Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
84s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 16:27
Static task
static1
Behavioral task
behavioral1
Sample
79598a04f1fba4a475535f5693123d3ad884dda098deb64002e3158b3090331c.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
79598a04f1fba4a475535f5693123d3ad884dda098deb64002e3158b3090331c.exe
Resource
win10v2004-20240802-en
General
-
Target
79598a04f1fba4a475535f5693123d3ad884dda098deb64002e3158b3090331c.exe
-
Size
2.4MB
-
MD5
e50ca1b8e0703ed90cef988084d8b0f5
-
SHA1
9e645af30750e97d24867b0cda97dc9440fe232f
-
SHA256
79598a04f1fba4a475535f5693123d3ad884dda098deb64002e3158b3090331c
-
SHA512
c91fee1475024ebb9638f99fade160cc2841a6d1f9586e0f4609040f22955920481671cc0a939b6089325dedd47929328a98074db29ff504b39241ed89cfe608
-
SSDEEP
49152:JoNgRf9tTkvqHWzKVcBd6o6nt2rK09G4lyo0ZacSiLUswRI/CIJr:J+Qf7cqA0bt2rK09cohiLUbQJJr
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 79598a04f1fba4a475535f5693123d3ad884dda098deb64002e3158b3090331c.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2116 79598a04f1fba4a475535f5693123d3ad884dda098deb64002e3158b3090331c.exe 2116 79598a04f1fba4a475535f5693123d3ad884dda098deb64002e3158b3090331c.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 79598a04f1fba4a475535f5693123d3ad884dda098deb64002e3158b3090331c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2116 79598a04f1fba4a475535f5693123d3ad884dda098deb64002e3158b3090331c.exe Token: SeIncreaseQuotaPrivilege 7280 WMIC.exe Token: SeSecurityPrivilege 7280 WMIC.exe Token: SeTakeOwnershipPrivilege 7280 WMIC.exe Token: SeLoadDriverPrivilege 7280 WMIC.exe Token: SeSystemProfilePrivilege 7280 WMIC.exe Token: SeSystemtimePrivilege 7280 WMIC.exe Token: SeProfSingleProcessPrivilege 7280 WMIC.exe Token: SeIncBasePriorityPrivilege 7280 WMIC.exe Token: SeCreatePagefilePrivilege 7280 WMIC.exe Token: SeBackupPrivilege 7280 WMIC.exe Token: SeRestorePrivilege 7280 WMIC.exe Token: SeShutdownPrivilege 7280 WMIC.exe Token: SeDebugPrivilege 7280 WMIC.exe Token: SeSystemEnvironmentPrivilege 7280 WMIC.exe Token: SeRemoteShutdownPrivilege 7280 WMIC.exe Token: SeUndockPrivilege 7280 WMIC.exe Token: SeManageVolumePrivilege 7280 WMIC.exe Token: 33 7280 WMIC.exe Token: 34 7280 WMIC.exe Token: 35 7280 WMIC.exe Token: SeIncreaseQuotaPrivilege 7280 WMIC.exe Token: SeSecurityPrivilege 7280 WMIC.exe Token: SeTakeOwnershipPrivilege 7280 WMIC.exe Token: SeLoadDriverPrivilege 7280 WMIC.exe Token: SeSystemProfilePrivilege 7280 WMIC.exe Token: SeSystemtimePrivilege 7280 WMIC.exe Token: SeProfSingleProcessPrivilege 7280 WMIC.exe Token: SeIncBasePriorityPrivilege 7280 WMIC.exe Token: SeCreatePagefilePrivilege 7280 WMIC.exe Token: SeBackupPrivilege 7280 WMIC.exe Token: SeRestorePrivilege 7280 WMIC.exe Token: SeShutdownPrivilege 7280 WMIC.exe Token: SeDebugPrivilege 7280 WMIC.exe Token: SeSystemEnvironmentPrivilege 7280 WMIC.exe Token: SeRemoteShutdownPrivilege 7280 WMIC.exe Token: SeUndockPrivilege 7280 WMIC.exe Token: SeManageVolumePrivilege 7280 WMIC.exe Token: 33 7280 WMIC.exe Token: 34 7280 WMIC.exe Token: 35 7280 WMIC.exe Token: SeIncreaseQuotaPrivilege 7388 WMIC.exe Token: SeSecurityPrivilege 7388 WMIC.exe Token: SeTakeOwnershipPrivilege 7388 WMIC.exe Token: SeLoadDriverPrivilege 7388 WMIC.exe Token: SeSystemProfilePrivilege 7388 WMIC.exe Token: SeSystemtimePrivilege 7388 WMIC.exe Token: SeProfSingleProcessPrivilege 7388 WMIC.exe Token: SeIncBasePriorityPrivilege 7388 WMIC.exe Token: SeCreatePagefilePrivilege 7388 WMIC.exe Token: SeBackupPrivilege 7388 WMIC.exe Token: SeRestorePrivilege 7388 WMIC.exe Token: SeShutdownPrivilege 7388 WMIC.exe Token: SeDebugPrivilege 7388 WMIC.exe Token: SeSystemEnvironmentPrivilege 7388 WMIC.exe Token: SeRemoteShutdownPrivilege 7388 WMIC.exe Token: SeUndockPrivilege 7388 WMIC.exe Token: SeManageVolumePrivilege 7388 WMIC.exe Token: 33 7388 WMIC.exe Token: 34 7388 WMIC.exe Token: 35 7388 WMIC.exe Token: SeIncreaseQuotaPrivilege 7388 WMIC.exe Token: SeSecurityPrivilege 7388 WMIC.exe Token: SeTakeOwnershipPrivilege 7388 WMIC.