Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
20s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 17:25 UTC
Static task
static1
Behavioral task
behavioral1
Sample
455a6f589061a7e546ca427fefcd40b03e1b88cba9e2b1625b899ce6f59ded42.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
455a6f589061a7e546ca427fefcd40b03e1b88cba9e2b1625b899ce6f59ded42.exe
Resource
win10v2004-20220812-en
General
-
Target
455a6f589061a7e546ca427fefcd40b03e1b88cba9e2b1625b899ce6f59ded42.exe
-
Size
380KB
-
MD5
57d27b148b912ecb55bb811f51848a60
-
SHA1
34ef8b32a0d57c52da584159d54127bc3b8ac14d
-
SHA256
455a6f589061a7e546ca427fefcd40b03e1b88cba9e2b1625b899ce6f59ded42
-
SHA512
2bf738f454def8d1ee835067f85a3d14a0effb4d011281b51b0c076d31051399f45576fbba6388ba44b46783e89809095050e7368235616ea2b62ed8893beb8b
-
SSDEEP
6144:zv3AWPlKALXqo1jmUZxL6xQGQm9UmM7I+6cwv4Yw+/YOHXYJn:z/AWxLXqs76ve7I+Lyk+/XY
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x000c0000000054a8-56.dat aspack_v212_v242 behavioral1/files/0x000c0000000054a8-59.dat aspack_v212_v242 behavioral1/files/0x0009000000012326-65.dat aspack_v212_v242 behavioral1/files/0x000a000000012319-68.dat aspack_v212_v242 behavioral1/files/0x000a000000012319-69.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 936 08e206ce.exe -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibility.dll" 08e206ce.exe -
resource yara_rule behavioral1/files/0x000c0000000054a8-56.dat upx behavioral1/memory/936-64-0x00000000002A0000-0x00000000002C6000-memory.dmp upx behavioral1/memory/936-61-0x00000000002A0000-0x00000000002C6000-memory.dmp upx behavioral1/files/0x000c0000000054a8-59.dat upx behavioral1/files/0x0009000000012326-65.dat upx behavioral1/files/0x000a000000012319-68.dat upx behavioral1/memory/936-75-0x00000000002A0000-0x00000000002C6000-memory.dmp upx behavioral1/memory/1128-74-0x0000000075330000-0x0000000075356000-memory.dmp upx behavioral1/memory/1128-72-0x0000000075330000-0x0000000075356000-memory.dmp upx behavioral1/memory/1128-71-0x0000000075330000-0x0000000075356000-memory.dmp upx behavioral1/files/0x000a000000012319-69.dat upx -
Loads dropped DLL 2 IoCs
pid Process 936 08e206ce.exe 1128 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibility.dll 08e206ce.exe File opened for modification C:\Windows\SysWOW64\7C80057C.tmp 08e206ce.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 964 2032 WerFault.exe 12 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 936 08e206ce.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2032 wrote to memory of 936 2032 455a6f589061a7e546ca427fefcd40b03e1b88cba9e2b1625b899ce6f59ded42.exe 26 PID 2032 wrote to memory of 936 2032 455a6f589061a7e546ca427fefcd40b03e1b88cba9e2b1625b899ce6f59ded42.exe 26 PID 2032 wrote to memory of 936 2032 455a6f589061a7e546ca427fefcd40b03e1b88cba9e2b1625b899ce6f59ded42.exe 26 PID 2032 wrote to memory of 936 2032 455a6f589061a7e546ca427fefcd40b03e1b88cba9e2b1625b899ce6f59ded42.exe 26 PID 2032 wrote to memory of 936 2032 455a6f589061a7e546ca427fefcd40b03e1b88cba9e2b1625b899ce6f59ded42.exe 26 PID 2032 wrote to memory of 936 2032 455a6f589061a7e546ca427fefcd40b03e1b88cba9e2b1625b899ce6f59ded42.exe 26 PID 2032 wrote to memory of 936 2032 