Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    2s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2022, 01:21

General

  • Target

    file.exe

  • Size

    260KB

  • MD5

    0977d24926bb7054965077aa47ae6eb9

  • SHA1

    2b257a3bd6e16788458ee4223ec8d0ebc3a8eea3

  • SHA256

    07699f780ad559ab0a8410f80033750202604736840d7880a11b37253dec5977

  • SHA512

    3fca1acce75d60239fa0373ac5608221294571c44e10fbe7cc92b7d9e01af4cd8e1a8e94fcb654c795a6c8b64aebb85535527b8f092f922b9385ec4e6f64ad7d

  • SSDEEP

    3072:/PiD0BaXzLdQlU/z5d3mt3pVaDhFVIVQC0ODopk3jf80Cxet1nsM/h3:g0BUzLqlFpVaDnVO0Ookz2x0ns

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
      PID:1436
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\haeojzfz\
        2⤵
          PID:1828
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\zprevny.exe" C:\Windows\SysWOW64\haeojzfz\
          2⤵
            PID:2040
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" create haeojzfz binPath= "C:\Windows\SysWOW64\haeojzfz\zprevny.exe /d\"C:\Users\Admin\AppData\Local\Temp\file.exe\"" type= own start= auto DisplayName= "wifi support"
            2⤵
            • Launches sc.exe
            PID:1744
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" description haeojzfz "wifi internet conection"
            2⤵
            • Launches sc.exe
            PID:952
          • C:\Windows\SysWOW64\sc.exe
            "C:\Windows\System32\sc.exe" start haeojzfz
            2⤵
            • Launches sc.exe
            PID:1300
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul
            2⤵
            • Modifies Windows Firewall
            PID:272
        • C:\Windows\SysWOW64\haeojzfz\zprevny.exe
          C:\Windows\SysWOW64\haeojzfz\zprevny.exe /d"C:\Users\Admin\AppData\Local\Temp\file.exe"
          1⤵
            PID:1396

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\zprevny.exe

            Filesize

            69KB

            MD5

            a89d000d67e538fc2ee167fe8272e006

            SHA1

            959f7dcb846c68f806637863572adbfba5098c22

            SHA256

            d59fdacc3a16fcc139d771e31285ff42fc994b0f9c27890c0852d7c7675c4536

            SHA512

            8c130ddb7dddabefea4124a4227344fd00822ad3ee8527fb276b2f4f35edc7e9e8f33284160c3297adfa37b8d3240b469aa4f48122fe14dec57e33e44bd56bd7

          • C:\Windows\SysWOW64\haeojzfz\zprevny.exe

            Filesize

            35KB

            MD5

            b0a619b6598dbc063d7a6d51e906e527

            SHA1

            bcc2e6e46a6c1a57aea4690a006ed29bc3e21043

            SHA256

            79c00bec64a32c3606bb1bc8b866437ff4104c68c9faf0cb8b655af3a9ee2d08

            SHA512

            0ac029d8f1d3d530b5898ef1632864ec129368a082bc95796699aa08830b066de575fe57de659097ebe67e29fec2cdceea793b7c0d642878b9baaf90a6a1ddfc

          • memory/1436-56-0x0000000002D6A000-0x0000000002D7F000-memory.dmp

            Filesize

            84KB

          • memory/1436-58-0x0000000000400000-0x0000000002C2F000-memory.dmp

            Filesize

            40.2MB

          • memory/1436-54-0x0000000075601000-0x0000000075603000-memory.dmp

            Filesize

            8KB

          • memory/1436-57-0x0000000000220000-0x0000000000233000-memory.dmp

            Filesize

            76KB

          • memory/1436-66-0x0000000002D6A000-0x0000000002D7F000-memory.dmp

            Filesize

            84KB