Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
45s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
28/10/2022, 23:02
Static task
static1
Behavioral task
behavioral1
Sample
343fd75cc563092616b48e1cad539096fc8250edbefa33f9671b02ca8545aa56.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
343fd75cc563092616b48e1cad539096fc8250edbefa33f9671b02ca8545aa56.exe
Resource
win10v2004-20220812-en
General
-
Target
343fd75cc563092616b48e1cad539096fc8250edbefa33f9671b02ca8545aa56.exe
-
Size
56KB
-
MD5
0b9c1f968f404134eea415ca658ae4aa
-
SHA1
63b782e7ee953ed909e78d13ed255daef91a846e
-
SHA256
343fd75cc563092616b48e1cad539096fc8250edbefa33f9671b02ca8545aa56
-
SHA512
36a0ae6b78a6676e17bdf6717016cc426d813f50e3587f81ec63baf69862431e202729599a70a7bebeb1214b51cde4a5a5cdb1b203bb7121eb72cf0060666514
-
SSDEEP
1536:Qgk0lJWdVExI1hY6CDUDQSC+gk0lJWdVExI1hY6CDUDQSqQ:q0lmVQI1hYrunCo0lmVQI1hYrunqQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1100 ntldr.exe -
Loads dropped DLL 6 IoCs
pid Process 1200 343fd75cc563092616b48e1cad539096fc8250edbefa33f9671b02ca8545aa56.exe 1200 343fd75cc563092616b48e1cad539096fc8250edbefa33f9671b02ca8545aa56.exe 2024 WerFault.exe 2024 WerFault.exe 2024 WerFault.exe 2024 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 343fd75cc563092616b48e1cad539096fc8250edbefa33f9671b02ca8545aa56.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NT4 hosting service = "C:\\Windows\\system32\\ntldr.exe" 343fd75cc563092616b48e1cad539096fc8250edbefa33f9671b02ca8545aa56.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run ntldr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NT4 hosting service = "C:\\Windows\\system32\\ntldr.exe" ntldr.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\ntldr.exe ntldr.exe File opened for modification C:\Windows\SysWOW64\ntldr.exe 343fd75cc563092616b48e1cad539096fc8250edbefa33f9671b02ca8545aa56.exe File created C:\Windows\SysWOW64\ntldr.exe 343fd75cc563092616b48e1cad539096fc8250edbefa33f9671b02ca8545aa56.exe File opened for modification C:\Windows\SysWOW64\RCX197B.tmp 343fd75cc563092616b48e1cad539096fc8250edbefa33f9671b02ca8545aa56.exe File opened for modification C:\Windows\SysWOW64\ntldr.exe ntldr.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 268 1200 WerFault.exe 26 2024 1100 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1200 wrote to memory of 1100 1200 343fd75cc563092616b48e1cad539096fc8250edbefa33f9671b02ca8545aa56.exe 27 PID 1200 wrote to memory of 1100 1200 343fd75cc563092616b48e1cad539096fc8250edbefa33f9671b02ca8545aa56.exe 27 PID 1200 wrote to memory of 1100 1200 343fd75cc563092616b48e1cad539096fc8250edbefa33f9671b02ca8545aa56.exe 27 PID 1200 wrote to memory of 1100 1200 343fd75cc563092616b48e1cad539096fc8250edbefa33f9671b02ca8545aa56.exe 27 PID 1200 wrote to memory of 268 1200 343fd75cc563092616b48e1cad539096fc8250edbefa33f9671b02ca8545aa56.exe 28 PID 1200 wrote to memory of 268 1200 343fd75cc563092616b48e1cad539096fc8250edbefa33f9671b02ca8545aa56.exe 28 PID 1200 wrote to memory of 268 1200 343fd75cc563092616b48e1cad539096fc8250edbefa33f9671b02ca8545aa56.exe 28 PID 1200 wrote to memory of 268 1200 343fd75cc563092616b48e1cad539096fc8250edbefa33f9671b02ca8545aa56.exe 28 PID 1100 wrote to memory of 2024 1100 ntldr.exe 29 PID 1100 wrote to memory of 2024 1100 ntldr.exe 29 PID 1100 wrote to memory of 2024 1100 ntldr.exe 29 PID 1100 wrote to memory of 2024 1100 ntldr.exe 29 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 343fd75cc563092616b48e1cad539096fc8250edbefa33f9671b02ca8545aa56.