Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
3s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 21:56
Static task
static1
Behavioral task
behavioral1
Sample
d3a6e3af7cfe1bd1ef67dfe5ba52af3cfa90b2908c1bbdca78156674c684bcb4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d3a6e3af7cfe1bd1ef67dfe5ba52af3cfa90b2908c1bbdca78156674c684bcb4.exe
Resource
win10v2004-20220812-en
General
-
Target
d3a6e3af7cfe1bd1ef67dfe5ba52af3cfa90b2908c1bbdca78156674c684bcb4.exe
-
Size
26KB
-
MD5
1628254a2a0e1ad9160f0f263e51d7d2
-
SHA1
123a768be7656a2673c90fe58e3a04e8836e6304
-
SHA256
d3a6e3af7cfe1bd1ef67dfe5ba52af3cfa90b2908c1bbdca78156674c684bcb4
-
SHA512
f0e87f72e10550b89f0050108da66c945fd524b757a4a5f4b7758f8468eab22426f6f5047a48342907b2867a9b599677901e095e6f674325214ebf728abedf5c
-
SSDEEP
384:DZyrOAVI7cfceEAQ1uLsH7tns5NxTwnstZ0rlDPBdrhMIQ0crqBCDS5oqGAEjpeV:DZJAGc3EdQC5nST9ihBMfryC25oIOZS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1112 NTdhcp.exe -
Deletes itself 1 IoCs
pid Process 2016 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 688 d3a6e3af7cfe1bd1ef67dfe5ba52af3cfa90b2908c1bbdca78156674c684bcb4.exe 688 d3a6e3af7cfe1bd1ef67dfe5ba52af3cfa90b2908c1bbdca78156674c684bcb4.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\NTdhcp.exe d3a6e3af7cfe1bd1ef67dfe5ba52af3cfa90b2908c1bbdca78156674c684bcb4.exe File opened for modification C:\Windows\SysWOW64\NTdhcp.exe d3a6e3af7cfe1bd1ef67dfe5ba52af3cfa90b2908c1bbdca78156674c684bcb4.exe File opened for modification C:\Windows\SysWOW64\NTdhcp.exe NTdhcp.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Deleteme.bat d3a6e3af7cfe1bd1ef67dfe5ba52af3cfa90b2908c1bbdca78156674c684bcb4.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 688 wrote to memory of 1112 688 d3a6e3af7cfe1bd1ef67dfe5ba52af3cfa90b2908c1bbdca78156674c684bcb4.exe 28 PID 688 wrote to memory of 1112 688 d3a6e3af7cfe1bd1ef67dfe5ba52af3cfa90b2908c1bbdca78156674c684bcb4.exe 28 PID 688 wrote to memory of 1112 688 d3a6e3af7cfe1bd1ef67dfe5ba52af3cfa90b2908c1bbdca78156674c684bcb4.exe 28 PID 688 wrote to memory of 1112 688 d3a6e3af7cfe1bd1ef67dfe5ba52af3cfa90b2908c1bbdca78156674c684bcb4.exe 28 PID 688 wrote to memory of 2016 688 d3a6e3af7cfe1bd1ef67dfe5ba52af3cfa90b2908c1bbdca78156674c684bcb4.exe 29 PID 688 wrote to memory of 2016 688 d3a6e3af7cfe1bd1ef67dfe5ba52af3cfa90b2908c1bbdca78156674c684bcb4.exe 29 PID 688 wrote to memory of 2016 688 d3a6e3af7cfe1bd1ef67dfe5ba52af3cfa90b2908c1bbdca78156674c684bcb4.exe 29 PID 688 wrote to memory of 2016 688 d3a6e3af7cfe1bd1ef67dfe5ba52af3cfa90b2908c1bbdca78156674c684bcb4.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3a6e3af7cfe1bd1ef67dfe5ba52af3cfa90b2908c1bbdca78156674c684bcb4.exe"C:\Users\Admin\AppData\Local\Temp\d3a6e3af7cfe1bd1ef67dfe5ba52af3cfa90b2908c1bbdca78156674c684bcb4.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\NTdhcp.exeC:\Windows\system32\NTdhcp.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1112
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\Deleteme.bat2⤵
- Deletes itself
PID:2016
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248B
MD5ab65f0325b59c2e2ceb5e8e23334b049
SHA1b13e360c7786ba00083a33f5e0c3acdffff84b43
SHA256ff02e03f62d627c463c59f376a19bb849994c674609e2f54481aef2ce61d9c1d
SHA5120fbd5a577ebb6840bd4abbf8c59728226bfd4a397752f227e4646ceed61ac80038db72af95589b07a0d5700c724b58ff736955110d807394cb0843897cef6252
-
Filesize
26KB
MD51628254a2a0e1ad9160f0f263e51d7d2
SHA1123a768be7656a2673c90fe58e3a04e8836e6304
SHA256d3a6e3af7cfe1bd1ef67dfe5ba52af3cfa90b2908c1bbdca78156674c684bcb4
SHA512f0e87f72e10550b89f0050108da66c945fd524b757a4a5f4b7758f8468eab22426f6f5047a48342907b2867a9b599677901e095e6f674325214ebf728abedf5c
-
Filesize
26KB
MD51628254a2a0e1ad9160f0f263e51d7d2
SHA1123a768be7656a2673c90fe58e3a04e8836e6304
SHA256d3a6e3af7cfe1bd1ef67dfe5ba52af3cfa90b2908c1bbdca78156674c684bcb4
SHA512f0e87f72e10550b89f0050108da66c945fd524b757a4a5f4b7758f8468eab22426f6f5047a48342907b2867a9b599677901e095e6f674325214ebf728abedf5c
-
Filesize
26KB
MD51628254a2a0e1ad9160f0f263e51d7d2
SHA1123a768be7656a2673c90fe58e3a04e8836e6304
SHA256d3a6e3af7cfe1bd1ef67dfe5ba52af3cfa90b2908c1bbdca78156674c684bcb4
SHA512f0e87f72e10550b89f0050108da66c945fd524b757a4a5f4b7758f8468eab22426f6f5047a48342907b2867a9b599677901e095e6f674325214ebf728abedf5c
-
Filesize
26KB
MD51628254a2a0e1ad9160f0f263e51d7d2
SHA1123a768be7656a2673c90fe58e3a04e8836e6304
SHA256d3a6e3af7cfe1bd1ef67dfe5ba52af3cfa90b2908c1bbdca78156674c684bcb4
SHA512f0e87f72e10550b89f0050108da66c945fd524b757a4a5f4b7758f8468eab22426f6f5047a48342907b2867a9b599677901e095e6f674325214ebf728abedf5c