Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
08/09/2024, 11:54
240908-n2yc3sxarb 808/09/2024, 11:49
240908-nze4qavalp 108/09/2024, 11:49
240908-ny5yravakl 108/09/2024, 11:48
240908-nysneswhme 108/09/2024, 11:43
240908-nvnkastglm 8Analysis
-
max time kernel
161s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 11:54
Static task
static1
General
-
Target
F_Key_Sender.exe
-
Size
234KB
-
MD5
5d168d9c5151ac785599cdae87544cac
-
SHA1
a8348defb42f5e9ee127d48fc74e7f362ae2edd4
-
SHA256
200ddcab89956d3d97e74c45765e109e6ee0a18622cdcfbd21844c1676bdc562
-
SHA512
d27ca55733be3eeaf4d92112bf4051d69922ed26fd04efdb291084045c14ea881e741300b9317f568ad34392d47daca908f32d8c5398a0a5f6ed8cbc3fa3ed9a
-
SSDEEP
6144:yTPeKCgLOWPAPqF8GLFKCgLOWPAPPFkGh+:yTlCguP28G4CguPNkG0
Malware Config
Signatures
-
Possible privilege escalation attempt 2 IoCs
pid Process 2848 takeown.exe 2768 icacls.exe -
Modifies file permissions 1 TTPs 2 IoCs
pid Process 2848 takeown.exe 2768 icacls.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2544 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2544 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2940 F_Key_Sender.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2848 2868 cmd.exe 33 PID 2868 wrote to memory of 2848 2868 cmd.exe 33 PID 2868 wrote to memory of 2848 2868 cmd.exe 33 PID 2868 wrote to memory of 2768 2868 cmd.exe 34 PID 2868 wrote to memory of 2768 2868 cmd.exe 34 PID 2868 wrote to memory of 2768 2868 cmd.exe 34 PID 2868 wrote to memory of 2544 2868 cmd.exe 36 PID 2868 wrote to memory of 2544 2868 cmd.exe 36 PID 2868 wrote to memory of 2544 2868 cmd.exe 36 PID 2544 wrote to memory of 560 2544 powershell.exe 37 PID 2544 wrote to memory of 560 2544 powershell.exe 37 PID 2544 wrote to memory of 560 2544 powershell.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\F_Key_Sender.exe"C:\Users\Admin\AppData\Local\Temp\F_Key_Sender.exe"1⤵
- Suspicious use of FindShellTrayWindow
PID:2940
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\system32\takeown.exetakeown /f Desktop2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2848
-
-
C:\Windows\system32\icacls.exeicacls Desktop /grant everyone:(f)2⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:2768
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell wininit2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\system32\wininit.exe"C:\Windows\system32\wininit.exe"3⤵PID:560
-
-