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveAutoRun = "0" 343fd75cc563092616b48e1cad539096fc8250edbefa33f9671b02ca8545aa56.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "0" 343fd75cc563092616b48e1cad539096fc8250edbefa33f9671b02ca8545aa56.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer ntldr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveAutoRun = "0" ntldr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "0" ntldr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\343fd75cc563092616b48e1cad539096fc8250edbefa33f9671b02ca8545aa56.exe"C:\Users\Admin\AppData\Local\Temp\343fd75cc563092616b48e1cad539096fc8250edbefa33f9671b02ca8545aa56.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1200 -
C:\Windows\SysWOW64\ntldr.exe"C:\Windows\system32\ntldr.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1100 -s 1163⤵
- Loads dropped DLL
- Program crash
PID:2024
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1200 -s 1162⤵
- Program crash
PID:268
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD545d6e9d9640bbe2647d907e543b5cfb3
SHA1f343dcc032f7c287b1f7c47d75280e961c579129
SHA256d81b6465f323347d3474e4a89d4da28f750ec106554e57729def2e2be07062cc
SHA512608759a95bc6375c677e32486b41d15d6c5d9f9a5b7e2623d1331d13eea982786dfeae17da4b576b504e8419f833e3789d185898ae067eafe5286b0069c97f9f
-
Filesize
24KB
MD545d6e9d9640bbe2647d907e543b5cfb3
SHA1f343dcc032f7c287b1f7c47d75280e961c579129
SHA256d81b6465f323347d3474e4a89d4da28f750ec106554e57729def2e2be07062cc
SHA512608759a95bc6375c677e32486b41d15d6c5d9f9a5b7e2623d1331d13eea982786dfeae17da4b576b504e8419f833e3789d185898ae067eafe5286b0069c97f9f
-
Filesize
24KB
MD545d6e9d9640bbe2647d907e543b5cfb3
SHA1f343dcc032f7c287b1f7c47d75280e961c579129
SHA256d81b6465f323347d3474e4a89d4da28f750ec106554e57729def2e2be07062cc
SHA512608759a95bc6375c677e32486b41d15d6c5d9f9a5b7e2623d1331d13eea982786dfeae17da4b576b504e8419f833e3789d185898ae067eafe5286b0069c97f9f
-
Filesize
24KB
MD545d6e9d9640bbe2647d907e543b5cfb3
SHA1f343dcc032f7c287b1f7c47d75280e961c579129
SHA256d81b6465f323347d3474e4a89d4da28f750ec106554e57729def2e2be07062cc
SHA512608759a95bc6375c677e32486b41d15d6c5d9f9a5b7e2623d1331d13eea982786dfeae17da4b576b504e8419f833e3789d185898ae067eafe5286b0069c97f9f
-
Filesize
24KB
MD545d6e9d9640bbe2647d907e543b5cfb3
SHA1f343dcc032f7c287b1f7c47d75280e961c579129
SHA256d81b6465f323347d3474e4a89d4da28f750ec106554e57729def2e2be07062cc
SHA512608759a95bc6375c677e32486b41d15d6c5d9f9a5b7e2623d1331d13eea982786dfeae17da4b576b504e8419f833e3789d185898ae067eafe5286b0069c97f9f
-
Filesize
24KB
MD545d6e9d9640bbe2647d907e543b5cfb3
SHA1f343dcc032f7c287b1f7c47d75280e961c579129
SHA256d81b6465f323347d3474e4a89d4da28f750ec106554e57729def2e2be07062cc
SHA512608759a95bc6375c677e32486b41d15d6c5d9f9a5b7e2623d1331d13eea982786dfeae17da4b576b504e8419f833e3789d185898ae067eafe5286b0069c97f9f
-
Filesize
24KB
MD545d6e9d9640bbe2647d907e543b5cfb3
SHA1f343dcc032f7c287b1f7c47d75280e961c579129
SHA256d81b6465f323347d3474e4a89d4da28f750ec106554e57729def2e2be07062cc
SHA512608759a95bc6375c677e32486b41d15d6c5d9f9a5b7e2623d1331d13eea982786dfeae17da4b576b504e8419f833e3789d185898ae067eafe5286b0069c97f9f
-
Filesize
24KB
MD545d6e9d9640bbe2647d907e543b5cfb3
SHA1f343dcc032f7c287b1f7c47d75280e961c579129
SHA256d81b6465f323347d3474e4a89d4da28f750ec106554e57729def2e2be07062cc
SHA512608759a95bc6375c677e32486b41d15d6c5d9f9a5b7e2623d1331d13eea982786dfeae17da4b576b504e8419f833e3789d185898ae067eafe5286b0069c97f9f