Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2022, 05:29

General

  • Target

    7c2bd6543ce4d99f1e0e7f9a560a1414542f444bb800e4fc2f04cf288f53d5cd.exe

  • Size

    1.1MB

  • MD5

    129ace256116b6572024b79bb2fa39ef

  • SHA1

    7de3aa0adcdac2ac708e245bfe1f301170404899

  • SHA256

    7c2bd6543ce4d99f1e0e7f9a560a1414542f444bb800e4fc2f04cf288f53d5cd

  • SHA512

    fa02cca7c149206e397b7e082134ba36768d79db069955f51d04347512176b9578804de14087620ee2df3e9c27828eebf70b40b2157a74eee6dd5b36a734527a

  • SSDEEP

    24576:InIE6iLcaqq9tH98ffJDtZjKARcmCBxTCcjAwhuZuPOYv8b:2dLcaq8cfJDtpK8czTRhuZuWqS

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • UPX packed file 14 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 36 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 27 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c2bd6543ce4d99f1e0e7f9a560a1414542f444bb800e4fc2f04cf288f53d5cd.exe
    "C:\Users\Admin\AppData\Local\Temp\7c2bd6543ce4d99f1e0e7f9a560a1414542f444bb800e4fc2f04cf288f53d5cd.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:272
  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:1644
  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe
    1⤵
    • Executes dropped EXE
    PID:1416
  • C:\Windows\system32\dllhost.exe
    C:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}
    1⤵
    • Drops file in Windows directory
    PID:896
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:436
  • C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"
    1⤵
    • Executes dropped EXE
    • Windows security modification
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:968

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\OSE.EXE

    Filesize

    284KB

    MD5

    d714b3de70a618f05f33e4e3e33f3d93

    SHA1

    8c43e95b58c9091391b6b11928cf778348326dfd

    SHA256

    9abd3240f7c01b252e13405ed19609690f265be2691a2e22722a0ff8c70757bf

    SHA512

    84e87f3a8a758ae8ac0cb01a16204157916ab2eeb86736a3da0f3dcb94139cc12a1bacb781b9d5ea36d295ae6e80564a18e5cd097bb47c76b2613cf3253192b5

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

    Filesize

    203KB

    MD5

    a4b431bd0a3888f7bc8c9fbe517f5ff0

    SHA1

    f40ca11f31acc0ee9264148992baca10231b80ea

    SHA256

    17dbe8cd947be1db7e9a0aeb884e56289e3f7cc03f081573346b170ccb2e97cf

    SHA512

    009ed085d58cdc7e9868a3b0cbef7db8ef5596b12bda359045d7ba464dabab1cd922f111114e988638479efe878556f96581d6bda3a988bd01454fa1056f7d99

  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe

    Filesize

    203KB

    MD5

    a4b431bd0a3888f7bc8c9fbe517f5ff0

    SHA1

    f40ca11f31acc0ee9264148992baca10231b80ea

    SHA256

    17dbe8cd947be1db7e9a0aeb884e56289e3f7cc03f081573346b170ccb2e97cf

    SHA512

    009ed085d58cdc7e9868a3b0cbef7db8ef5596b12bda359045d7ba464dabab1cd922f111114e988638479efe878556f96581d6bda3a988bd01454fa1056f7d99

  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe

    Filesize

    234KB

    MD5

    8744629ce61d05b8fc1fe2e62a84b0d7

    SHA1

    4e8bc35ae0b1232a87cd5e9f374e719ea628aa8a

    SHA256

    881bcfedfd989e91609e6b2f9db17a48078e27b5430a8a9f31778562f6744e06

    SHA512

    9a0ad39cd23a5d385263188c2f433bc6c4c3eae2a3b4a46f9ce825537a11c2f9224c71dc8ebddb24633dacfdebe07ded30b7b96ca83bfb1a6b082f6b3f04707e

  • \??\c:\program files (x86)\microsoft office\office14\groove.exe

    Filesize

    29.7MB

    MD5

    3a1e59a617bf95823975876f8151e424

    SHA1

    703da38ac061f45fbbbbf648dbf687af3a5ab2fd

    SHA256

    1f2e4f24a501fab7a1331021618a513947976a27b9146d281abc9052e0206d1d

    SHA512

    621df42611cd241e8036ba86a94c7a568788dd6dd0f2444305e396f4f4e9285ec8b1947440c0538fc43a17296e09059e4992682b5b9dfac052aaae73620b4886

  • \??\c:\windows\SysWOW64\searchindexer.exe

    Filesize

    562KB

    MD5

    3ecc73ec958bd9e6dc047e9271539f91

    SHA1

    831b3f436a7ce35dcd13e3fc8e72e1b8553bb28b

    SHA256

    e4e85e0a058c443bd9397372659a59b123d5f63c9daf89cf32921a5bc4e9026b

    SHA512

    a262ab996c09e59cf0e04c7e1bc8b3c9438f6fb32dca7a0373ac6896e6c58fad403618e9d4297da5b929e95c00946d5b236d463fc2a2d51699f544fe1d6ae484

  • \??\c:\windows\SysWOW64\svchost.exe

    Filesize

    164KB

    MD5

    d08d4d1e278c81e5c2072fd2d56140c4

    SHA1

    cbff1983d103a8aa0fce94999b8713b33a2e3f03

    SHA256

    b0400a5fab00d81e0cfd771e9f439dcbdad5fcf632c0adc3d578d95788e1a94a

    SHA512

    2ef04ee1880dba0b230a0dab5b96391c417dac689bace2c078a22a6ba1d60186d978b394bd0da95aecfe9f7bfd8914d8cc3da1353bbad6c4b3bd4a3a64d7f4d1

  • \??\c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe

    Filesize

    234KB

    MD5

    8744629ce61d05b8fc1fe2e62a84b0d7

    SHA1

    4e8bc35ae0b1232a87cd5e9f374e719ea628aa8a

    SHA256

    881bcfedfd989e91609e6b2f9db17a48078e27b5430a8a9f31778562f6744e06

    SHA512

    9a0ad39cd23a5d385263188c2f433bc6c4c3eae2a3b4a46f9ce825537a11c2f9224c71dc8ebddb24633dacfdebe07ded30b7b96ca83bfb1a6b082f6b3f04707e

  • memory/272-67-0x0000000000400000-0x0000000000560000-memory.dmp

    Filesize

    1.4MB

  • memory/272-54-0x0000000075931000-0x0000000075933000-memory.dmp

    Filesize

    8KB

  • memory/272-55-0x0000000000400000-0x0000000000560000-memory.dmp

    Filesize

    1.4MB

  • memory/436-62-0x000007FEFBC41000-0x000007FEFBC43000-memory.dmp

    Filesize

    8KB

  • memory/968-64-0x000000002E000000-0x000000002E086000-memory.dmp

    Filesize

    536KB

  • memory/1416-61-0x0000000000400000-0x0000000000479000-memory.dmp

    Filesize

    484KB

  • memory/1644-59-0x0000000010000000-0x0000000010070000-memory.dmp

    Filesize

    448KB

  • memory/1644-57-0x0000000010000000-0x0000000010070000-memory.dmp

    Filesize

    448KB