Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 19:12
Static task
static1
Behavioral task
behavioral1
Sample
563a35fcff50eeafb0754eca254a9050N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
563a35fcff50eeafb0754eca254a9050N.exe
Resource
win10v2004-20240802-en
General
-
Target
563a35fcff50eeafb0754eca254a9050N.exe
-
Size
348KB
-
MD5
563a35fcff50eeafb0754eca254a9050
-
SHA1
5f08aa965edce4215884cca8f9ae1a95dbcddd0b
-
SHA256
e0b0b1e77150b120f147fe696162507cfe4fb9f4e13734d66cef457a1a2724bd
-
SHA512
49b240b7de9936f0eae3e9250fc06609969039ad7e736b6a78f3f3ab55b65f78b1b2117f39c3b3cd99c46b5a67c572a5fd8ac4aa7a1d4c13d2406034acfebb78
-
SSDEEP
6144:EbpFMByWEhy9vBpHLnU+r/f79MzNtukvSodidiHlFE:E9y2hqbLnZr/5MJt5qZi/E
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\IntelPowerAgent5 = "rundll32.exe shell32.dll, ShellExec_RunDLL C:\\PROGRA~3\\DBBBB8~1.EXE" icardagt.exe -
Checks for any installed AV software in registry 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Software\Wow6432Node\Eset\Nod icardagt.exe Key opened \REGISTRY\MACHINE\Software\Wow6432Node\Avira icardagt.exe Key opened \REGISTRY\MACHINE\Software\Wow6432Node\AVAST Software\Avast icardagt.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1960 set thread context of 2428 1960 563a35fcff50eeafb0754eca254a9050N.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 563a35fcff50eeafb0754eca254a9050N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icardagt.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1960 563a35fcff50eeafb0754eca254a9050N.exe 1960 563a35fcff50eeafb0754eca254a9050N.exe 1960 563a35fcff50eeafb0754eca254a9050N.exe 1960 563a35fcff50eeafb0754eca254a9050N.exe 1960 563a35fcff50eeafb0754eca254a9050N.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe 2428 icardagt.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1960 563a35fcff50eeafb0754eca254a9050N.exe Token: SeBackupPrivilege 2512 vssvc.exe Token: SeRestorePrivilege 2512 vssvc.exe Token: SeAuditPrivilege 2512 vssvc.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2428 1960 563a35fcff50eeafb0754eca254a9050N.exe 31 PID 1960 wrote to memory of 2428 1960 563a35fcff50eeafb0754eca254a9050N.exe 31 PID 1960 wrote to memory of 2428 1960 563a35fcff50eeafb0754eca254a9050N.exe 31 PID 1960 wrote to memory of 2428 1960 563a35fcff50eeafb0754eca254a9050N.exe 31 PID 1960 wrote to memory of 2428 1960 563a35fcff50eeafb0754eca254a9050N.exe 31 PID 1960 wrote to memory of 2428 1960 563a35fcff50eeafb0754eca254a9050N.exe 31 PID 1960 wrote to memory of 2428 1960 563a35fcff50eeafb0754eca254a9050N.exe 31 PID 1960 wrote to memory of 2428 1960 563a35fcff50eeafb0754eca254a9050N.exe 31 PID 1960 wrote to memory of 2428 1960 563a35fcff50eeafb0754eca254a9050N.exe 31 PID 1960 wrote to memory of 2428 1960 563a35fcff50eeafb0754eca254a9050N.exe 31 PID 1960 wrote to memory of 2428 1960 563a35fcff50eeafb0754eca254a9050N.exe 31 PID 1960 wrote to memory of 2428 1960 563a35fcff50eeafb0754eca254a9050N.exe 31 PID 1960 wrote to memory of 2412 1960 563a35fcff50eeafb0754eca254a9050N.exe 32 PID 1960 wrote to memory of 2412 1960 563a35fcff50eeafb0754eca254a9050N.exe 32 PID 1960 wrote to memory of 2412 1960 563a35fcff50eeafb0754eca254a9050N.exe 32 PID 1960 wrote to memory of 2412 1960 563a35fcff50eeafb0754eca254a9050N.exe 32 PID 2412 wrote to memory of 2904 2412 cmd.exe 34 PID 2412 wrote to memory of 2904 2412 cmd.exe 34 PID 2412 wrote to memory of 2904 2412 cmd.exe 34 PID 2412 wrote to memory of 2904 2412 cmd.exe 34 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2904 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\563a35fcff50eeafb0754eca254a9050N.exe"C:\Users\Admin\AppData\Local\Temp\563a35fcff50eeafb0754eca254a9050N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\syswow64\icardagt.exe"icardagt.exe"2⤵
- Adds Run key to start application
- Checks for any installed AV software in registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2428
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\txlC104.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\563a35fcff50eeafb0754eca254a9050N.exe""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "C:\Users\Admin\AppData\Local\Temp\563a35fcff50eeafb0754eca254a9050N.exe"3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2904
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2512
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
348KB
MD57042fa285367255284d6c9c87815de8e
SHA1bbd6847268a48252cb8ebdafb0edfb13ce56afb3
SHA256aed1b5fba3421280a26e522c30f04e572cd861351839087154f19946a62affd8
SHA512327908da286723ea4b89c918ee8465d40cc305d76d7aa8c80fa61c6b62f186633bcfaf79ac9500cced07e0afef225aa4846aa7f82663f101ad345c74a06b19a3
-
Filesize
29B
MD5d85ffb84ea73a585a289dd97216fadb8
SHA196b6335ab32e91598ec19a5d4b52f59c07d557fe
SHA2563fa356e5f6e8b2c402592cb8f292748ee743c4ac6c32552785ef1a9e4ddf8850
SHA512d5502794ca2385e23d7837fbe7d1dd6efaccfced36f32aaf75e653be36e9d695fc39b85929ebababc6161b39a184f45e3784c9f3841bced68ebf16b8b38c6aa9
-
Filesize
55B
MD5bba5d9b808c350f7a54b29217c9eaad7
SHA15ff47a407aa7281685752a03b60ca5b6339292a9
SHA25651d242309c37c29238be1e3a9c7cd28ef9c6def0a75355a42b5202a5c71a46ed
SHA512c0d16141481c409070129a2c97cd79574d8dae9da4de0989e76040150d127b3123612649c6fb5d38603fb450094d9c59df3bd2410075c4e15c3fbf7fe60b00c2