455a6f589061a7e546ca427fefcd40b03e1b88cba9e2b1625b899ce6f59ded42.exe 26 PID 2032 wrote to memory of 964 2032 455a6f589061a7e546ca427fefcd40b03e1b88cba9e2b1625b899ce6f59ded42.exe 30 PID 2032 wrote to memory of 964 2032 455a6f589061a7e546ca427fefcd40b03e1b88cba9e2b1625b899ce6f59ded42.exe 30 PID 2032 wrote to memory of 964 2032 455a6f589061a7e546ca427fefcd40b03e1b88cba9e2b1625b899ce6f59ded42.exe 30 PID 2032 wrote to memory of 964 2032 455a6f589061a7e546ca427fefcd40b03e1b88cba9e2b1625b899ce6f59ded42.exe 30 PID 2032 wrote to memory of 964 2032 455a6f589061a7e546ca427fefcd40b03e1b88cba9e2b1625b899ce6f59ded42.exe 30 PID 2032 wrote to memory of 964 2032 455a6f589061a7e546ca427fefcd40b03e1b88cba9e2b1625b899ce6f59ded42.exe 30 PID 2032 wrote to memory of 964 2032 455a6f589061a7e546ca427fefcd40b03e1b88cba9e2b1625b899ce6f59ded42.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\455a6f589061a7e546ca427fefcd40b03e1b88cba9e2b1625b899ce6f59ded42.exe"C:\Users\Admin\AppData\Local\Temp\455a6f589061a7e546ca427fefcd40b03e1b88cba9e2b1625b899ce6f59ded42.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\08e206ce.exeC:\08e206ce.exe2⤵
- Executes dropped EXE
- Sets DLL path for service in the registry
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 2562⤵
- Program crash
PID:964
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
PID:1128
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD55fc1a7fd168d8ff7329d428127451ee2
SHA11ef1777fa9ac1eb70f9473af5208d9a91a1fe1f9
SHA256cddfa0352d36b9335d39ae39c28dccf1c7ed661816b431e19ae876dc2c6636b0
SHA5126f2ec89b0ee8e26a10ed96718e4e2566725511ede4fadace5a280730ea99347b4248eac2b26e3d1cf1c1ac4be9dcb9cc8240912ab8b24173612b3daa7a47a819
-
Filesize
96KB
MD55fc1a7fd168d8ff7329d428127451ee2
SHA11ef1777fa9ac1eb70f9473af5208d9a91a1fe1f9
SHA256cddfa0352d36b9335d39ae39c28dccf1c7ed661816b431e19ae876dc2c6636b0
SHA5126f2ec89b0ee8e26a10ed96718e4e2566725511ede4fadace5a280730ea99347b4248eac2b26e3d1cf1c1ac4be9dcb9cc8240912ab8b24173612b3daa7a47a819
-
Filesize
720B
MD50f6a13e94fa07d2b6301ee660e2f588b
SHA10909ee4125ef6505af7589d3065d90b02b1943d3
SHA256ae906feda28bb89ef4e0fe2d7cf87ab67aa6cf3402dff0192ce6a18a27d5adad
SHA512b202ccabe13ed741728ab9f7554bd64d9da274daeb87ba7ec4812ff571f77c1e615639cbac1567695f25fcdbccb07175d05efbca64e079a21c71d9463134c8e7
-
Filesize
96KB
MD5f80815ff6725e01c204d1a4d245f87e2
SHA1629779a2cf984a3e0968287b54b875e20a4dff8d
SHA2569bde7a3eff6b1d858df3aa33960b15799058673011cab8e754215064ef48522c
SHA5125b91dc8eee77d9e3deb409bd20aa0533c9cd6ee7f0256c85e6b8294d6edb344e14f10e1312e507b89fcb2df8afb4b71eaad3737435225a77c4a86d7b3ebc89ef
-
Filesize
96KB
MD5f80815ff6725e01c204d1a4d245f87e2
SHA1629779a2cf984a3e0968287b54b875e20a4dff8d
SHA2569bde7a3eff6b1d858df3aa33960b15799058673011cab8e754215064ef48522c
SHA5125b91dc8eee77d9e3deb409bd20aa0533c9cd6ee7f0256c85e6b8294d6edb344e14f10e1312e507b89fcb2df8afb4b71eaad3737435225a77c4a86d7b3ebc89ef
-
Filesize
96KB
MD5f80815ff6725e01c204d1a4d245f87e2
SHA1629779a2cf984a3e0968287b54b875e20a4dff8d
SHA2569bde7a3eff6b1d858df3aa33960b15799058673011cab8e754215064ef48522c
SHA5125b91dc8eee77d9e3deb409bd20aa0533c9cd6ee7f0256c85e6b8294d6edb344e14f10e1312e507b89fcb2df8afb4b71eaad3737435225a77c4a86d7b3ebc89ef