Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
112s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
14/01/2025, 23:27
Behavioral task
behavioral1
Sample
Server.exe
Resource
win10ltsc2021-20250113-en
General
-
Target
Server.exe
-
Size
93KB
-
MD5
2c6c97a98e4d453076c54315d90d341b
-
SHA1
7dcf69380c76921a17785c45632cff615a309e2b
-
SHA256
cb9b090441ac40dc171302815bb209809656d47238f8a7ba29e97807d385700f
-
SHA512
13b2360b78c8bb367b6d8ab98534d02615ba93bee3e39576dc51514b631f5518e9e8456acaa453ce8030902883ccfb60949d267da4de498d3b2132dc705c905c
-
SSDEEP
768:MY3TVnD7O/pBcxYsbae6GIXb9pDX2t98PL0OXLeuXxrjEtCdnl2pi1Rz4Rk3TsGx:fVvOx6baIa9RZj00ljEwzGi1dDfDVgS
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall 2 TTPs 3 IoCs
pid Process 4732 netsh.exe 2792 netsh.exe 3008 netsh.exe -
Drops autorun.inf file 1 TTPs 4 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\autorun.inf Server.exe File opened for modification C:\autorun.inf Server.exe File created F:\autorun.inf Server.exe File opened for modification F:\autorun.inf Server.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe 4792 Server.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4792 Server.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 4792 Server.exe Token: 33 4792 Server.exe Token: SeIncBasePriorityPrivilege 4792 Server.exe Token: 33 4792 Server.exe Token: SeIncBasePriorityPrivilege 4792 Server.exe Token: 33 4792 Server.exe Token: SeIncBasePriorityPrivilege 4792 Server.exe Token: 33 4792 Server.exe Token: SeIncBasePriorityPrivilege 4792 Server.exe Token: 33 4792 Server.exe Token: SeIncBasePriorityPrivilege 4792 Server.exe Token: 33 4792 Server.exe Token: SeIncBasePriorityPrivilege 4792 Server.exe Token: 33 4792 Server.exe Token: SeIncBasePriorityPrivilege 4792 Server.exe Token: 33 4792 Server.exe Token: SeIncBasePriorityPrivilege 4792 Server.exe Token: 33 4792 Server.exe Token: SeIncBasePriorityPrivilege 4792 Server.exe Token: 33 4792 Server.exe Token: SeIncBasePriorityPrivilege 4792 Server.exe Token: 33 4792 Server.exe Token: SeIncBasePriorityPrivilege 4792 Server.exe Token: 33 4792 Server.exe Token: SeIncBasePriorityPrivilege 4792 Server.exe Token: 33 4792 Server.exe Token: SeIncBasePriorityPrivilege 4792 Server.exe Token: 33 4792 Server.exe Token: SeIncBasePriorityPrivilege 4792 Server.exe Token: 33 4792 Server.exe Token: SeIncBasePriorityPrivilege 4792 Server.exe Token: 33 4792 Server.exe Token: SeIncBasePriorityPrivilege 4792 Server.exe Token: 33 4792 Server.exe Token: SeIncBasePriorityPrivilege 4792 Server.exe Token: 33 4792 Server.exe Token: SeIncBasePriorityPrivilege 4792 Server.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4792 wrote to memory of 4732 4792 Server.exe 82 PID 4792 wrote to memory of 4732 4792 Server.exe 82 PID 4792 wrote to memory of 4732 4792 Server.exe 82 PID 4792 wrote to memory of 2792 4792 Server.exe 84 PID 4792 wrote to memory of 2792 4792 Server.exe 84 PID 4792 wrote to memory of 2792 4792 Server.exe 84 PID 4792 wrote to memory of 3008 4792 Server.exe 85 PID 4792 wrote to memory of 3008 4792 Server.exe 85 PID 4792 wrote to memory of 3008 4792 Server.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"1⤵
- Drops autorun.inf file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Server.exe" "Server.exe" ENABLE2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4732
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\Server.exe"2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2792
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Server.exe" "Server.exe" ENABLE2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3008
-