Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
70s -
max time network
67s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 04:37
Static task
static1
General
-
Target
-
Size
6.8MB
-
MD5
30ecc2641e6713f25c6066583e812f7c
-
SHA1
a30acd171ae28b892cb0e4786ab3b91032bb4f38
-
SHA256
cb68f377a41ebf3406d79dde3436c482dcea0f413be3738e365c8427cd663a28
-
SHA512
853ccbb76f4b778cd9b6579b75131d36c75a7381e7ecbd85f20f40c2eff3e7a0f3fddbd08a59a975bca80a5831dc2900cafc0fe87525b837dc776593839e13cd
-
SSDEEP
196608:YvwUsOYV7ao8tWwDH5fAydcw/fx1kliWj:Yvw1OtB75fAG880
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2468 [email protected] 3124 [email protected] -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeRestorePrivilege 3612 7zG.exe Token: 35 3612 7zG.exe Token: SeSecurityPrivilege 3612 7zG.exe Token: SeSecurityPrivilege 3612 7zG.exe Token: SeRestorePrivilege 4700 7zG.exe Token: 35 4700 7zG.exe Token: SeSecurityPrivilege 4700 7zG.exe Token: SeSecurityPrivilege 4700 7zG.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3612 7zG.exe 4700 7zG.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 5076 OpenWith.exe 3608 OpenWith.exe 1912 OpenWith.exe 1912 OpenWith.exe 1912 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.exePID:2124
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5076
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4364
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3608
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\uz1@ucnher\" -ad -an -ai#7zMap939:100:7zEvent236861⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3612
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1912
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\uz1@ucnher\muI@uncher\" -ad -an -ai#7zMap22970:122:7zEvent48531⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4700
-
C:\Users\Admin\AppData\Local\Temp\uz1@ucnher\muI@uncher\[email protected]"C:\Users\Admin\AppData\Local\Temp\uz1@ucnher\muI@uncher\[email protected]"1⤵
- Executes dropped EXE
PID:2468
-
C:\Users\Admin\AppData\Local\Temp\uz1@ucnher\muI@uncher\[email protected]"C:\Users\Admin\AppData\Local\Temp\uz1@ucnher\muI@uncher\[email protected]"1⤵
- Executes dropped EXE
PID:3124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\uz1@ucnher\[email protected]
Filesize6.8MB
MD5c449b61445724c28eb0a8a6ac9cc2f11
SHA1a065e301fef3ecb3d433552bb9b5578538211b6c
SHA2565c19719a0101063b40d14d9d428671b3394d15670e81901eafac7f1f672d557c
SHA5123799df050c5d462bc5feeb26e58e898042478c70bc7043be9567b15b70769dbc347ee2c7f14c2bb3c3a1a106a2f6288088b90d675e815829e45a8eefe5bf3004