Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
46s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 05:35
Static task
static1
Behavioral task
behavioral1
Sample
1a9ee3d2a9d759ee5090bf16aa4f1476c9038b7d8ed0591fc0fd6e6c7da404bf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1a9ee3d2a9d759ee5090bf16aa4f1476c9038b7d8ed0591fc0fd6e6c7da404bf.exe
Resource
win10v2004-20220812-en
General
-
Target
1a9ee3d2a9d759ee5090bf16aa4f1476c9038b7d8ed0591fc0fd6e6c7da404bf.exe
-
Size
572KB
-
MD5
069ca0bf9211704a0fe48600eef9e1fa
-
SHA1
3a90b6be935124a2c3fd3ab5379cd97e548461ca
-
SHA256
1a9ee3d2a9d759ee5090bf16aa4f1476c9038b7d8ed0591fc0fd6e6c7da404bf
-
SHA512
9661ee93f8557c83c5dd9cd2af1f4e74ef59b2604246f04af36e3d68f6810e7795351a92268fe0f9ca7c3d9ecf276046275f9305329b8db094f1dcc8910b382b
-
SSDEEP
3072:5M2kU2g2BBXgQj5FyHTXRYGOoEDOmokHtrYr8AmUN6tuevNyZze1ZitYVjQNo/qS:5C+2BlgQjzygokNrYr8WNbYvy/t2cn
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1204 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1980 set thread context of 1988 1980 1a9ee3d2a9d759ee5090bf16aa4f1476c9038b7d8ed0591fc0fd6e6c7da404bf.exe 28 -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1292 reg.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1980 wrote to memory of 1988 1980 1a9ee3d2a9d759ee5090bf16aa4f1476c9038b7d8ed0591fc0fd6e6c7da404bf.exe 28 PID 1980 wrote to memory of 1988 1980 1a9ee3d2a9d759ee5090bf16aa4f1476c9038b7d8ed0591fc0fd6e6c7da404bf.exe 28 PID 1980 wrote to memory of 1988 1980 1a9ee3d2a9d759ee5090bf16aa4f1476c9038b7d8ed0591fc0fd6e6c7da404bf.exe 28 PID 1980 wrote to memory of 1988 1980 1a9ee3d2a9d759ee5090bf16aa4f1476c9038b7d8ed0591fc0fd6e6c7da404bf.exe 28 PID 1980 wrote to memory of 1988 1980 1a9ee3d2a9d759ee5090bf16aa4f1476c9038b7d8ed0591fc0fd6e6c7da404bf.exe 28 PID 1980 wrote to memory of 1988 1980 1a9ee3d2a9d759ee5090bf16aa4f1476c9038b7d8ed0591fc0fd6e6c7da404bf.exe 28 PID 1980 wrote to memory of 1988 1980 1a9ee3d2a9d759ee5090bf16aa4f1476c9038b7d8ed0591fc0fd6e6c7da404bf.exe 28 PID 1980 wrote to memory of 1988 1980 1a9ee3d2a9d759ee5090bf16aa4f1476c9038b7d8ed0591fc0fd6e6c7da404bf.exe 28 PID 1988 wrote to memory of 952 1988 1a9ee3d2a9d759ee5090bf16aa4f1476c9038b7d8ed0591fc0fd6e6c7da404bf.exe 29 PID 1988 wrote to memory of 952 1988 1a9ee3d2a9d759ee5090bf16aa4f1476c9038b7d8ed0591fc0fd6e6c7da404bf.exe 29 PID 1988 wrote to memory of 952 1988 1a9ee3d2a9d759ee5090bf16aa4f1476c9038b7d8ed0591fc0fd6e6c7da404bf.exe 29 PID 1988 wrote to memory of 952 1988 1a9ee3d2a9d759ee5090bf16aa4f1476c9038b7d8ed0591fc0fd6e6c7da404bf.exe 29 PID 1980 wrote to memory of 1204 1980 