Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
21/11/2024, 02:56
241121-dfcjdaxfnb 821/11/2024, 02:55
241121-destzaxfme 121/11/2024, 02:39
241121-c5hagsxenf 321/11/2024, 02:38
241121-c42yhaxrfv 321/11/2024, 02:35
241121-c3gwyasncl 321/11/2024, 02:23
241121-cvcl9axqh1 321/11/2024, 02:17
241121-cq22caxqgz 3Analysis
-
max time kernel
96s -
max time network
106s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
21/11/2024, 02:35
Static task
static1
Behavioral task
behavioral1
Sample
639a17eed5125ced4bd08a468204732fa2d37d42d3a47465d22f3afe45b7c7a1.zip
Resource
win11-20241007-en
General
-
Target
639a17eed5125ced4bd08a468204732fa2d37d42d3a47465d22f3afe45b7c7a1.zip
-
Size
3.9MB
-
MD5
d436a7f9e06e611bff0cb685039aa1ff
-
SHA1
2396f1730ad30aa07475d8a2df1a688836513c58
-
SHA256
639a17eed5125ced4bd08a468204732fa2d37d42d3a47465d22f3afe45b7c7a1
-
SHA512
84afb7d1a0ae1997ad7b359aac7c4cbb2fb191b59734e66e27f13985beedd9afd083931380b38d854ed7f4d607f6a42dd5f9a0db8fa4936749d71bd06ba108c9
-
SSDEEP
98304:hZanHcQyaMI3AsE+RL6jefCkW376vBpkJ:n48jdE+HjOCkk+vA
Malware Config
Signatures
-
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Modifies registry class 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" BackgroundTransferHost.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings\MuiCache BackgroundTransferHost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeRestorePrivilege 2368 7zFM.exe Token: 35 2368 7zFM.exe Token: SeSecurityPrivilege 2368 7zFM.exe Token: 33 4836 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4836 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2368 7zFM.exe 2368 7zFM.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 5020 osk.exe 5020 osk.exe 5020 osk.exe 5020 osk.exe 5020 osk.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\639a17eed5125ced4bd08a468204732fa2d37d42d3a47465d22f3afe45b7c7a1.zip"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2368
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.131⤵
- Modifies registry class
PID:1096
-
C:\Windows\system32\osk.exe"C:\Windows\system32\osk.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:5020
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004E4 0x00000000000004E01⤵
- Suspicious use of AdjustPrivilegeToken
PID:4836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\869429df-e2b8-471b-8674-e524f19e7ce2.down_data
Filesize555KB
MD55683c0028832cae4ef93ca39c8ac5029
SHA1248755e4e1db552e0b6f8651b04ca6d1b31a86fb
SHA256855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e
SHA512aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3