Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
38s -
max time network
38s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
30/11/2024, 08:16
Behavioral task
behavioral1
Sample
test.exe
Resource
win10ltsc2021-20241023-en
9 signatures
150 seconds
General
-
Target
test.exe
-
Size
202KB
-
MD5
73f5733f76ac052b15335c1cd985f73f
-
SHA1
8c4be16301b9da6caa774f800104adf5731b55a4
-
SHA256
9cf5e2e0f424e7d3b206b17c262a538b29776c34b3fe11fa38222ce8cf7eaff3
-
SHA512
7acda28d83caf6f27535c0e5e465b6219ba178ad673b0e4af517894c537dd50b7f16d3e83b3ddb7c8c268835eb9fd962902b38e51083a35d0c778aa1600349f5
-
SSDEEP
6144:wLV6Bta6dtJmakIM5b4w9QT09e8iCp1Tz5klo:wLV6Btpmk+IIc8iCp1P5klo
Malware Config
Signatures
-
Nanocore family
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WAN Service = "C:\\Program Files (x86)\\WAN Service\\wansv.exe" test.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA test.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\WAN Service\wansv.exe test.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language test.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 324 test.exe 324 test.exe 324 test.exe 324 test.exe 324 test.exe 324 test.exe 324 test.exe 324 test.exe 324 test.exe 324 test.exe 324 test.exe 324 test.exe 324 test.exe 324 test.exe 324 test.exe 324 test.exe 324 test.exe 324 test.exe 324 test.exe 324 test.exe 324 test.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 324 test.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 324 test.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\test.exe"C:\Users\Admin\AppData\Local\Temp\test.exe"1⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:324
-
C:\Windows\system32\notepad.exe"C:\Windows\system32\notepad.exe"1⤵PID:3704