Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
41s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 09:28
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
1.0MB
-
MD5
82bafdf75a03a4d6721fa6a81738713a
-
SHA1
007a61c81937a2a1213c2cffa5147b595e86cc36
-
SHA256
d32f28ba0890002ca897903a45f7d3b939abecd09de1128e3b5134cf57ab4960
-
SHA512
2aa5f70dbe26020ad6ee09d2e939e4468e4a03168f21ace45c445fe69eb728809009081c8cace5c30df72a83ed7db601936a0ec6a4b87befd84df4f33eaca3fc
-
SSDEEP
24576:hyL8b4owu2oJBsjxeuyYUwoNue0CqZTIl:UCHcVUVu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1468 Quite.exe.pif -
Loads dropped DLL 1 IoCs
pid Process 1936 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 856 tasklist.exe 1960 tasklist.exe -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1764 PING.EXE 816 PING.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1468 Quite.exe.pif 1468 Quite.exe.pif 1468 Quite.exe.pif -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeBackupPrivilege 1772 robocopy.exe Token: SeRestorePrivilege 1772 robocopy.exe Token: SeSecurityPrivilege 1772 robocopy.exe Token: SeTakeOwnershipPrivilege 1772 robocopy.exe Token: SeDebugPrivilege 856 tasklist.exe Token: SeDebugPrivilege 1960 tasklist.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1468 Quite.exe.pif 1468 Quite.exe.pif 1468 Quite.exe.pif -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1468 Quite.exe.pif 1468 Quite.exe.pif 1468 Quite.exe.pif -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1184 wrote to memory of 1772 1184 file.exe 26 PID 1184 wrote to memory of 1772 1184 file.exe 26 PID 1184 wrote to memory of 1772 1184 file.exe 26 PID 1184 wrote to memory of 1772 1184 file.exe 26 PID 1184 wrote to memory of 1612 1184 file.exe 28 PID 1184 wrote to memory of 1612 1184 file.exe 28 PID 1184 wrote to memory of 1612 1184 file.exe 28 PID 1184 wrote to memory of 1612 1184 file.exe 28 PID 1612 wrote to memory of 1936 1612 cmd.exe 30 PID 1612 wrote to memory of 1936 1612 cmd.exe 30 PID 1612 wrote to memory of 1936 1612 cmd.exe 30 PID 1612 wrote to memory of 1936 1612 cmd.exe 30 PID 1936 wrote to memory of 856 1936 cmd.exe 31 PID 1936 wrote to memory of 856 1936 cmd.exe 31 PID 1936 wrote to memory of 856 1936 cmd.exe 31 PID 1936 wrote to memory of 856 1936 cmd.exe 31 PID 1936 wrote to memory of 840 1936 cmd.exe 32 PID 1936 wrote to memory of 840 1936 cmd.exe 32 PID 1936 wrote to memory of 840 1936 cmd.exe 32 PID 1936 wrote to memory of 840 1936 cmd.exe 32 PID 1936 wrote to memory of 1960 1936 cmd.exe 34 PID 1936 wrote to memory of 1960 1936 cmd.exe 34 PID 1936 wrote to memory of 1960 1936 cmd.exe 34 PID 1936 wrote to memory of 1960 1936 cmd.exe 34 PID 1936 wrote to memory of 1804 1936 cmd.exe 35 PID 1936 wrote to memory of 1804 1936 cmd.exe 35 PID 1936 wrote to memory of 1804 1936 cmd.exe 35 PID 1936 wrote to memory of 1804 1936 cmd.exe 35 PID 1936 wrote to memory of 2016 1936 cmd.exe 36 PID 1936 wrote to memory of 2016 1936 cmd.exe 36 PID 1936 wrote to memory of 2016 1936 cmd.exe 36 PID 1936 wrote to memory of 2016 1936 cmd.exe 36 PID 1936 wrote to memory of 1468 1936 cmd.exe 37 PID 1936 wrote to memory of 1468 1936 cmd.exe 37 PID 1936 wrote to memory of 1468 1936 cmd.exe 37 PID 1936 wrote to memory of 1468 1936 cmd.exe 37 PID 1936 wrote to memory of 1764 1936 cmd.exe 38 PID 1936 wrote to memory of 1764 1936 cmd.exe 38 PID 1936 wrote to memory of 1764 1936 cmd.exe 38 PID 1936 wrote to memory of 1764 1936 cmd.exe 38 PID 1612 wrote to memory of 816 1612 cmd.exe 39 PID 1612 wrote to memory of 816 1612 cmd.exe 39 PID 1612 wrote to memory of 816 1612 cmd.exe 39 PID 1612 wrote to memory of 816 1612 cmd.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\robocopy.exerobocopy 89273873764872637456726738462763749829384862735682793849823849728342⤵
