf722fbb27cda0N.exe" f971411d141b8cd01daf722fbb27cda0N.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ntos.exe f971411d141b8cd01daf722fbb27cda0N.exe File created C:\Windows\SysWOW64\ntos.exe f971411d141b8cd01daf722fbb27cda0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f971411d141b8cd01daf722fbb27cda0N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe 2520 f971411d141b8cd01daf722fbb27cda0N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2520 f971411d141b8cd01daf722fbb27cda0N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f971411d141b8cd01daf722fbb27cda0N.exe"C:\Users\Admin\AppData\Local\Temp\f971411d141b8cd01daf722fbb27cda0N.exe"1⤵
- Modifies WinLogon for persistence
- Modifies WinLogon
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2520