Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
26/11/2022, 00:14
Static task
static1
Behavioral task
behavioral1
Sample
05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe
Resource
win10v2004-20220812-en
General
-
Target
05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe
-
Size
72KB
-
MD5
f09a3a45ff1326844ed5337a996eb26f
-
SHA1
2fbc9de4c8202a05e9e68329b965c84c0a5bc109
-
SHA256
05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066
-
SHA512
51fdbae8982ebfdc6a097d017d8320c140b4be959a90751b880dff831af80ff8ec44b950da555d9829fdf034bbe710a699c9c193e82e1be99e7c9f388940a484
-
SSDEEP
1536:nrFchFX18y5i+QRJl70G5svwPCkq383Inh:JycVyvwqkq383Y
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 320 csrss.exe 1684 rundll32.exe 1256 csrss.exe 688 svchost.exe 2040 rundll32.exe 664 svchost.exe -
Loads dropped DLL 7 IoCs
pid Process 1188 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 1188 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 1188 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 1188 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 1188 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 1188 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 1684 rundll32.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Process = "C:\\Windows\\system32\\csrss.exe" 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Host-process Windows (Rundll32.exe) = "C:\\Users\\Admin\\AppData\\Roaming\\rundll32.exe" 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Service Host Process for Windows = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\csrss.exe 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe File opened for modification C:\Windows\SysWOW64\csrss.exe 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe File opened for modification C:\Windows\SysWOW64\rundll32.exe 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe File created C:\Windows\SysWOW64\rundll32.exe 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe File opened for modification C:\Windows\SysWOW64\svchost.exe 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe File created C:\Windows\SysWOW64\svchost.exe 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 620 set thread context of 1188 620 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 27 PID 320 set thread context of 1256 320 csrss.exe 30 PID 1684 set thread context of 2040 1684 rundll32.exe 32 PID 688 set thread context of 664 688 svchost.exe 33 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1188 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 1188 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 1188 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 1188 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 1188 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 620 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 320 csrss.exe 1684 rundll32.exe 688 svchost.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 620 wrote to memory of 1188 620 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 27 PID 620 wrote to memory of 1188 620 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 27 PID 620 wrote to memory of 1188 620 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 27 PID 620 wrote to memory of 1188 620 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 27 PID 620 wrote to memory of 1188 620 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 27 PID 620 wrote to memory of 1188 620 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 27 PID 620 wrote to memory of 1188 620 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 27 PID 620 wrote to memory of 1188 620 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 27 PID 620 wrote to memory of 1188 620 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 27 PID 1188 wrote to memory of 320 1188 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 28 PID 1188 wrote to memory of 320 1188 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 28 PID 1188 wrote to memory of 320 1188 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 28 PID 1188 wrote to memory of 320 1188 