Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 14:37
Static task
static1
Behavioral task
behavioral1
Sample
123ae743ccbf905187620ee0ab2001f08f8acdc71acfe2f69e4bf02f4baf0d14.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
123ae743ccbf905187620ee0ab2001f08f8acdc71acfe2f69e4bf02f4baf0d14.exe
Resource
win10v2004-20220901-en
General
-
Target
123ae743ccbf905187620ee0ab2001f08f8acdc71acfe2f69e4bf02f4baf0d14.exe
-
Size
1.2MB
-
MD5
0c8dd25922ae9fbee0ebae04de6492f0
-
SHA1
4860fc7464f347af7b7930a71b2cb9a84001d3cf
-
SHA256
123ae743ccbf905187620ee0ab2001f08f8acdc71acfe2f69e4bf02f4baf0d14
-
SHA512
ba19cb3c0d33b665acdbc6099602c25b8d64d379c0be49e18d92b802320cb99998d2665c2c0977b365e62416e2efc4b809c9032f7ab98d53226d4a49e43da9e1
-
SSDEEP
12288:1cwUADV+rMO8IrRiFz5dZYMUQPQvGzbsE9Q6V3rQbUp:TbgrMz8R25UPQPdDKcIU
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 572 v3QP1ghvLM2t.exe 1584 v3QP1ghvLM2t.exe -
Deletes itself 1 IoCs
pid Process 1584 v3QP1ghvLM2t.exe -
Loads dropped DLL 4 IoCs
pid Process 940 123ae743ccbf905187620ee0ab2001f08f8acdc71acfe2f69e4bf02f4baf0d14.exe 940 123ae743ccbf905187620ee0ab2001f08f8acdc71acfe2f69e4bf02f4baf0d14.exe 940 123ae743ccbf905187620ee0ab2001f08f8acdc71acfe2f69e4bf02f4baf0d14.exe 1584 v3QP1ghvLM2t.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run 123ae743ccbf905187620ee0ab2001f08f8acdc71acfe2f69e4bf02f4baf0d14.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\YRqzwx1Y = "C:\\ProgramData\\E5avvHTyvj\\v3QP1ghvLM2t.exe" 123ae743ccbf905187620ee0ab2001f08f8acdc71acfe2f69e4bf02f4baf0d14.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1604 set thread context of 940 1604 123ae743ccbf905187620ee0ab2001f08f8acdc71acfe2f69e4bf02f4baf0d14.exe 27 PID 572 set thread context of 1584 572 v3QP1ghvLM2t.exe 29 PID 1584 set thread context of 1800 1584 v3QP1ghvLM2t.exe 30 -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1604 wrote to memory of 940 1604 123ae743ccbf905187620ee0ab2001f08f8acdc71acfe2f69e4bf02f4baf0d14.exe 27 PID 1604 wrote to memory of 940 1604 123ae743ccbf905187620ee0ab2001f08f8acdc71acfe2f69e4bf02f4baf0d14.exe 27 PID 1604 wrote to memory of 940 1604 123ae743ccbf905187620ee0ab2001f08f8acdc71acfe2f69e4bf02f4baf0d14.exe 27 PID 1604 wrote to memory of 940 1604 123ae743ccbf905187620ee0ab2001f08f8acdc71acfe2f69e4bf02f4baf0d14.exe 27 PID 1604 wrote to memory of 940 1604 123ae743ccbf905187620ee0ab2001f08f8acdc71acfe2f69e4bf02f4baf0d14.exe 27 PID 1604 wrote to memory of 940 1604 123ae743ccbf905187620ee0ab2001f08f8acdc71acfe2f69e4bf02f4baf0d14.exe 27 PID 940 wrote to memory of 572 940 123ae743ccbf905187620ee0ab2001f08f8acdc71acfe2f69e4bf02f4baf0d14.exe 28 PID 940 wrote to memory of 572 940 123ae743ccbf905187620ee0ab2001f08f8acdc71acfe2f69e4bf02f4baf0d14.exe 28 PID 940 wrote to memory of 572 940 123ae743ccbf905187620ee0ab2001f08f8acdc71acfe2f69e4bf02f4baf0d14.exe 28 PID 940 wrote to memory of 572 940 123ae743ccbf905187620ee0ab2001f08f8acdc71acfe2f69e4bf02f4baf0d14.exe 28 PID 572 wrote to memory of 1584 572 v3QP1ghvLM2t.exe 29 PID 572 wrote to memory of 1584 572 v3QP1ghvLM2t.exe 29 PID 572 wrote to memory of 1584 572 v3QP1ghvLM2t.exe 29 PID 572 wrote to memory of 1584 572 v3QP1ghvLM2t.exe 29 PID 572 wrote to memory of 1584 572 v3QP1ghvLM2t.exe 29 PID 572 wrote to memory of 1584 572 v3QP1ghvLM2t.exe 29 PID 1584 wrote to memory of 1800 1584 v3QP1ghvLM2t.exe 30 PID 1584 wrote to memory of 1800 1584 v3QP1ghvLM2t.exe 30 PID 1584 wrote to memory of 1800 1584 v3QP1ghvLM2t.exe 30 PID 1584 wrote to memory of 1800 1584 v3QP1ghvLM2t.exe 30 PID 1584 wrote to memory of 1800 1584 v3QP1ghvLM2t.exe 30 PID 1584 wrote to memory of 1800 1584 v3QP1ghvLM2t.