Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
68s -
max time network
66s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/01/2025, 17:10
Behavioral task
behavioral1
Sample
Server.exe
Resource
win10v2004-20241007-en
General
-
Target
Server.exe
-
Size
37KB
-
MD5
5f27d04777ef058867bf548cbdc25f32
-
SHA1
fbf43c25edeafe07292f1ba244066b72c60e3b51
-
SHA256
eb0f65747e9a432c1745022786275520af262050f6111f9a79db1dcc42a24402
-
SHA512
db970c79d8f1faee1cdfcb333bd3de4d136cb787f1eb7423a30f5c222d1e64a83bd17f7aea8d56c8f05d6d5ba7f902b865984a882332b77d5a199c2b69fa8615
-
SSDEEP
384:xLKCT0i9XdTe/kCOyU7H4fVADXCwRrAF+rMRTyN/0L+EcoinblneHQM3epzXxNrm:N/d1CFU7H4SjCArM+rMRa8NuHct
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 2816 netsh.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Suspicious behavior: EnumeratesProcesses 63 IoCs
pid Process 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe 4488 Server.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 4488 Server.exe Token: 33 4488 Server.exe Token: SeIncBasePriorityPrivilege 4488 Server.exe Token: 33 4488 Server.exe Token: SeIncBasePriorityPrivilege 4488 Server.exe Token: 33 4488 Server.exe Token: SeIncBasePriorityPrivilege 4488 Server.exe Token: 33 4488 Server.exe Token: SeIncBasePriorityPrivilege 4488 Server.exe Token: 33 4488 Server.exe Token: SeIncBasePriorityPrivilege 4488 Server.exe Token: 33 4488 Server.exe Token: SeIncBasePriorityPrivilege 4488 Server.exe Token: 33 4488 Server.exe Token: SeIncBasePriorityPrivilege 4488 Server.exe Token: 33 4488 Server.exe Token: SeIncBasePriorityPrivilege 4488 Server.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4488 wrote to memory of 2816 4488 Server.exe 85 PID 4488 wrote to memory of 2816 4488 Server.exe 85 PID 4488 wrote to memory of 2816 4488 Server.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Server.exe" "Server.exe" ENABLE2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2816
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3544