Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 15:59
Behavioral task
behavioral1
Sample
HSgsFS8.scr
Resource
win7-20240704-en
5 signatures
150 seconds
General
-
Target
HSgsFS8.scr
-
Size
154KB
-
MD5
99e18204e672c7a0935c212ed5acc0c9
-
SHA1
5672c6f3a599d93fb0ac3b52e71c25c2fb8ad78c
-
SHA256
02695ef8781669fda33c683da4e1bb4c8081c6c4b11c3d1d381becc97b15ab59
-
SHA512
e44b8f183d299d8bac1f856782bc360f016677cf7510e099569715288c4c2cb7313b19233056981f4252bf99b8a20c4d184e6e922f340437fb34c1bf55b3f66e
-
SSDEEP
3072:gLsIxECLfTmcBWY1Q1Kj3YgRIHwiiI4T6dvf72mQAK0DuCEG8tSUT:ggK9x1EKLgdipTyvfXKFG8
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2736-0-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2736-2-0x0000000000400000-0x0000000000469000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HSgsFS8.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Kills process with taskkill 3 IoCs
pid Process 2616 taskkill.exe 2868 taskkill.exe 2624 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2868 taskkill.exe Token: SeDebugPrivilege 2616 taskkill.exe Token: SeDebugPrivilege 2624 taskkill.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2736 wrote to memory of 2796 2736 HSgsFS8.scr 30 PID 2736 wrote to memory of 2796 2736 HSgsFS8.scr 30 PID 2736 wrote to memory of 2796 2736 HSgsFS8.scr 30 PID 2736 wrote to memory of 2796 2736 HSgsFS8.scr 30 PID 2736 wrote to memory of 2800 2736 HSgsFS8.scr 31 PID 2736 wrote to memory of 2800 2736 HSgsFS8.scr 31 PID 2736 wrote to memory of 2800 2736 HSgsFS8.scr 31 PID 2736 wrote to memory of 2800 2736 HSgsFS8.scr 31 PID 2736 wrote to memory of 3044 2736 HSgsFS8.scr 33 PID 2736 wrote to memory of 3044 2736 HSgsFS8.scr 33 PID 2736 wrote to memory of 3044 2736 HSgsFS8.scr 33 PID 2736 wrote to memory of 3044 2736 HSgsFS8.scr 33 PID 2800 wrote to memory of 2624 2800 cmd.exe 36 PID 2800 wrote to memory of 2624 2800 cmd.exe 36 PID 2800 wrote to memory of 2624 2800 cmd.exe 36 PID 2800 wrote to memory of 2624 2800 cmd.exe 36 PID 3044 wrote to memory of 2868 3044 cmd.exe 37 PID 3044 wrote to memory of 2868 3044 cmd.exe 37 PID 3044 wrote to memory of 2868 3044 cmd.exe 37 PID 3044 wrote to memory of 2868 3044 cmd.exe 37 PID 2796 wrote to memory of 2616 2796 cmd.exe 38 PID 2796 wrote to memory of 2616 2796 cmd.exe 38 PID 2796 wrote to memory of 2616 2796 cmd.exe 38 PID 2796 wrote to memory of 2616 2796 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\HSgsFS8.scr"C:\Users\Admin\AppData\Local\Temp\HSgsFS8.scr" /S1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\cmd.execmd /ktaskkill/IM iexplore.exe /F2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\taskkill.exetaskkill /IM iexplore.exe /F3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
-
C:\Windows\SysWOW64\cmd.execmd /ktaskkill/IM iexplore.exe /F2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\taskkill.exetaskkill /IM iexplore.exe /F3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2624
-
-
-
C:\Windows\SysWOW64\cmd.execmd /ktaskkill/IM firefox.exe /F2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\taskkill.exetaskkill /IM firefox.exe /F3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2868
-
-