Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 14:03
Static task
static1
Behavioral task
behavioral1
Sample
1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe
Resource
win10v2004-20240802-en
General
-
Target
1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe
-
Size
4.4MB
-
MD5
dc80f69d4858ddf6895dcac9522a1943
-
SHA1
317d13edcc00528cae9c4fcc353d8d640a5d89a3
-
SHA256
1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693
-
SHA512
21d4a8a4a962bad2aef43d3b8c3f25f16be30829139990076502e93bf4788949d47912e71be80c4ee72a6edd1ffe393efda38813650c6faf6709738a28475352
-
SSDEEP
49152:tD7tbFza8IBn2cpi7cSgWVh07Z2GBc024xF6QKRaTzBbW5ur7S3cx4B1TqBv7i:hxbMB2kZ2rUF6QKRybL7S
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\VideoGpuEditor = "C:\\Users\\Admin\\Music\\VideoGpuUpdater\\GpuVideoOculus.exe" 1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2256 tasklist.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe -
Suspicious use of AdjustPrivilegeToken 41 IoCs
description pid Process Token: SeDebugPrivilege 2256 tasklist.exe Token: SeIncreaseQuotaPrivilege 2156 WMIC.exe Token: SeSecurityPrivilege 2156 WMIC.exe Token: SeTakeOwnershipPrivilege 2156 WMIC.exe Token: SeLoadDriverPrivilege 2156 WMIC.exe Token: SeSystemProfilePrivilege 2156 WMIC.exe Token: SeSystemtimePrivilege 2156 WMIC.exe Token: SeProfSingleProcessPrivilege 2156 WMIC.exe Token: SeIncBasePriorityPrivilege 2156 WMIC.exe Token: SeCreatePagefilePrivilege 2156 WMIC.exe Token: SeBackupPrivilege 2156 WMIC.exe Token: SeRestorePrivilege 2156 WMIC.exe Token: SeShutdownPrivilege 2156 WMIC.exe Token: SeDebugPrivilege 2156 WMIC.exe Token: SeSystemEnvironmentPrivilege 2156 WMIC.exe Token: SeRemoteShutdownPrivilege 2156 WMIC.exe Token: SeUndockPrivilege 2156 WMIC.exe Token: SeManageVolumePrivilege 2156 WMIC.exe Token: 33 2156 WMIC.exe Token: 34 2156 WMIC.exe Token: 35 2156 WMIC.exe Token: SeIncreaseQuotaPrivilege 2156 WMIC.exe Token: SeSecurityPrivilege 2156 WMIC.exe Token: SeTakeOwnershipPrivilege 2156 WMIC.exe Token: SeLoadDriverPrivilege 2156 WMIC.exe Token: SeSystemProfilePrivilege 2156 WMIC.exe Token: SeSystemtimePrivilege 2156 WMIC.exe Token: SeProfSingleProcessPrivilege 2156 WMIC.exe Token: SeIncBasePriorityPrivilege 2156 WMIC.exe Token: SeCreatePagefilePrivilege 2156 WMIC.exe Token: SeBackupPrivilege 2156 WMIC.exe Token: SeRestorePrivilege 2156 WMIC.exe Token: SeShutdownPrivilege 2156 WMIC.exe Token: SeDebugPrivilege 2156 WMIC.exe Token: SeSystemEnvironmentPrivilege 2156 WMIC.exe Token: SeRemoteShutdownPrivilege 2156 WMIC.exe Token: SeUndockPrivilege 2156 WMIC.exe Token: SeManageVolumePrivilege 2156 WMIC.exe Token: 33 2156 WMIC.exe Token: 34 2156 WMIC.exe Token: 35 2156 WMIC.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1720 wrote to memory of 1740 1720 1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe 31 PID 1720 wrote to memory of 1740 1720 1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe 31 PID 1720 wrote to memory of 1740 1720 1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe 31 PID 1720 wrote to memory of 1740 1720 1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe 31 PID 1720 wrote to memory of 1740 1720 1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe 31 PID 1720 wrote to memory of 1740 1720 1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe 31 PID 1740 wrote to memory of 2840 1740 1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe 32 PID 1740 wrote to memory of 2840 1740 1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe 32 PID 1740 wrote to memory of 2840 1740 1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe 32 PID 1740 wrote to memory of 2840 1740 1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe 32 PID 2840 wrote to memory of 2256 2840 cmd.exe 34 PID 2840 wrote to memory of 2256 2840 cmd.exe 34 PID 2840 wrote to memory of 2256 2840 cmd.exe 34 PID 2840 wrote to memory of 2256 2840 cmd.exe 34 PID 1740 wrote to memory of 2760 1740 1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe 36 PID 1740 wrote to memory of 2760 1740 1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe 36 PID 1740 wrote to memory of 2760 1740 1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe 36 PID 1740 wrote to memory of 2760 1740 1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe 36 PID 2760 wrote to memory of 2156 2760 cmd.exe 38 PID 2760 wrote to memory of 2156 2760 cmd.exe 38 PID 2760 wrote to memory of 2156 2760 cmd.exe 38 PID 2760 wrote to memory of 2156 2760 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe"C:\Users\Admin\AppData\Local\Temp\1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe"C:\Users\Admin\AppData\Local\Temp\1e716acec0f8c78445db489b74b7c3ff027181e332377773f11530a7669f9693.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\cmd.execmd.exe /c tasklist3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c wmic diskdrive get model3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic diskdrive get model4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
-
-