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\123ae743ccbf905187620ee0ab2001f08f8acdc71acfe2f69e4bf02f4baf0d14.exe"C:\Users\Admin\AppData\Local\Temp\123ae743ccbf905187620ee0ab2001f08f8acdc71acfe2f69e4bf02f4baf0d14.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\123ae743ccbf905187620ee0ab2001f08f8acdc71acfe2f69e4bf02f4baf0d14.exe"C:\Users\Admin\AppData\Local\Temp\123ae743ccbf905187620ee0ab2001f08f8acdc71acfe2f69e4bf02f4baf0d14.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:940 -
C:\ProgramData\E5avvHTyvj\v3QP1ghvLM2t.exe"C:\ProgramData\E5avvHTyvj\v3QP1ghvLM2t.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:572 -
C:\ProgramData\E5avvHTyvj\v3QP1ghvLM2t.exe"C:\ProgramData\E5avvHTyvj\v3QP1ghvLM2t.exe"4⤵
- Executes dropped EXE
- Deletes itself
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Program Files (x86)\Windows Mail\wabmig.exe"C:\Program Files (x86)\Windows Mail\wabmig.exe" /i:15845⤵PID:1800
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5ff41d1fb0a012d4a01e758905fd7987e
SHA19ba789521dadb48e9c93a7902c24a006a3d0b763
SHA256bb10997aaa1ba64f170547c15a98e2981ec059baa5081392696aab61c982381d
SHA5127bc410a4c812f40a546d62222c94256fa2b649e91407efab1802b0664d428860b2efe04cdb5659bd69847596a60b5bc144b162c4706bb0ed666bad687052ee6b
-
Filesize
1.2MB
MD5ff41d1fb0a012d4a01e758905fd7987e
SHA19ba789521dadb48e9c93a7902c24a006a3d0b763
SHA256bb10997aaa1ba64f170547c15a98e2981ec059baa5081392696aab61c982381d
SHA5127bc410a4c812f40a546d62222c94256fa2b649e91407efab1802b0664d428860b2efe04cdb5659bd69847596a60b5bc144b162c4706bb0ed666bad687052ee6b
-
Filesize
1.2MB
MD5ff41d1fb0a012d4a01e758905fd7987e
SHA19ba789521dadb48e9c93a7902c24a006a3d0b763
SHA256bb10997aaa1ba64f170547c15a98e2981ec059baa5081392696aab61c982381d
SHA5127bc410a4c812f40a546d62222c94256fa2b649e91407efab1802b0664d428860b2efe04cdb5659bd69847596a60b5bc144b162c4706bb0ed666bad687052ee6b
-
Filesize
1.2MB
MD5ff41d1fb0a012d4a01e758905fd7987e
SHA19ba789521dadb48e9c93a7902c24a006a3d0b763
SHA256bb10997aaa1ba64f170547c15a98e2981ec059baa5081392696aab61c982381d
SHA5127bc410a4c812f40a546d62222c94256fa2b649e91407efab1802b0664d428860b2efe04cdb5659bd69847596a60b5bc144b162c4706bb0ed666bad687052ee6b
-
Filesize
1.2MB
MD5ff41d1fb0a012d4a01e758905fd7987e
SHA19ba789521dadb48e9c93a7902c24a006a3d0b763
SHA256bb10997aaa1ba64f170547c15a98e2981ec059baa5081392696aab61c982381d
SHA5127bc410a4c812f40a546d62222c94256fa2b649e91407efab1802b0664d428860b2efe04cdb5659bd69847596a60b5bc144b162c4706bb0ed666bad687052ee6b
-
Filesize
1.2MB
MD50c8dd25922ae9fbee0ebae04de6492f0
SHA14860fc7464f347af7b7930a71b2cb9a84001d3cf
SHA256123ae743ccbf905187620ee0ab2001f08f8acdc71acfe2f69e4bf02f4baf0d14
SHA512ba19cb3c0d33b665acdbc6099602c25b8d64d379c0be49e18d92b802320cb99998d2665c2c0977b365e62416e2efc4b809c9032f7ab98d53226d4a49e43da9e1
-
Filesize
1.2MB
MD5ff41d1fb0a012d4a01e758905fd7987e
SHA19ba789521dadb48e9c93a7902c24a006a3d0b763
SHA256bb10997aaa1ba64f170547c15a98e2981ec059baa5081392696aab61c982381d
SHA5127bc410a4c812f40a546d62222c94256fa2b649e91407efab1802b0664d428860b2efe04cdb5659bd69847596a60b5bc144b162c4706bb0ed666bad687052ee6b