Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
34s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 09:57
Static task
static1
Behavioral task
behavioral1
Sample
cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe
Resource
win10v2004-20220812-en
General
-
Target
cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe
-
Size
121KB
-
MD5
8b5ce176105c5e9189a080dae6ef906e
-
SHA1
211c58f6dbf0d5d14e9f560353d4b3ef03f0b705
-
SHA256
cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196
-
SHA512
2e428f5b96c1f27bfb3c908e3f6498708174efe54a2fb3603fb298e706c0d2ab1f1e6c0a9c6355290b211898f23f0fdd9eae9090f4aa11687081fc79f8c1d5b7
-
SSDEEP
3072:xnj9jtfU+INndIc0J25lzn90Z3cWCWCV6PZR7olFV4mV7lMdGQY:xjbeiA9rWfCV6PZqFV4u7Kds
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1764 111.exe 1568 111.exe 1552 111.exe 2024 111.exe -
Loads dropped DLL 10 IoCs
pid Process 1952 cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe 1952 cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe 1764 111.exe 1764 111.exe 1952 cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe 1952 cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe 1568 111.exe 1552 111.exe 1552 111.exe 2024 111.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1764 set thread context of 1568 1764 111.exe 29 PID 1552 set thread context of 2024 1552 111.exe 31 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1568 111.exe 1568 111.exe 2024 111.exe 2024 111.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1764 111.exe 1552 111.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1952 wrote to memory of 1764 1952 cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe 28 PID 1952 wrote to memory of 1764 1952 cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe 28 PID 1952 wrote to memory of 1764 1952 cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe 28 PID 1952 wrote to memory of 1764 1952 cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe 28 PID 1952 wrote to memory of 1764 1952 cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe 28 PID 1952 wrote to memory of 1764 1952 cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe 28 PID 1952 wrote to memory of 1764 1952 cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe 28 PID 1764 wrote to memory of 1568 1764 111.exe 29 PID 1764 wrote to memory of 1568 1764 111.exe 29 PID 1764 wrote to memory of 1568 1764 111.exe 29 PID 1764 wrote to memory of 1568 1764 111.exe 29 PID 1764 wrote to memory of 1568 1764 111.exe 29 PID 1764 wrote to memory of 1568 1764 111.exe 29 PID 1764 wrote to memory of 1568 1764 111.exe 29 PID 1764 wrote to memory of 1568 1764 111.exe 29 PID 1764 wrote to memory of 1568 1764 111.exe 29 PID 1764 wrote to memory of 1568 1764 111.exe 29 PID 1764 wrote to memory of 1568 1764 111.exe 29 PID 1952 wrote to memory of 1552 1952 cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe 30 PID 1952 wrote to memory of 1552 1952 cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe 30 PID 1952 wrote to memory of 1552 1952 cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe 30 PID 1952 wrote to memory of 1552 1952 cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe 30 PID 1952 wrote to memory of 1552 1952 cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe 30 PID 1952 wrote to memory of 1552 1952 cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe 30 PID 1952 wrote to memory of 1552 1952 cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe 30 PID 1552 wrote to memory of 2024 1552 111.exe 31 PID 1552 wrote to memory of 2024 1552 111.exe 31 PID 1552 wrote to memory of 2024 1552 111.exe 31 PID 1552 wrote to memory of 2024 1552 111.exe 31 PID 1552 wrote to memory of 2024 1552 111.exe 31 PID 1552 wrote to memory of 2024 1552 111.exe 31 PID 1552 wrote to memory of 2024 1552 111.exe 31 PID 1552 wrote to memory of 2024 1552 111.exe 31 PID 1552 wrote to memory of 2024 1552 111.exe 31 PID 1552 wrote to memory of 2024 1552 111.exe 31 PID 1552 wrote to memory of 2024 1552 111.exe 31 PID 1568 wrote to memory of 1256 1568 111.exe 6 PID 2024 wrote to memory of 1256 2024 111.exe 6 PID 1568 wrote to memory of 1256 1568 111.exe 6 PID 2024 wrote to memory of 1256 2024 111.exe 6 PID 1568 wrote to memory of 1256 1568 111.exe 6 PID 2024 wrote to memory of 1256 2024 111.exe 6 PID 1568 wrote to memory of 1256 1568 111.exe 6 PID 2024 wrote to memory of 1256 2024 111.exe 6
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe"C:\Users\Admin\AppData\Local\Temp\cb6c310fa55c87be0265292a56cb109b870cb612555d435aa71c3bfc78174196.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\111.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\111.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\111.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\111.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1568
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\111.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\111.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\111.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\111.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2024
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD5fe6b0190806dbe8fbbcf5134f21fb7d6
SHA19b0b25c4a0a4b4a25ececaa42324ec1257b19ca7
SHA2560c395d52d5871c233dbe449d7b5edb69ee31303965bda64fab6969f3fbbd87a5
SHA5121851a9ecb6f003c6800648e0d0e0cd814e39da83e0dc855f6c03186ce9748bc654b185578abd984b7f9aeed1aa8c3f78d66a3c8c0acc92f9fee11d81d6c5d59f
-
Filesize
124KB
MD5fe6b0190806dbe8fbbcf5134f21fb7d6
SHA19b0b25c4a0a4b4a25ececaa42324ec1257b19ca7
SHA2560c395d52d5871c233dbe449d7b5edb69ee31303965bda64fab6969f3fbbd87a5
SHA5121851a9ecb6f003c6800648e0d0e0cd814e39da83e0dc855f6c03186ce9748bc654b185578abd984b7f9aeed1aa8c3f78d66a3c8c0acc92f9fee11d81d6c5d59f
-
Filesize
124KB
MD5fe6b0190806dbe8fbbcf5134f21fb7d6
SHA19b0b25c4a0a4b4a25ececaa42324ec1257b19ca7
SHA2560c395d52d5871c233dbe449d7b5edb69ee31303965bda64fab6969f3fbbd87a5
SHA5121851a9ecb6f003c6800648e0d0e0cd814e39da83e0dc855f6c03186ce9748bc654b185578abd984b7f9aeed1aa8c3f78d66a3c8c0acc92f9fee11d81d6c5d59f
-
Filesize
124KB
MD5fe6b0190806dbe8fbbcf5134f21fb7d6
SHA19b0b25c4a0a4b4a25ececaa42324ec1257b19ca7
SHA2560c395d52d5871c233dbe449d7b5edb69ee31303965bda64fab6969f3fbbd87a5
SHA5121851a9ecb6f003c6800648e0d0e0cd814e39da83e0dc855f6c03186ce9748bc654b185578abd984b7f9aeed1aa8c3f78d66a3c8c0acc92f9fee11d81d6c5d59f
-
Filesize
124KB
MD5fe6b0190806dbe8fbbcf5134f21fb7d6
SHA19b0b25c4a0a4b4a25ececaa42324ec1257b19ca7