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 28 PID 1188 wrote to memory of 1684 1188 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 29 PID 1188 wrote to memory of 1684 1188 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 29 PID 1188 wrote to memory of 1684 1188 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 29 PID 1188 wrote to memory of 1684 1188 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 29 PID 1188 wrote to memory of 1684 1188 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 29 PID 1188 wrote to memory of 1684 1188 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 29 PID 1188 wrote to memory of 1684 1188 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 29 PID 320 wrote to memory of 1256 320 csrss.exe 30 PID 320 wrote to memory of 1256 320 csrss.exe 30 PID 320 wrote to memory of 1256 320 csrss.exe 30 PID 320 wrote to memory of 1256 320 csrss.exe 30 PID 320 wrote to memory of 1256 320 csrss.exe 30 PID 320 wrote to memory of 1256 320 csrss.exe 30 PID 320 wrote to memory of 1256 320 csrss.exe 30 PID 320 wrote to memory of 1256 320 csrss.exe 30 PID 320 wrote to memory of 1256 320 csrss.exe 30 PID 1188 wrote to memory of 688 1188 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 31 PID 1188 wrote to memory of 688 1188 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 31 PID 1188 wrote to memory of 688 1188 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 31 PID 1188 wrote to memory of 688 1188 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 31 PID 1684 wrote to memory of 2040 1684 rundll32.exe 32 PID 1684 wrote to memory of 2040 1684 rundll32.exe 32 PID 1684 wrote to memory of 2040 1684 rundll32.exe 32 PID 1684 wrote to memory of 2040 1684 rundll32.exe 32 PID 1684 wrote to memory of 2040 1684 rundll32.exe 32 PID 1684 wrote to memory of 2040 1684 rundll32.exe 32 PID 1684 wrote to memory of 2040 1684 rundll32.exe 32 PID 1684 wrote to memory of 2040 1684 rundll32.exe 32 PID 1684 wrote to memory of 2040 1684 rundll32.exe 32 PID 1684 wrote to memory of 2040 1684 rundll32.exe 32 PID 1684 wrote to memory of 2040 1684 rundll32.exe 32 PID 1684 wrote to memory of 2040 1684 rundll32.exe 32 PID 688 wrote to memory of 664 688 svchost.exe 33 PID 688 wrote to memory of 664 688 svchost.exe 33 PID 688 wrote to memory of 664 688 svchost.exe 33 PID 688 wrote to memory of 664 688 svchost.exe 33 PID 688 wrote to memory of 664 688 svchost.exe 33 PID 688 wrote to memory of 664 688 svchost.exe 33 PID 688 wrote to memory of 664 688 svchost.exe 33 PID 688 wrote to memory of 664 688 svchost.exe 33 PID 688 wrote to memory of 664 688 svchost.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe"C:\Users\Admin\AppData\Local\Temp\05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Users\Admin\AppData\Local\Temp\05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe"C:\Users\Admin\AppData\Local\Temp\05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\csrss.exe"C:\Windows\system32\csrss.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\SysWOW64\csrss.exe"C:\Windows\SysWOW64\csrss.exe"4⤵
- Executes dropped EXE
PID:1256
-
-
-
C:\Users\Admin\AppData\Roaming\rundll32.exe"C:\Users\Admin\AppData\Roaming\rundll32.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Roaming\rundll32.exe"C:\Users\Admin\AppData\Roaming\rundll32.exe"4⤵
- Executes dropped EXE
PID:2040
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵
- Executes dropped EXE
PID:664
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5f09a3a45ff1326844ed5337a996eb26f
SHA12fbc9de4c8202a05e9e68329b965c84c0a5bc109
SHA25605ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066
SHA51251fdbae8982ebfdc6a097d017d8320c140b4be959a90751b880dff831af80ff8ec44b950da555d9829fdf034bbe710a699c9c193e82e1be99e7c9f388940a484
-
Filesize
72KB
MD5f09a3a45ff1326844ed5337a996eb26f
SHA12fbc9de4c8202a05e9e68329b965c84c0a5bc109
SHA25605ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066
SHA51251fdbae8982ebfdc6a097d017d8320c140b4be959a90751b880dff831af80ff8ec44b950da555d9829fdf034bbe710a699c9c193e82e1be99e7c9f388940a484
-
Filesize
72KB
MD5f09a3a45ff1326844ed5337a996eb26f
