Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 08:47
Static task
static1
Behavioral task
behavioral1
Sample
0d2c87d67eefe44751c99b28cfe91c921145ea8e01be1f7ab75044353d6177cc.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0d2c87d67eefe44751c99b28cfe91c921145ea8e01be1f7ab75044353d6177cc.exe
Resource
win10v2004-20220901-en
General
-
Target
0d2c87d67eefe44751c99b28cfe91c921145ea8e01be1f7ab75044353d6177cc.exe
-
Size
212KB
-
MD5
7c183a11518654f66b173f4279c57e00
-
SHA1
8cd239e9dcc624914a90abbbee52995c78a233aa
-
SHA256
0d2c87d67eefe44751c99b28cfe91c921145ea8e01be1f7ab75044353d6177cc
-
SHA512
a3130b88698c5cbba0e8d1bfb8c4008226e2d6cf3d37bce2209d8b35753ff626560e68d65fe4db254553a565b1cb2395fa2d9efee32aad51648ac3a7b47d6853
-
SSDEEP
6144:RYR5tqnkNP+knH6o/r/rj5C0nXzT0U46hM5gGbME:OR5tHh+knaYXj57n/T41gGbX
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 1764 0d2c87d67eefe44751c99b28cfe91c921145ea8e01be1f7ab75044353d6177cc.exe 896 rundll32.exe 896 rundll32.exe 896 rundll32.exe 896 rundll32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run 0d2c87d67eefe44751c99b28cfe91c921145ea8e01be1f7ab75044353d6177cc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Metropolis = "rundll32.exe C:\\Windows\\system32\\sshnas21.dll,GetHandle" 0d2c87d67eefe44751c99b28cfe91c921145ea8e01be1f7ab75044353d6177cc.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\sshnas21.dll 0d2c87d67eefe44751c99b28cfe91c921145ea8e01be1f7ab75044353d6177cc.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 1764 0d2c87d67eefe44751c99b28cfe91c921145ea8e01be1f7ab75044353d6177cc.exe 1764 0d2c87d67eefe44751c99b28cfe91c921145ea8e01be1f7ab75044353d6177cc.exe 896 rundll32.exe 896 rundll32.exe 896 rundll32.exe 896 rundll32.exe 896 rundll32.exe 896 rundll32.exe 896 rundll32.exe 896 rundll32.exe 896 rundll32.exe 896 rundll32.exe 896 rundll32.exe 896 rundll32.exe 896 rundll32.exe 896 rundll32.exe 896 rundll32.exe 896 rundll32.exe 896 rundll32.exe 896 rundll32.exe 896 rundll32.exe 896 rundll32.exe 896 rundll32.exe 896 rundll32.exe 896 rundll32.exe 896 rundll32.exe 896 rundll32.exe 896 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1764 0d2c87d67eefe44751c99b28cfe91c921145ea8e01be1f7ab75044353d6177cc.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1764 wrote to memory of 896 1764 0d2c87d67eefe44751c99b28cfe91c921145ea8e01be1f7ab75044353d6177cc.exe 28 PID 1764 wrote to memory of 896 1764 0d2c87d67eefe44751c99b28cfe91c921145ea8e01be1f7ab75044353d6177cc.exe 28 PID 1764 wrote to memory of 896 1764 0d2c87d67eefe44751c99b28cfe91c921145ea8e01be1f7ab75044353d6177cc.exe 28 PID 1764 wrote to memory of 896 1764 0d2c87d67eefe44751c99b28cfe91c921145ea8e01be1f7ab75044353d6177cc.exe 28 PID 1764 wrote to memory of 896 1764 0d2c87d67eefe44751c99b28cfe91c921145ea8e01be1f7ab75044353d6177cc.exe 28 PID 1764 wrote to memory of 896 1764 0d2c87d67eefe44751c99b28cfe91c921145ea8e01be1f7ab75044353d6177cc.exe 28 PID 1764 wrote to memory of 896 1764 0d2c87d67eefe44751c99b28cfe91c921145ea8e01be1f7ab75044353d6177cc.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d2c87d67eefe44751c99b28cfe91c921145ea8e01be1f7ab75044353d6177cc.exe"C:\Users\Admin\AppData\Local\Temp\0d2c87d67eefe44751c99b28cfe91c921145ea8e01be1f7ab75044353d6177cc.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\sshnas21.dll,GetHandle2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:896
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
175KB
MD5039dc06b6819e0baaa366179a980c9d8
SHA13e82aa9d8511d37b5b68b9733482213285213ba6
SHA2561ff2c6a258be86e56442df8d55779f785e685f7ec19b37b483a2f3e814bfeb3f
SHA512097615501b7f11888bf603f78d9176985ad836f10513d0e7f39835d3667f4f1719ae2f0fdd7f689c569645a49035e54b8b615f252021d8a826ffeb487bdd0eb4
-
Filesize
175KB
MD5039dc06b6819e0baaa366179a980c9d8
SHA13e82aa9d8511d37b5b68b9733482213285213ba6
SHA2561ff2c6a258be86e56442df8d55779f785e685f7ec19b37b483a2f3e814bfeb3f
SHA512097615501b7f11888bf603f78d9176985ad836f10513d0e7f39835d3667f4f1719ae2f0fdd7f689c569645a49035e54b8b615f252021d8a826ffeb487bdd0eb4
-
Filesize
175KB
MD5039dc06b6819e0baaa366179a980c9d8
SHA13e82aa9d8511d37b5b68b9733482213285213ba6
SHA2561ff2c6a258be86e56442df8d55779f785e685f7ec19b37b483a2f3e814bfeb3f
SHA512097615501b7f11888bf603f78d9176985ad836f10513d0e7f39835d3667f4f1719ae2f0fdd7f689c569645a49035e54b8b615f252021d8a826ffeb487bdd0eb4
-
Filesize
175KB
MD5039dc06b6819e0baaa366179a980c9d8
SHA13e82aa9d8511d37b5b68b9733482213285213ba6
SHA2561ff2c6a258be86e56442df8d55779f785e685f7ec19b37b483a2f3e814bfeb3f
SHA512097615501b7f11888bf603f78d9176985ad836f10513d0e7f39835d3667f4f1719ae2f0fdd7f689c569645a49035e54b8b615f252021d8a826ffeb487bdd0eb4
-
Filesize
175KB
MD5039dc06b6819e0baaa366179a980c9d8
SHA13e82aa9d8511d37b5b68b9733482213285213ba6
SHA2561ff2c6a258be86e56442df8d55779f785e685f7ec19b37b483a2f3e814bfeb3f
SHA512097615501b7f11888bf603f78d9176985ad836f10513d0e7f39835d3667f4f1719ae2f0fdd7f689c569645a49035e54b8b615f252021d8a826ffeb487bdd0eb4
-
Filesize
175KB
MD5039dc06b6819e0baaa366179a980c9d8
SHA13e82aa9d8511d37b5b68b9733482213285213ba6
SHA2561ff2c6a258be86e56442df8d55779f785e685f7ec19b37b483a2f3e814bfeb3f
SHA512097615501b7f11888bf603f78d9176985ad836f10513d0e7f39835d3667f4f1719ae2f0fdd7f689c569645a49035e54b8b615f252021d8a826ffeb487bdd0eb4