Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
21s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 16:52
Behavioral task
behavioral1
Sample
4e20a9e162cf729fb04d257413a45aa98334485bc3629b74a1b45dc1b2709930.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4e20a9e162cf729fb04d257413a45aa98334485bc3629b74a1b45dc1b2709930.exe
Resource
win10v2004-20220812-en
General
-
Target
4e20a9e162cf729fb04d257413a45aa98334485bc3629b74a1b45dc1b2709930.exe
-
Size
839KB
-
MD5
7422ae285d3da809f1a58c476eafe650
-
SHA1
67f6af60062aacbd895c1a20eec32382bdaa5600
-
SHA256
4e20a9e162cf729fb04d257413a45aa98334485bc3629b74a1b45dc1b2709930
-
SHA512
ba3ddfb38931b9790e2299b0df7fc5018009b02c32bfee2c72c49db4c598bb851f0a1679ab8dceac8521b79d529749dc355b3343ef1bc5d50f8ce5d703f86822
-
SSDEEP
12288:3ghm8FELJ17wCpNPjIqxuuECGDUg8Zy/cLONpB6p:3km8eHLO7BA
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1992-70-0x0000000000400000-0x00000000004D3000-memory.dmp upx behavioral1/files/0x0009000000012677-74.dat upx -
Deletes itself 1 IoCs
pid Process 1204 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1992 set thread context of 904 1992 4e20a9e162cf729fb04d257413a45aa98334485bc3629b74a1b45dc1b2709930.exe 28 -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2004 reg.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1992 wrote to memory of 904 1992 4e20a9e162cf729fb04d257413a45aa98334485bc3629b74a1b45dc1b2709930.exe 28 PID 1992 wrote to memory of 904 1992 4e20a9e162cf729fb04d257413a45aa98334485bc3629b74a1b45dc1b2709930.exe 28 PID 1992 wrote to memory of 904 1992 4e20a9e162cf729fb04d257413a45aa98334485bc3629b74a1b45dc1b2709930.exe 28 PID 1992 wrote to memory of 904 1992 4e20a9e162cf729fb04d257413a45aa98334485bc3629b74a1b45dc1b2709930.exe 28 PID 1992 wrote to memory of 904 1992 4e20a9e162cf729fb04d257413a45aa98334485bc3629b74a1b45dc1b2709930.exe 28 PID 1992 wrote to memory of 904 1992 4e20a9e162cf729fb04d257413a45aa98334485bc3629b74a1b45dc1b2709930.exe 28 PID 1992 wrote to memory of 904 1992 4e20a9e162cf729fb04d257413a45aa98334485bc3629b74a1b45dc1b2709930.exe 28 PID 1992 wrote to memory of 904 1992 4e20a9e162cf729fb04d257413a45aa98334485bc3629b74a1b45dc1b2709930.exe 28 PID 904 wrote to memory of 1540 904 4e20a9e162cf729fb04d257413a45aa98334485bc3629b74a1b45dc1b2709930.exe 29 PID 904 wrote to memory of 1540 904 4e20a9e162cf729fb04d257413a45aa98334485bc3629b74a1b45dc1b2709930.exe 29 PID 904 wrote to memory of 1540 904 4e20a9e162cf729fb04d257413a45aa98334485bc3629b74a1b45dc1b2709930.exe 29 PID 904 wrote to memory of 1540 904 4e20a9e162cf729fb04d257413a45aa98334485bc3629b74a1b45dc1b2709930.exe 29 PID 1992 wrote to memory of 1204 1992 4e20a9e162cf729fb04d257413a45aa98334485bc3629b74a1b45dc1b2709930.exe 31 PID 1992 wrote to memory of 1204 1992 4e20a9e162cf729fb04d257413a45aa98334485bc3629b74a1b45dc1b2709930.exe 31 PID 1992 wrote to memory of 1204 1992 4e20a9e162cf729fb04d257413a45aa98334485bc3629b74a1b45dc1b2709930.exe 31 PID 1992 wrote to memory of 1204 1992 4e20a9e162cf729fb04d257413a45aa98334485bc3629b74a1b45dc1b2709930.exe 31 PID 1540 wrote to memory of 2004 1540 cmd.exe 33 PID 1540 wrote to memory of 2004 1540 cmd.exe 33 PID 1540 wrote to memory of 2004 1540 cmd.exe 33 PID 1540 wrote to memory of 2004 1540 cmd.exe 33 PID 1540 wrote to memory of 572 1540 cmd.exe 34 PID 1540 wrote to memory of 572 1540 cmd.exe 34 PID 1540 wrote to memory of 572 1540 cmd.exe 34 PID 1540 wrote to memory of 572 1540 cmd.exe 34 PID 1540 wrote to memory of 572 1540 cmd.exe 34 PID 1540 wrote to memory of 572 1540 cmd.exe 34 PID 1540 wrote to memory of 572 1540 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e20a9e162cf729fb04d257413a45aa98334485bc3629b74a1b45dc1b2709930.exe"C:\Users\Admin\AppData\Local\Temp\4e20a9e162cf729fb04d257413a45aa98334485bc3629b74a1b45dc1b2709930.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\4e20a9e162cf729fb04d257413a45aa98334485bc3629b74a1b45dc1b2709930.exe"C:\Users\Admin\AppData\Local\Temp\4e20a9e162cf729fb04d257413a45aa98334485bc3629b74a1b45dc1b2709930.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Start.bat3⤵
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Associations /v ModRiskFileTypes /t REG_SZ /d .exe /f4⤵
- Modifies registry key
PID:2004
-
-
C:\Windows\SysWOW64\gpupdate.exegpupdate /force4⤵PID:572
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\jnduf.bat2⤵
- Deletes itself
PID:1204
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200B
MD59cedeb0b293d2b5491225ef3d9eb2a8b
SHA1b607ef9bd319b6ec696c8dab8a314998d133298b
SHA2563fc59706783a0778da9121da52a63e34e47c82f436d5b14943e14fb418fd4f08
SHA512ec7d4544e32b1ea460895b1037a9eca2529eed45d6ee1644f83dfc4d4ad8f7c32a811ee4627bc6b243fb5d5c9e3e2b22060d6a2903692830ff1f114d2b9f3cfc
-
Filesize
341B
MD5baad9bb84e0165abb525652f5efdd283
SHA1936b37d3370b657ed3fba676afc6b7205efed5d9
SHA2567d80d0c7e937d1de6dd48bedc084d23caaab9c63f8800d6088638bbb29a0b445
SHA51221d828f9a8b422459b5202ff7b7ab2efe51424363dd30358d44fa47dacb4cdd921aab2f9ca2f98b03de3e8d58f26d2f2674907d3b0ccd5fab94b2ab8dff9407d
-
Filesize
839KB
MD5bdbb57d24c2d4c5056f1f83625e03ae1
SHA11c9c33663137ea891f4ebd058ff82cc1b01c12cb
SHA256998fd248995f71f05ed9c1ad94297c5e0c8e3bdf58753d378adf824df644d91c
SHA5123465aa9e01ac7bfdcf65e30c877f00eec93deb63729e2501a7656beeb47400de3eb3f16b4a788fd5c128ed77735f420adc23d51c770cc95f75d6134112e04db0