1a9ee3d2a9d759ee5090bf16aa4f1476c9038b7d8ed0591fc0fd6e6c7da404bf.exe 31 PID 1980 wrote to memory of 1204 1980 1a9ee3d2a9d759ee5090bf16aa4f1476c9038b7d8ed0591fc0fd6e6c7da404bf.exe 31 PID 1980 wrote to memory of 1204 1980 1a9ee3d2a9d759ee5090bf16aa4f1476c9038b7d8ed0591fc0fd6e6c7da404bf.exe 31 PID 1980 wrote to memory of 1204 1980 1a9ee3d2a9d759ee5090bf16aa4f1476c9038b7d8ed0591fc0fd6e6c7da404bf.exe 31 PID 952 wrote to memory of 1292 952 cmd.exe 33 PID 952 wrote to memory of 1292 952 cmd.exe 33 PID 952 wrote to memory of 1292 952 cmd.exe 33 PID 952 wrote to memory of 1292 952 cmd.exe 33 PID 952 wrote to memory of 644 952 cmd.exe 34 PID 952 wrote to memory of 644 952 cmd.exe 34 PID 952 wrote to memory of 644 952 cmd.exe 34 PID 952 wrote to memory of 644 952 cmd.exe 34 PID 952 wrote to memory of 644 952 cmd.exe 34 PID 952 wrote to memory of 644 952 cmd.exe 34 PID 952 wrote to memory of 644 952 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a9ee3d2a9d759ee5090bf16aa4f1476c9038b7d8ed0591fc0fd6e6c7da404bf.exe"C:\Users\Admin\AppData\Local\Temp\1a9ee3d2a9d759ee5090bf16aa4f1476c9038b7d8ed0591fc0fd6e6c7da404bf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\1a9ee3d2a9d759ee5090bf16aa4f1476c9038b7d8ed0591fc0fd6e6c7da404bf.exe"C:\Users\Admin\AppData\Local\Temp\1a9ee3d2a9d759ee5090bf16aa4f1476c9038b7d8ed0591fc0fd6e6c7da404bf.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Start.bat3⤵
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Associations /v ModRiskFileTypes /t REG_SZ /d .exe /f4⤵
- Modifies registry key
PID:1292
-
-
C:\Windows\SysWOW64\gpupdate.exegpupdate /force4⤵PID:644
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\jnduf.bat2⤵
- Deletes itself
PID:1204
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200B
MD59cedeb0b293d2b5491225ef3d9eb2a8b
SHA1b607ef9bd319b6ec696c8dab8a314998d133298b
SHA2563fc59706783a0778da9121da52a63e34e47c82f436d5b14943e14fb418fd4f08
SHA512ec7d4544e32b1ea460895b1037a9eca2529eed45d6ee1644f83dfc4d4ad8f7c32a811ee4627bc6b243fb5d5c9e3e2b22060d6a2903692830ff1f114d2b9f3cfc
-
Filesize
341B
MD51fefc37e6c436009c2563347883788a5
SHA18d6ab3255d56de09801b6ac29d3e47f5f7868559
SHA2565b23923ceb3cdbb7b7582b5603ab8ab52418c382a082db4160537cd16b83ebc7
SHA5122c91780e5031b05625b78a2cec26fb616c824566bc3ace2fb07f6a57c7ae4f4c4074fb0f68b55766fc2110c3de4a0b6d2210c9d11047009a399c54db8c407fdd
-
Filesize
572KB
MD5d8752f484a0afb66d97b1c826be301c8
SHA191e792239536f64a9c307a2906e0ceecd520d47f
SHA2563fd8ce85253562164e632b7c666ba53785bd3e4662bb61ff140f15784e64fcbf
SHA512743fdadef6ddcdd6bd0286f5e6eeb424b8c67a73429e110b88aad356f008f8be4af2cb64708cf59d210a7baed2ee47c08685dcbbdc2509109f117a75187239be