Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
18/09/2022, 23:56
Static task
static1
Behavioral task
behavioral1
Sample
52fab3eb3fd085b579704c2b2dd28a8d03a1205f1907acc44e8fce20f4c5ee6b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
52fab3eb3fd085b579704c2b2dd28a8d03a1205f1907acc44e8fce20f4c5ee6b.exe
Resource
win10v2004-20220812-en
General
-
Target
52fab3eb3fd085b579704c2b2dd28a8d03a1205f1907acc44e8fce20f4c5ee6b.exe
-
Size
2.5MB
-
MD5
798a3db3aa75eed1f8b70f86fe10e3e1
-
SHA1
faff94405a7fcd331d0bda36eaa654ba432be44b
-
SHA256
52fab3eb3fd085b579704c2b2dd28a8d03a1205f1907acc44e8fce20f4c5ee6b
-
SHA512
6cdc5f95ac6da5d84996ab4fcd6df7832bf49ce50556b7cfc7b56a8592c35933ad6a66310f8f3961f1e6d6031e32e54602a173b0c02951d3864ea4d77449ebc3
-
SSDEEP
49152:be8NOa3bLg66e3/FhDxQ0kzQkVNBh4g9J3IrzO39McI7pZ7Icb5:b/NOa3btvXq0ksIplJ3CzOt1iplIk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1664 WINRAR~1.EXE -
Loads dropped DLL 4 IoCs
pid Process 564 52fab3eb3fd085b579704c2b2dd28a8d03a1205f1907acc44e8fce20f4c5ee6b.exe 1664 WINRAR~1.EXE 1664 WINRAR~1.EXE 1664 WINRAR~1.EXE -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 52fab3eb3fd085b579704c2b2dd28a8d03a1205f1907acc44e8fce20f4c5ee6b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 52fab3eb3fd085b579704c2b2dd28a8d03a1205f1907acc44e8fce20f4c5ee6b.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main WINRAR~1.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1664 WINRAR~1.EXE 1664 WINRAR~1.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 564 wrote to memory of 1664 564 52fab3eb3fd085b579704c2b2dd28a8d03a1205f1907acc44e8fce20f4c5ee6b.exe 27 PID 564 wrote to memory of 1664 564 52fab3eb3fd085b579704c2b2dd28a8d03a1205f1907acc44e8fce20f4c5ee6b.exe 27 PID 564 wrote to memory of 1664 564 52fab3eb3fd085b579704c2b2dd28a8d03a1205f1907acc44e8fce20f4c5ee6b.exe 27 PID 564 wrote to memory of 1664 564 52fab3eb3fd085b579704c2b2dd28a8d03a1205f1907acc44e8fce20f4c5ee6b.exe 27 PID 564 wrote to memory of 1664 564 52fab3eb3fd085b579704c2b2dd28a8d03a1205f1907acc44e8fce20f4c5ee6b.exe 27 PID 564 wrote to memory of 1664 564 52fab3eb3fd085b579704c2b2dd28a8d03a1205f1907acc44e8fce20f4c5ee6b.exe 27 PID 564 wrote to memory of 1664 564 52fab3eb3fd085b579704c2b2dd28a8d03a1205f1907acc44e8fce20f4c5ee6b.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\52fab3eb3fd085b579704c2b2dd28a8d03a1205f1907acc44e8fce20f4c5ee6b.exe"C:\Users\Admin\AppData\Local\Temp\52fab3eb3fd085b579704c2b2dd28a8d03a1205f1907acc44e8fce20f4c5ee6b.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WINRAR~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WINRAR~1.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1664
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD51108f49f7dc7339383c6d238faea515e
SHA131a8c9a779b36122322c640fe65f999f9cc627bf
SHA2566a34001aba10c51cfb1db90d89f2711a5441841def9a40f7e3ac40f263d8e432
SHA51228bde0a0881ebe5141a23beea254ddaf498a39191300bdad1e4a35a9bfffff8440e88853ffe9e1a1eafb0ca5ebc6d5e781345a9e5fe00997da7b2b036794c353
-
Filesize
2.0MB
MD51108f49f7dc7339383c6d238faea515e
SHA131a8c9a779b36122322c640fe65f999f9cc627bf
SHA2566a34001aba10c51cfb1db90d89f2711a5441841def9a40f7e3ac40f263d8e432
SHA51228bde0a0881ebe5141a23beea254ddaf498a39191300bdad1e4a35a9bfffff8440e88853ffe9e1a1eafb0ca5ebc6d5e781345a9e5fe00997da7b2b036794c353
-
Filesize
2.0MB
MD51108f49f7dc7339383c6d238faea515e
SHA131a8c9a779b36122322c640fe65f999f9cc627bf
SHA2566a34001aba10c51cfb1db90d89f2711a5441841def9a40f7e3ac40f263d8e432
SHA51228bde0a0881ebe5141a23beea254ddaf498a39191300bdad1e4a35a9bfffff8440e88853ffe9e1a1eafb0ca5ebc6d5e781345a9e5fe00997da7b2b036794c353
-
Filesize
2.0MB
MD51108f49f7dc7339383c6d238faea515e
SHA131a8c9a779b36122322c640fe65f999f9cc627bf
SHA2566a34001aba10c51cfb1db90d89f2711a5441841def9a40f7e3ac40f263d8e432
SHA51228bde0a0881ebe5141a23beea254ddaf498a39191300bdad1e4a35a9bfffff8440e88853ffe9e1a1eafb0ca5ebc6d5e781345a9e5fe00997da7b2b036794c353
-
Filesize
2.0MB
MD51108f49f7dc7339383c6d238faea515e
SHA131a8c9a779b36122322c640fe65f999f9cc627bf
SHA2566a34001aba10c51cfb1db90d89f2711a5441841def9a40f7e3ac40f263d8e432
SHA51228bde0a0881ebe5141a23beea254ddaf498a39191300bdad1e4a35a9bfffff8440e88853ffe9e1a1eafb0ca5ebc6d5e781345a9e5fe00997da7b2b036794c353
-
Filesize
2.0MB
MD51108f49f7dc7339383c6d238faea515e
SHA131a8c9a779b36122322c640fe65f999f9cc627bf
SHA2566a34001aba10c51cfb1db90d89f2711a5441841def9a40f7e3ac40f263d8e432
SHA51228bde0a0881ebe5141a23beea254ddaf498a39191300bdad1e4a35a9bfffff8440e88853ffe9e1a1eafb0ca5ebc6d5e781345a9e5fe00997da7b2b036794c353