SHA2560c395d52d5871c233dbe449d7b5edb69ee31303965bda64fab6969f3fbbd87a5
SHA5121851a9ecb6f003c6800648e0d0e0cd814e39da83e0dc855f6c03186ce9748bc654b185578abd984b7f9aeed1aa8c3f78d66a3c8c0acc92f9fee11d81d6c5d59f
-
Filesize
124KB
MD5fe6b0190806dbe8fbbcf5134f21fb7d6
SHA19b0b25c4a0a4b4a25ececaa42324ec1257b19ca7
SHA2560c395d52d5871c233dbe449d7b5edb69ee31303965bda64fab6969f3fbbd87a5
SHA5121851a9ecb6f003c6800648e0d0e0cd814e39da83e0dc855f6c03186ce9748bc654b185578abd984b7f9aeed1aa8c3f78d66a3c8c0acc92f9fee11d81d6c5d59f
-
Filesize
124KB
MD5fe6b0190806dbe8fbbcf5134f21fb7d6
SHA19b0b25c4a0a4b4a25ececaa42324ec1257b19ca7
SHA2560c395d52d5871c233dbe449d7b5edb69ee31303965bda64fab6969f3fbbd87a5
SHA5121851a9ecb6f003c6800648e0d0e0cd814e39da83e0dc855f6c03186ce9748bc654b185578abd984b7f9aeed1aa8c3f78d66a3c8c0acc92f9fee11d81d6c5d59f
-
Filesize
124KB
MD5fe6b0190806dbe8fbbcf5134f21fb7d6
SHA19b0b25c4a0a4b4a25ececaa42324ec1257b19ca7
SHA2560c395d52d5871c233dbe449d7b5edb69ee31303965bda64fab6969f3fbbd87a5
SHA5121851a9ecb6f003c6800648e0d0e0cd814e39da83e0dc855f6c03186ce9748bc654b185578abd984b7f9aeed1aa8c3f78d66a3c8c0acc92f9fee11d81d6c5d59f
-
Filesize
124KB
MD5fe6b0190806dbe8fbbcf5134f21fb7d6
SHA19b0b25c4a0a4b4a25ececaa42324ec1257b19ca7
SHA2560c395d52d5871c233dbe449d7b5edb69ee31303965bda64fab6969f3fbbd87a5
SHA5121851a9ecb6f003c6800648e0d0e0cd814e39da83e0dc855f6c03186ce9748bc654b185578abd984b7f9aeed1aa8c3f78d66a3c8c0acc92f9fee11d81d6c5d59f
-
Filesize
124KB
MD5fe6b0190806dbe8fbbcf5134f21fb7d6
SHA19b0b25c4a0a4b4a25ececaa42324ec1257b19ca7
SHA2560c395d52d5871c233dbe449d7b5edb69ee31303965bda64fab6969f3fbbd87a5
SHA5121851a9ecb6f003c6800648e0d0e0cd814e39da83e0dc855f6c03186ce9748bc654b185578abd984b7f9aeed1aa8c3f78d66a3c8c0acc92f9fee11d81d6c5d59f
-
Filesize
124KB
MD5fe6b0190806dbe8fbbcf5134f21fb7d6
SHA19b0b25c4a0a4b4a25ececaa42324ec1257b19ca7
SHA2560c395d52d5871c233dbe449d7b5edb69ee31303965bda64fab6969f3fbbd87a5
SHA5121851a9ecb6f003c6800648e0d0e0cd814e39da83e0dc855f6c03186ce9748bc654b185578abd984b7f9aeed1aa8c3f78d66a3c8c0acc92f9fee11d81d6c5d59f
-
Filesize
124KB
MD5fe6b0190806dbe8fbbcf5134f21fb7d6
SHA19b0b25c4a0a4b4a25ececaa42324ec1257b19ca7
SHA2560c395d52d5871c233dbe449d7b5edb69ee31303965bda64fab6969f3fbbd87a5
SHA5121851a9ecb6f003c6800648e0d0e0cd814e39da83e0dc855f6c03186ce9748bc654b185578abd984b7f9aeed1aa8c3f78d66a3c8c0acc92f9fee11d81d6c5d59f
-
Filesize
124KB
MD5fe6b0190806dbe8fbbcf5134f21fb7d6
SHA19b0b25c4a0a4b4a25ececaa42324ec1257b19ca7
SHA2560c395d52d5871c233dbe449d7b5edb69ee31303965bda64fab6969f3fbbd87a5
SHA5121851a9ecb6f003c6800648e0d0e0cd814e39da83e0dc855f6c03186ce9748bc654b185578abd984b7f9aeed1aa8c3f78d66a3c8c0acc92f9fee11d81d6c5d59f
-
Filesize
124KB
MD5fe6b0190806dbe8fbbcf5134f21fb7d6
SHA19b0b25c4a0a4b4a25ececaa42324ec1257b19ca7
SHA2560c395d52d5871c233dbe449d7b5edb69ee31303965bda64fab6969f3fbbd87a5
SHA5121851a9ecb6f003c6800648e0d0e0cd814e39da83e0dc855f6c03186ce9748bc654b185578abd984b7f9aeed1aa8c3f78d66a3c8c0acc92f9fee11d81d6c5d59f
-
Filesize
124KB
MD5fe6b0190806dbe8fbbcf5134f21fb7d6
SHA19b0b25c4a0a4b4a25ececaa42324ec1257b19ca7
SHA2560c395d52d5871c233dbe449d7b5edb69ee31303965bda64fab6969f3fbbd87a5
SHA5121851a9ecb6f003c6800648e0d0e0cd814e39da83e0dc855f6c03186ce9748bc654b185578abd984b7f9aeed1aa8c3f78d66a3c8c0acc92f9fee11d81d6c5d59f