Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 10:31
Static task
static1
Behavioral task
behavioral1
Sample
9fc491c3579821e43a6fb3dda1514be3cf4d93c1a5b7d30a4319dd8b118b7c6f.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9fc491c3579821e43a6fb3dda1514be3cf4d93c1a5b7d30a4319dd8b118b7c6f.exe
Resource
win10v2004-20220812-en
General
-
Target
9fc491c3579821e43a6fb3dda1514be3cf4d93c1a5b7d30a4319dd8b118b7c6f.exe
-
Size
181KB
-
MD5
703d7e01da1da65fc90bb12d911e1973
-
SHA1
9180909b6d14f79d8b3ab7af0fe4969e75c5c715
-
SHA256
9fc491c3579821e43a6fb3dda1514be3cf4d93c1a5b7d30a4319dd8b118b7c6f
-
SHA512
a91dd9fec03ed115ec4e86bf9bf93c69284341a65b26041c4bcab10703d2a2b6f55f853395f9c5e7159efd84cef491435dd3a63ce8cf27022f4e8497dbb68c6a
-
SSDEEP
3072:MfACg37XqjD/Y11m13OzCHqO/UYCjm4CNNDPuW1tGn:MfACgL6PYrm13OphYCjXCz/1G
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 272 Dsigea.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run Dsigea.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ZU6RKI1ONY = "C:\\Windows\\Dsigea.exe" Dsigea.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Dsigea.exe 9fc491c3579821e43a6fb3dda1514be3cf4d93c1a5b7d30a4319dd8b118b7c6f.exe File created C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 9fc491c3579821e43a6fb3dda1514be3cf4d93c1a5b7d30a4319dd8b118b7c6f.exe File opened for modification C:\Windows\Tasks\{810401E2-DDE0-454e-B0E2-AA89C9E5967C}.job 9fc491c3579821e43a6fb3dda1514be3cf4d93c1a5b7d30a4319dd8b118b7c6f.exe File created C:\Windows\Dsigea.exe 9fc491c3579821e43a6fb3dda1514be3cf4d93c1a5b7d30a4319dd8b118b7c6f.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main Dsigea.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\International Dsigea.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe 272 Dsigea.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1348 9fc491c3579821e43a6fb3dda1514be3cf4d93c1a5b7d30a4319dd8b118b7c6f.exe 272 Dsigea.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1348 wrote to memory of 272 1348 9fc491c3579821e43a6fb3dda1514be3cf4d93c1a5b7d30a4319dd8b118b7c6f.exe 27 PID 1348 wrote to memory of 272 1348 9fc491c3579821e43a6fb3dda1514be3cf4d93c1a5b7d30a4319dd8b118b7c6f.exe 27 PID 1348 wrote to memory of 272 1348 9fc491c3579821e43a6fb3dda1514be3cf4d93c1a5b7d30a4319dd8b118b7c6f.exe 27 PID 1348 wrote to memory of 272 1348 9fc491c3579821e43a6fb3dda1514be3cf4d93c1a5b7d30a4319dd8b118b7c6f.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fc491c3579821e43a6fb3dda1514be3cf4d93c1a5b7d30a4319dd8b118b7c6f.exe"C:\Users\Admin\AppData\Local\Temp\9fc491c3579821e43a6fb3dda1514be3cf4d93c1a5b7d30a4319dd8b118b7c6f.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\Dsigea.exeC:\Windows\Dsigea.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:272
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
181KB
MD5703d7e01da1da65fc90bb12d911e1973
SHA19180909b6d14f79d8b3ab7af0fe4969e75c5c715
SHA2569fc491c3579821e43a6fb3dda1514be3cf4d93c1a5b7d30a4319dd8b118b7c6f
SHA512a91dd9fec03ed115ec4e86bf9bf93c69284341a65b26041c4bcab10703d2a2b6f55f853395f9c5e7159efd84cef491435dd3a63ce8cf27022f4e8497dbb68c6a
-
Filesize
408B
MD5567386392a9b2bd098fe3ae14ac03968
SHA12b8cb83993cf4356f8c98d950a2e8be3fd71db45
SHA25669cc7b30c0cc994398b221e48ed8de7264e5812477e9b10c2900bb3402fba7ae
SHA512c72a9e675e0be6960f038c7da01876358dfc5ed81568d587e554fb5a98f25bde76adb7e7f6b06fcc32de41ba2e92b2737cd42b9c001d1c40a5b60c1bfb5319ef