Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 23:29
Static task
static1
Behavioral task
behavioral1
Sample
2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034.exe
Resource
win10v2004-20220901-en
General
-
Target
2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034.exe
-
Size
340KB
-
MD5
a16b1f5ae255409158a60935dc90c810
-
SHA1
efac89a158a56cedabccf260b110aeb72c360b4e
-
SHA256
2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034
-
SHA512
5db2d89d67cb10acd92c35e0858c705944f4023ab6a085684ec8325db1423052aaba3f3627f46b09af807e053faf4354d67c71494b4fd3e627c386cc644daa61
-
SSDEEP
6144:2wwsXDz6A5+OEXE1Vxo8ISv+CgLNWLEXE1Vxo8ISvG:GeDz6y+kjxo8ISXgJW7jxo8ISO
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1348 MSWDM.EXE 1444 MSWDM.EXE 1128 2A8DEC3766BB42E48DE7712512E909B7DA766FE5728C622F1E2E9530F9BA7034.EXE 1820 MSWDM.EXE -
Loads dropped DLL 1 IoCs
pid Process 1444 MSWDM.EXE -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices 2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\dev52E2.tmp MSWDM.EXE File created C:\WINDOWS\MSWDM.EXE 2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034.exe File opened for modification C:\Windows\dev52E2.tmp 2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1444 MSWDM.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1640 wrote to memory of 1348 1640 2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034.exe 27 PID 1640 wrote to memory of 1348 1640 2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034.exe 27 PID 1640 wrote to memory of 1348 1640 2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034.exe 27 PID 1640 wrote to memory of 1348 1640 2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034.exe 27 PID 1640 wrote to memory of 1444 1640 2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034.exe 28 PID 1640 wrote to memory of 1444 1640 2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034.exe 28 PID 1640 wrote to memory of 1444 1640 2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034.exe 28 PID 1640 wrote to memory of 1444 1640 2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034.exe 28 PID 1444 wrote to memory of 1128 1444 MSWDM.EXE 29 PID 1444 wrote to memory of 1128 1444 MSWDM.EXE 29 PID 1444 wrote to memory of 1128 1444 MSWDM.EXE 29 PID 1444 wrote to memory of 1128 1444 MSWDM.EXE 29 PID 1444 wrote to memory of 1820 1444 MSWDM.EXE 30 PID 1444 wrote to memory of 1820 1444 MSWDM.EXE 30 PID 1444 wrote to memory of 1820 1444 MSWDM.EXE 30 PID 1444 wrote to memory of 1820 1444 MSWDM.EXE 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034.exe"C:\Users\Admin\AppData\Local\Temp\2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1348
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev52E2.tmp!C:\Users\Admin\AppData\Local\Temp\2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\2A8DEC3766BB42E48DE7712512E909B7DA766FE5728C622F1E2E9530F9BA7034.EXE
- Executes dropped EXE
PID:1128
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev52E2.tmp!C:\Users\Admin\AppData\Local\Temp\2A8DEC3766BB42E48DE7712512E909B7DA766FE5728C622F1E2E9530F9BA7034.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1820