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
-
C:\Windows\SysWOW64\cmd.execmd /c cmd < Provide.accdt & ping -n 5 localhost2⤵
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\cmd.execmd3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq AvastUI.exe"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:856
-
-
C:\Windows\SysWOW64\find.exefind /I /N "avastui.exe"4⤵PID:840
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /FI "imagename eq AVGUI.exe"4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
-
C:\Windows\SysWOW64\find.exefind /I /N "avgui.exe"4⤵PID:1804
-
-
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^NpDypcc$" Corner.accdt4⤵PID:2016
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Quite.exe.pifQuite.exe.pif r4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1468
-
-
C:\Windows\SysWOW64\PING.EXEping localhost -n 54⤵
- Runs ping.exe
PID:1764
-
-
-
C:\Windows\SysWOW64\PING.EXEping -n 5 localhost3⤵
- Runs ping.exe
PID:816
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
924KB
MD56382237b9a2acb5e9561a528bf320cb1
SHA16f4f8f15083d33b6bd4420fedb5c1dfa88bd29e4
SHA2560c188fb29ea7e3c5f7dca9e36510daa23842a05d62ce939aae533637987c23b6
SHA512788c58c2079ed99cc50402715d8864ee88c980daf810af80ee6807e52c1ca07f4101322709add26e2756435bad6b07b2aa3f636e4d6096bceeb42081c56475c3
-
Filesize
11KB
MD5e3f10080ab2a68f4e23d1b1409716d1a
SHA1aa8408183051703f1130234ab2025cb3f0bc784d
SHA256536a71f9826978c11537a4d727c31cf133b26942262d17fd2e2514ca2e68be2b
SHA512548ef52dfeeec0431a22454eff457b85189e98a326be0f271eb7cbbaf093d0e0c7fdb1c692bd2b604073326c4ece8af5b9ccd8a62f15d172754c7b7660b2c9f9
-
Filesize
924KB
MD56987e4cd3f256462f422326a7ef115b9
SHA171672a495b4603ecfec40a65254cb3ba8766bbe0
SHA2563e26723394ade92f8163b5643960189cb07358b0f96529a477d37176d68aa0a0
SHA5124b1d7f7ffee39a2d65504767beeddd4c3374807a93889b14e7e73db11e478492dec349aedca03ce828f21a66bb666a68d3735443f4249556e10825a4cd7dfeb4
-
Filesize
924KB
MD56987e4cd3f256462f422326a7ef115b9
SHA171672a495b4603ecfec40a65254cb3ba8766bbe0
SHA2563e26723394ade92f8163b5643960189cb07358b0f96529a477d37176d68aa0a0
SHA5124b1d7f7ffee39a2d65504767beeddd4c3374807a93889b14e7e73db11e478492dec349aedca03ce828f21a66bb666a68d3735443f4249556e10825a4cd7dfeb4
-
Filesize
1019KB
MD57589f2b25aab67fa51982d2123c06aed
SHA149ba0088845dd5a650805bc8eba149f1eb8088b0
SHA25610c21ca00df6e31e4402ac703f55d326d66d431d5b8b4f414b5ce631fcdb1e3e
SHA512ead1e5916c6f8758637e912ffdd6ee6166cde8e8b596643467311139cb63e72fdb6bdeca4eaad13f54cacde1473e637c81d30157112a8ed910d57711a1d25a4f
-
Filesize
924KB
MD56987e4cd3f256462f422326a7ef115b9
SHA171672a495b4603ecfec40a65254cb3ba8766bbe0
SHA2563e26723394ade92f8163b5643960189cb07358b0f96529a477d37176d68aa0a0
SHA5124b1d7f7ffee39a2d65504767beeddd4c3374807a93889b14e7e73db11e478492dec349aedca03ce828f21a66bb666a68d3735443f4249556e10825a4cd7dfeb4