Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 11:48
Static task
static1
Behavioral task
behavioral1
Sample
a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe
Resource
win10v2004-20220812-en
General
-
Target
a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe
-
Size
31KB
-
MD5
64fbf2e46662151ee8e81bbafabd852b
-
SHA1
f316fab1a4ce8f8aa71502b8e19c372e6687cf13
-
SHA256
a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e
-
SHA512
d42987a899bb6a4858621f7fc2601179d3a5e3d40f9c89ba1b2157218c570c0c1009439b553e5380eea1b5a8e5073f3b0e21d0782f513346d1a859004bf8a59c
-
SSDEEP
768:BvlvZ2AS9Ck2YCajsy51xIt4INnbcuyD7U+NM:BNvPot2ObI2INnouy8iM
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\h: a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe File opened (read-only) \??\k: a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe File opened (read-only) \??\o: a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe File opened (read-only) \??\r: a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe File opened (read-only) \??\e: a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe File opened (read-only) \??\m: a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe File opened (read-only) \??\n: a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe File opened (read-only) \??\s: a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe File opened (read-only) \??\u: a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe File opened (read-only) \??\v: a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe File opened (read-only) \??\z: a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe File opened (read-only) \??\i: a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe File opened (read-only) \??\g: a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe File opened (read-only) \??\t: a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe File opened (read-only) \??\y: a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe File opened (read-only) \??\f: a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe File opened (read-only) \??\l: a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe File opened (read-only) \??\p: a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe File opened (read-only) \??\q: a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe File opened (read-only) \??\w: a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe File opened (read-only) \??\x: a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe File opened (read-only) \??\j: a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\7082679.CPL a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\rgdltecq\ngoifz.pif a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe File created C:\Program Files (x86)\Common Files\rgdltecq\ngoifz.pif a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED} a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\InProcServer32\ = "C:\\Windows\\SysWow64\\7082679.CPL" a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\InProcServer32 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe -
Suspicious behavior: EnumeratesProcesses 63 IoCs
pid Process 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe Token: SeDebugPrivilege 1644 a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe"C:\Users\Admin\AppData\Local\Temp\a989e071f0f23d3cbfd47959380e66a1a2d23265e94da47a519ca181e280185e.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1644
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.1MB
MD5fb285142480e616cb8ef694497761ef0
SHA1fdf23be70c5da8d6b8d1d6954e2890b29f2e47b9
SHA25693882666c7fd64445ad55a9cf1bb8cb8c7de0488194b5d3f1a7ff6e549089eb6
SHA512d11ca7549e2f731365cda57a27d2072106516bdc875f7abed3d0f618353b2db49492352b98f338a7689161d5de0ba234efa895c0b2ca36485d309d7f86a4eda3