SHA12fbc9de4c8202a05e9e68329b965c84c0a5bc109
SHA25605ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066
SHA51251fdbae8982ebfdc6a097d017d8320c140b4be959a90751b880dff831af80ff8ec44b950da555d9829fdf034bbe710a699c9c193e82e1be99e7c9f388940a484
-
Filesize
72KB
MD5f09a3a45ff1326844ed5337a996eb26f
SHA12fbc9de4c8202a05e9e68329b965c84c0a5bc109
SHA25605ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066
SHA51251fdbae8982ebfdc6a097d017d8320c140b4be959a90751b880dff831af80ff8ec44b950da555d9829fdf034bbe710a699c9c193e82e1be99e7c9f388940a484
-
Filesize
72KB
MD5f09a3a45ff1326844ed5337a996eb26f
SHA12fbc9de4c8202a05e9e68329b965c84c0a5bc109
SHA25605ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066
SHA51251fdbae8982ebfdc6a097d017d8320c140b4be959a90751b880dff831af80ff8ec44b950da555d9829fdf034bbe710a699c9c193e82e1be99e7c9f388940a484
-
Filesize
72KB
MD5f09a3a45ff1326844ed5337a996eb26f
SHA12fbc9de4c8202a05e9e68329b965c84c0a5bc109
SHA25605ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066
SHA51251fdbae8982ebfdc6a097d017d8320c140b4be959a90751b880dff831af80ff8ec44b950da555d9829fdf034bbe710a699c9c193e82e1be99e7c9f388940a484
-
Filesize
72KB
MD5f09a3a45ff1326844ed5337a996eb26f
SHA12fbc9de4c8202a05e9e68329b965c84c0a5bc109
SHA25605ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066
SHA51251fdbae8982ebfdc6a097d017d8320c140b4be959a90751b880dff831af80ff8ec44b950da555d9829fdf034bbe710a699c9c193e82e1be99e7c9f388940a484
-
Filesize
72KB
MD5f09a3a45ff1326844ed5337a996eb26f
SHA12fbc9de4c8202a05e9e68329b965c84c0a5bc109
SHA25605ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066
SHA51251fdbae8982ebfdc6a097d017d8320c140b4be959a90751b880dff831af80ff8ec44b950da555d9829fdf034bbe710a699c9c193e82e1be99e7c9f388940a484
-
Filesize
72KB
MD5f09a3a45ff1326844ed5337a996eb26f
SHA12fbc9de4c8202a05e9e68329b965c84c0a5bc109
SHA25605ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066
SHA51251fdbae8982ebfdc6a097d017d8320c140b4be959a90751b880dff831af80ff8ec44b950da555d9829fdf034bbe710a699c9c193e82e1be99e7c9f388940a484
-
Filesize
72KB
MD5f09a3a45ff1326844ed5337a996eb26f
SHA12fbc9de4c8202a05e9e68329b965c84c0a5bc109
SHA25605ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066
SHA51251fdbae8982ebfdc6a097d017d8320c140b4be959a90751b880dff831af80ff8ec44b950da555d9829fdf034bbe710a699c9c193e82e1be99e7c9f388940a484
-
Filesize
72KB
MD5f09a3a45ff1326844ed5337a996eb26f
SHA12fbc9de4c8202a05e9e68329b965c84c0a5bc109
SHA25605ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066
SHA51251fdbae8982ebfdc6a097d017d8320c140b4be959a90751b880dff831af80ff8ec44b950da555d9829fdf034bbe710a699c9c193e82e1be99e7c9f388940a484
-
Filesize
72KB
MD5f09a3a45ff1326844ed5337a996eb26f
SHA12fbc9de4c8202a05e9e68329b965c84c0a5bc109
SHA25605ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066
SHA51251fdbae8982ebfdc6a097d017d8320c140b4be959a90751b880dff831af80ff8ec44b950da555d9829fdf034bbe710a699c9c193e82e1be99e7c9f388940a484
-
Filesize
72KB
MD5f09a3a45ff1326844ed5337a996eb26f
SHA12fbc9de4c8202a05e9e68329b965c84c0a5bc109
SHA25605ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066
SHA51251fdbae8982ebfdc6a097d017d8320c140b4be959a90751b880dff831af80ff8ec44b950da555d9829fdf034bbe710a699c9c193e82e1be99e7c9f388940a484
-
Filesize
72KB
MD5f09a3a45ff1326844ed5337a996eb26f
SHA12fbc9de4c8202a05e9e68329b965c84c0a5bc109
SHA25605ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066
SHA51251fdbae8982ebfdc6a097d017d8320c140b4be959a90751b880dff831af80ff8ec44b950da555d9829fdf034bbe710a699c9c193e82e1be99e7c9f388940a484
-
Filesize
72KB
MD5f09a3a45ff1326844ed5337a996eb26f
SHA12fbc9de4c8202a05e9e68329b965c84c0a5bc109
SHA25605ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066
SHA51251fdbae8982ebfdc6a097d017d8320c140b4be959a90751b880dff831af80ff8ec44b950da555d9829fdf034bbe710a699c9c193e82e1be99e7c9f388940a484
-
Filesize
72KB
MD5f09a3a45ff1326844ed5337a996eb26f
SHA12fbc9de4c8202a05e9e68329b965c84c0a5bc109
SHA25605ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066
SHA51251fdbae8982ebfdc6a097d017d8320c140b4be959a90751b880dff831af80ff8ec44b950da555d9829fdf034bbe710a699c9c193e82e1be99e7c9f388940a484