Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/08/2024, 17:41
Static task
static1
Behavioral task
behavioral1
Sample
f971411d141b8cd01daf722fbb27cda0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f971411d141b8cd01daf722fbb27cda0N.exe
Resource
win10v2004-20240802-en
General
-
Target
f971411d141b8cd01daf722fbb27cda0N.exe
-
Size
1.6MB
-
MD5
f971411d141b8cd01daf722fbb27cda0
-
SHA1
175f22d2c05c9b224715bc18031b0186328e081e
-
SHA256
d92b514dd0e66b1cb40472b426dff155b9be982b3380eb26b1d27762107668fb
-
SHA512
bd91bfa8df9ecdcb2eae1ed651ade7616874002c7e9ac879664a6b715063a9295abe5a1f8daec66a82ea536d4880662540bfc1c7201eee4576b16a6f22df3089
-
SSDEEP
24576:luHcSjySebnZgqJAj9uhRKFiIhDbHpjyAwI+w3mqvYHpuOSXr:lkP+BZnrhEkIDjP5B2qvypuO6
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\ntos.exe," f971411d141b8cd01daf722fbb27cda0N.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\pathx = "C:\\Users\\Admin\\AppData\\Local\\Temp\\f971411d141b8cd01daf722fbb27cda0N.exe" f971411d141b8cd01daf722fbb27cda0N.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ntos.exe f971411d141b8cd01daf722fbb27cda0N.exe File created C:\Windows\SysWOW64\ntos.exe f971411d141b8cd01daf722fbb27cda0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f971411d141b8cd01daf722fbb27cda0N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe 3244 f971411d141b8cd01daf722fbb27cda0N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3244 f971411d141b8cd01daf722fbb27cda0N.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5 PID 3244 wrote to memory of 612 3244 f971411d141b8cd01daf722fbb27cda0N.exe 5
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:612
-
C:\Users\Admin\AppData\Local\Temp\f971411d141b8cd01daf722fbb27cda0N.exe"C:\Users\Admin\AppData\Local\Temp\f971411d141b8cd01daf722fbb27cda0N.exe"1⤵
- Modifies WinLogon for persistence
- Modifies WinLogon
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3244