Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/01/2025, 12:01
Behavioral task
behavioral1
Sample
c6f41fa82336ac2a3a904bbfd9138254.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c6f41fa82336ac2a3a904bbfd9138254.exe
Resource
win10v2004-20241007-en
General
-
Target
c6f41fa82336ac2a3a904bbfd9138254.exe
-
Size
37KB
-
MD5
c6f41fa82336ac2a3a904bbfd9138254
-
SHA1
108fb702d48f775011f790b3e807545363383148
-
SHA256
b35d1246aae057aceb6fa73dffaa59f7624ae670e4e6bb5dae934a2e69d67dbb
-
SHA512
2dd5f6510e1e633555802be2f3b4028de4d305b093a23f6fa8378e2ccce8bb0c7d84947695479ba63cb3ec59afd39a56553726ff24973a444126e14e9774e6c4
-
SSDEEP
384:l6/gUiDrblmJEpRGyEfdDPTuWCYqAlLrAF+rMRTyN/0L+EcoinblneHQM3epzXfu:U/yHpR9EfdDCWClAprM+rMRa8Nuzwt
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1776 netsh.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c6f41fa82336ac2a3a904bbfd9138254.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 4564 c6f41fa82336ac2a3a904bbfd9138254.exe Token: 33 4564 c6f41fa82336ac2a3a904bbfd9138254.exe Token: SeIncBasePriorityPrivilege 4564 c6f41fa82336ac2a3a904bbfd9138254.exe Token: 33 4564 c6f41fa82336ac2a3a904bbfd9138254.exe Token: SeIncBasePriorityPrivilege 4564 c6f41fa82336ac2a3a904bbfd9138254.exe Token: 33 4564 c6f41fa82336ac2a3a904bbfd9138254.exe Token: SeIncBasePriorityPrivilege 4564 c6f41fa82336ac2a3a904bbfd9138254.exe Token: 33 4564 c6f41fa82336ac2a3a904bbfd9138254.exe Token: SeIncBasePriorityPrivilege 4564 c6f41fa82336ac2a3a904bbfd9138254.exe Token: 33 4564 c6f41fa82336ac2a3a904bbfd9138254.exe Token: SeIncBasePriorityPrivilege 4564 c6f41fa82336ac2a3a904bbfd9138254.exe Token: 33 4564 c6f41fa82336ac2a3a904bbfd9138254.exe Token: SeIncBasePriorityPrivilege 4564 c6f41fa82336ac2a3a904bbfd9138254.exe Token: 33 4564 c6f41fa82336ac2a3a904bbfd9138254.exe Token: SeIncBasePriorityPrivilege 4564 c6f41fa82336ac2a3a904bbfd9138254.exe Token: 33 4564 c6f41fa82336ac2a3a904bbfd9138254.exe Token: SeIncBasePriorityPrivilege 4564 c6f41fa82336ac2a3a904bbfd9138254.exe Token: 33 4564 c6f41fa82336ac2a3a904bbfd9138254.exe Token: SeIncBasePriorityPrivilege 4564 c6f41fa82336ac2a3a904bbfd9138254.exe Token: 33 4564 c6f41fa82336ac2a3a904bbfd9138254.exe Token: SeIncBasePriorityPrivilege 4564 c6f41fa82336ac2a3a904bbfd9138254.exe Token: 33 4564 c6f41fa82336ac2a3a904bbfd9138254.exe Token: SeIncBasePriorityPrivilege 4564 c6f41fa82336ac2a3a904bbfd9138254.exe Token: 33 4564 c6f41fa82336ac2a3a904bbfd9138254.exe Token: SeIncBasePriorityPrivilege 4564 c6f41fa82336ac2a3a904bbfd9138254.exe Token: 33 4564 c6f41fa82336ac2a3a904bbfd9138254.exe Token: SeIncBasePriorityPrivilege 4564 c6f41fa82336ac2a3a904bbfd9138254.exe Token: 33 4564 c6f41fa82336ac2a3a904bbfd9138254.exe Token: SeIncBasePriorityPrivilege 4564 c6f41fa82336ac2a3a904bbfd9138254.exe Token: 33 4564 c6f41fa82336ac2a3a904bbfd9138254.exe Token: SeIncBasePriorityPrivilege 4564 c6f41fa82336ac2a3a904bbfd9138254.exe Token: 33 4564 c6f41fa82336ac2a3a904bbfd9138254.exe Token: SeIncBasePriorityPrivilege 4564 c6f41fa82336ac2a3a904bbfd9138254.exe Token: 33 4564 c6f41fa82336ac2a3a904bbfd9138254.exe Token: SeIncBasePriorityPrivilege 4564 c6f41fa82336ac2a3a904bbfd9138254.exe Token: 33 4564 c6f41fa82336ac2a3a904bbfd9138254.exe Token: SeIncBasePriorityPrivilege 4564 c6f41fa82336ac2a3a904bbfd9138254.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4564 wrote to memory of 1776 4564 c6f41fa82336ac2a3a904bbfd9138254.exe 84 PID 4564 wrote to memory of 1776 4564 c6f41fa82336ac2a3a904bbfd9138254.exe 84 PID 4564 wrote to memory of 1776 4564 c6f41fa82336ac2a3a904bbfd9138254.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6f41fa82336ac2a3a904bbfd9138254.exe"C:\Users\Admin\AppData\Local\Temp\c6f41fa82336ac2a3a904bbfd9138254.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\c6f41fa82336ac2a3a904bbfd9138254.exe" "c6f41fa82336ac2a3a904bbfd9138254.exe" ENABLE2⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1776
-