Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

08/09/2024, 11:54

240908-n2yc3sxarb 8

08/09/2024, 11:49

240908-nze4qavalp 1

08/09/2024, 11:49

240908-ny5yravakl 1

08/09/2024, 11:48

240908-nysneswhme 1

08/09/2024, 11:43

240908-nvnkastglm 8

Analysis

  • max time kernel
    249s
  • max time network
    208s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    08/09/2024, 11:43

General

  • Target

    F_Key_Sender.exe

  • Size

    234KB

  • MD5

    5d168d9c5151ac785599cdae87544cac

  • SHA1

    a8348defb42f5e9ee127d48fc74e7f362ae2edd4

  • SHA256

    200ddcab89956d3d97e74c45765e109e6ee0a18622cdcfbd21844c1676bdc562

  • SHA512

    d27ca55733be3eeaf4d92112bf4051d69922ed26fd04efdb291084045c14ea881e741300b9317f568ad34392d47daca908f32d8c5398a0a5f6ed8cbc3fa3ed9a

  • SSDEEP

    6144:yTPeKCgLOWPAPqF8GLFKCgLOWPAPPFkGh+:yTlCguP28G4CguPNkG0

Score
8/10

Malware Config

Signatures

  • Possible privilege escalation attempt 2 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Kills process with taskkill 3 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious behavior: LoadsDriver 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\F_Key_Sender.exe
    "C:\Users\Admin\AppData\Local\Temp\F_Key_Sender.exe"
    1⤵
      PID:2588
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc
      1⤵
        PID:1052
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService
        1⤵
          PID:3824
        • C:\Windows\system32\cmd.exe
          "C:\Windows\system32\cmd.exe"
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:4200
          • C:\Windows\System32\takeown.exe
            takeown /f dwm.exe
            2⤵
            • Possible privilege escalation attempt
            • Modifies file permissions
            • Suspicious use of AdjustPrivilegeToken
            PID:4540
          • C:\Windows\System32\icacls.exe
            icacls dwm.exe /grant everyone:(f)
            2⤵
            • Possible privilege escalation attempt
            • Modifies file permissions
            PID:4988
          • C:\Windows\System32\taskkill.exe
            taskkill dwm.exe /f
            2⤵
            • Kills process with taskkill
            PID:3004
          • C:\Windows\System32\taskkill.exe
            taskkill /?
            2⤵
            • Kills process with taskkill
            PID:1780
          • C:\Windows\System32\taskkill.exe
            taskkill /f /im dwm.exe /t
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:408
        • C:\Windows\system32\LogonUI.exe
          "LogonUI.exe" /flags:0x0 /state0:0xa3a29855 /state1:0x41c64e6d
          1⤵
          • Modifies data under HKEY_USERS
          • Suspicious use of SetWindowsHookEx
          PID:1376
        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
          1⤵
            PID:1776

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2588-0-0x00007FF8A6D53000-0x00007FF8A6D55000-memory.dmp

            Filesize

            8KB

          • memory/2588-1-0x0000027A20250000-0x0000027A2028C000-memory.dmp

            Filesize

            240KB

          • memory/2588-2-0x00007FF8A6D50000-0x00007FF8A7812000-memory.dmp

            Filesize

            10.8MB

          • memory/2588-3-0x00007FF8A6D50000-0x00007FF8A7812000-memory.dmp

            Filesize

            10.8MB

          • memory/2588-4-0x00007FF8A6D50000-0x00007FF8A7812000-memory.dmp

            Filesize

            10.8MB

          • memory/2588-5-0x00007FF8A6D53000-0x00007FF8A6D55000-memory.dmp

            Filesize

            8KB

          • memory/2588-6-0x00007FF8A6D50000-0x00007FF8A7812000-memory.dmp

            Filesize

            10.8MB

          • memory/2588-7-0x00007FF8A6D50000-0x00007FF8A7812000-memory.dmp

            Filesize

            10.8MB

          • memory/2588-9-0x00007FF8A6D50000-0x00007FF8A7812000-memory.dmp

            Filesize

            10.8MB