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2116 79598a04f1fba4a475535f5693123d3ad884dda098deb64002e3158b3090331c.exe 2116 79598a04f1fba4a475535f5693123d3ad884dda098deb64002e3158b3090331c.exe 2116 79598a04f1fba4a475535f5693123d3ad884dda098deb64002e3158b3090331c.exe 2116 79598a04f1fba4a475535f5693123d3ad884dda098deb64002e3158b3090331c.exe 2116 79598a04f1fba4a475535f5693123d3ad884dda098deb64002e3158b3090331c.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2116 wrote to memory of 7252 2116 79598a04f1fba4a475535f5693123d3ad884dda098deb64002e3158b3090331c.exe 29 PID 2116 wrote to memory of 7252 2116 79598a04f1fba4a475535f5693123d3ad884dda098deb64002e3158b3090331c.exe 29 PID 2116 wrote to memory of 7252 2116 79598a04f1fba4a475535f5693123d3ad884dda098deb64002e3158b3090331c.exe 29 PID 2116 wrote to memory of 7252 2116 79598a04f1fba4a475535f5693123d3ad884dda098deb64002e3158b3090331c.exe 29 PID 7252 wrote to memory of 7280 7252 cmd.exe 31 PID 7252 wrote to memory of 7280 7252 cmd.exe 31 PID 7252 wrote to memory of 7280 7252 cmd.exe 31 PID 7252 wrote to memory of 7280 7252 cmd.exe 31 PID 2116 wrote to memory of 7360 2116 79598a04f1fba4a475535f5693123d3ad884dda098deb64002e3158b3090331c.exe 33 PID 2116 wrote to memory of 7360 2116 79598a04f1fba4a475535f5693123d3ad884dda098deb64002e3158b3090331c.exe 33 PID 2116 wrote to memory of 7360 2116 79598a04f1fba4a475535f5693123d3ad884dda098deb64002e3158b3090331c.exe 33 PID 2116 wrote to memory of 7360 2116 79598a04f1fba4a475535f5693123d3ad884dda098deb64002e3158b3090331c.exe 33 PID 7360 wrote to memory of 7388 7360 cmd.exe 35 PID 7360 wrote to memory of 7388 7360 cmd.exe 35 PID 7360 wrote to memory of 7388 7360 cmd.exe 35 PID 7360 wrote to memory of 7388 7360 cmd.exe 35 PID 2116 wrote to memory of 7464 2116 79598a04f1fba4a475535f5693123d3ad884dda098deb64002e3158b3090331c.exe 36 PID 2116 wrote to memory of 7464 2116 79598a04f1fba4a475535f5693123d3ad884dda098deb64002e3158b3090331c.exe 36 PID 2116 wrote to memory of 7464 2116 79598a04f1fba4a475535f5693123d3ad884dda098deb64002e3158b3090331c.exe 36 PID 2116 wrote to memory of 7464 2116 79598a04f1fba4a475535f5693123d3ad884dda098deb64002e3158b3090331c.exe 36 PID 7464 wrote to memory of 7488 7464 cmd.exe 38 PID 7464 wrote to memory of 7488 7464 cmd.exe 38 PID 7464 wrote to memory of 7488 7464 cmd.exe 38 PID 7464 wrote to memory of 7488 7464 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\79598a04f1fba4a475535f5693123d3ad884dda098deb64002e3158b3090331c.exe"C:\Users\Admin\AppData\Local\Temp\79598a04f1fba4a475535f5693123d3ad884dda098deb64002e3158b3090331c.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\cmd.execmd.exe /c wmic cpu get name/value2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:7252 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic cpu get name/value3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:7280
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c wmic Path Win32_DisplayConfiguration get DeviceName/value2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:7360 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic Path Win32_DisplayConfiguration get DeviceName/value3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:7388
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c wmic COMPUTERSYSTEM get TotalPhysicalMemory/value2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:7464 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic COMPUTERSYSTEM get TotalPhysicalMemory/value3⤵
- System Location Discovery: System Language Discovery
PID:7488
-
-