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\2A8DEC3766BB42E48DE7712512E909B7DA766FE5728C622F1E2E9530F9BA7034.EXE
Filesize340KB
MD5872cf8a054788a023e759c944558a7dd
SHA119a3193a1dcd814e28a59c19f4e829db89da49f6
SHA2567710e4d3762ef3fe651967ef1ca730c33558c2886bb6a4dbdced511e889fbb4a
SHA51249656ad67aeb2d62324f74a0532804fad882140ab820e48078e08a734678fecd0477ff6fd7574cc1bfba81d810d78a98bf59fd311e7cbd2a41004881faea3b4d
-
C:\Users\Admin\AppData\Local\Temp\2A8DEC3766BB42E48DE7712512E909B7DA766FE5728C622F1E2E9530F9BA7034.EXE
Filesize340KB
MD5872cf8a054788a023e759c944558a7dd
SHA119a3193a1dcd814e28a59c19f4e829db89da49f6
SHA2567710e4d3762ef3fe651967ef1ca730c33558c2886bb6a4dbdced511e889fbb4a
SHA51249656ad67aeb2d62324f74a0532804fad882140ab820e48078e08a734678fecd0477ff6fd7574cc1bfba81d810d78a98bf59fd311e7cbd2a41004881faea3b4d
-
C:\Users\Admin\AppData\Local\Temp\2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034.exe
Filesize300KB
MD5a6d64056ad6ca84534143757fd782d7a
SHA119e365305ceabad649ed67278587d2f80b94c78e
SHA2563bc9afaf7574b6d5abbbd11b571aae45abd24fc1d5691d4927444ec79dd0294b
SHA5126801ea8a1cf5f2112739bb9c5bb576b8cce4e952dcc5f2165568b80d6b80b9459f6dbda84f0db5061ca108b42c0d30d4a71ded228e1b04d4182f9f8e931afab4
-
Filesize
40KB
MD5e7fb0c65b222add4dfc4b7d6e3446dc9
SHA1beabd27b07033be8cc70b7f8e824ff07bf0971e6
SHA256aa5d36f32aaf7b642af97497641b349d0e1b52cd37096a40f8a9f142843357f2
SHA5123b434c1802c6defbeee0112f067d5368fee5ba20f2c83708a6ed20355c8e4b8b8c6ffad3a5ad69c0c4011bb1a48bd3dfb980396360d9ccf12c310a477519dd12
-
Filesize
40KB
MD5e7fb0c65b222add4dfc4b7d6e3446dc9
SHA1beabd27b07033be8cc70b7f8e824ff07bf0971e6
SHA256aa5d36f32aaf7b642af97497641b349d0e1b52cd37096a40f8a9f142843357f2
SHA5123b434c1802c6defbeee0112f067d5368fee5ba20f2c83708a6ed20355c8e4b8b8c6ffad3a5ad69c0c4011bb1a48bd3dfb980396360d9ccf12c310a477519dd12
-
Filesize
40KB
MD5e7fb0c65b222add4dfc4b7d6e3446dc9
SHA1beabd27b07033be8cc70b7f8e824ff07bf0971e6
SHA256aa5d36f32aaf7b642af97497641b349d0e1b52cd37096a40f8a9f142843357f2
SHA5123b434c1802c6defbeee0112f067d5368fee5ba20f2c83708a6ed20355c8e4b8b8c6ffad3a5ad69c0c4011bb1a48bd3dfb980396360d9ccf12c310a477519dd12
-
Filesize
40KB
MD5e7fb0c65b222add4dfc4b7d6e3446dc9
SHA1beabd27b07033be8cc70b7f8e824ff07bf0971e6
SHA256aa5d36f32aaf7b642af97497641b349d0e1b52cd37096a40f8a9f142843357f2
SHA5123b434c1802c6defbeee0112f067d5368fee5ba20f2c83708a6ed20355c8e4b8b8c6ffad3a5ad69c0c4011bb1a48bd3dfb980396360d9ccf12c310a477519dd12
-
Filesize
300KB
MD5a6d64056ad6ca84534143757fd782d7a
SHA119e365305ceabad649ed67278587d2f80b94c78e
SHA2563bc9afaf7574b6d5abbbd11b571aae45abd24fc1d5691d4927444ec79dd0294b
SHA5126801ea8a1cf5f2112739bb9c5bb576b8cce4e952dcc5f2165568b80d6b80b9459f6dbda84f0db5061ca108b42c0d30d4a71ded228e1b04d4182f9f8e931afab4
-
\Users\Admin\AppData\Local\Temp\2a8dec3766bb42e48de7712512e909b7da766fe5728c622f1e2e9530f9ba7034.exe
Filesize300KB
MD5a6d64056ad6ca84534143757fd782d7a
SHA119e365305ceabad649ed67278587d2f80b94c78e
SHA2563bc9afaf7574b6d5abbbd11b571aae45abd24fc1d5691d4927444ec79dd0294b
SHA5126801ea8a1cf5f2112739bb9c5bb576b8cce4e952dcc5f2165568b80d6b80b9459f6dbda84f0db5061ca108b42c0d30d4a71ded228e1b04d4182f9f8e931afab4