Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
28/11/2022, 05:46
Static task
static1
Behavioral task
behavioral1
Sample
c08e739264052466cf4ab1e22b891ba551f6f0f1abe62503687721ff8e1345fa.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c08e739264052466cf4ab1e22b891ba551f6f0f1abe62503687721ff8e1345fa.exe
Resource
win10v2004-20220812-en
General
-
Target
c08e739264052466cf4ab1e22b891ba551f6f0f1abe62503687721ff8e1345fa.exe
-
Size
606KB
-
MD5
5109fd9935de26b52fc6bdc2b96c4ff2
-
SHA1
963fb4f803b4875cfca0054c5076c178d8d28fe5
-
SHA256
c08e739264052466cf4ab1e22b891ba551f6f0f1abe62503687721ff8e1345fa
-
SHA512
c686a7805ad15d6e58e2dcd83d4ef52e07447ef11a09d624b256400bd28718d2958e3f8e5b9c20fde1094631a862a8f56c6bd78b9864a7df6ae0df47a7049307
-
SSDEEP
12288:9VBNNiiaGdz+35g6OvGC2WhZEHwq1iKSdAQU46OXKC7y:1u5GAG6/C2s+Q6Qv6Nj
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List c08e739264052466cf4ab1e22b891ba551f6f0f1abe62503687721ff8e1345fa.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\M-50507564324649683503740\winsvc.exe = "C:\\Windows\\M-50507564324649683503740\\winsvc.exe:*:Enabled:Microsoft Windows Service" c08e739264052466cf4ab1e22b891ba551f6f0f1abe62503687721ff8e1345fa.exe -
Executes dropped EXE 2 IoCs
pid Process 892 winsvc.exe 1972 winsvc.exe -
Loads dropped DLL 2 IoCs
pid Process 1056 c08e739264052466cf4ab1e22b891ba551f6f0f1abe62503687721ff8e1345fa.exe 1056 c08e739264052466cf4ab1e22b891ba551f6f0f1abe62503687721ff8e1345fa.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Service = "C:\\Windows\\M-50507564324649683503740\\winsvc.exe" c08e739264052466cf4ab1e22b891ba551f6f0f1abe62503687721ff8e1345fa.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ c08e739264052466cf4ab1e22b891ba551f6f0f1abe62503687721ff8e1345fa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows Service = "C:\\Windows\\M-50507564324649683503740\\winsvc.exe" c08e739264052466cf4ab1e22b891ba551f6f0f1abe62503687721ff8e1345fa.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ c08e739264052466cf4ab1e22b891ba551f6f0f1abe62503687721ff8e1345fa.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1200 set thread context of 1056 1200 c08e739264052466cf4ab1e22b891ba551f6f0f1abe62503687721ff8e1345fa.exe 27 PID 892 set thread context of 1972 892 winsvc.exe 29 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\M-50507564324649683503740\winsvc.exe c08e739264052466cf4ab1e22b891ba551f6f0f1abe62503687721ff8e1345fa.exe File opened for modification C:\Windows\M-50507564324649683503740\winsvc.exe c08e739264052466cf4ab1e22b891ba551f6f0f1abe62503687721ff8e1345fa.exe File opened for modification C:\Windows\M-50507564324649683503740 c08e739264052466cf4ab1e22b891ba551f6f0f1abe62503687721ff8e1345fa.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 1200 c08e739264052466cf4ab1e22b891ba551f6f0f1abe62503687721ff8e1345fa.exe 1200 c08e739264052466cf4ab1e22b891ba551f6f0f1abe62503687721ff8e1345fa.exe 892 winsvc.exe 892 winsvc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1200 wrote to memory of 1056 1200 c08e739264052466cf4ab1e22b891ba551f6f0f1abe62503687721ff8e1345fa.exe 27 PID 1200 wrote to memory of 1056 1200 c08e739264052466cf4ab1e22b891ba551f6f0f1abe62503687721ff8e1345fa.exe 27 PID 1200 wrote to memory of 1056 1200 c08e739264052466cf4ab1e22b891ba551f6f0f1abe62503687721ff8e1345fa.exe 27 PID 1200 wrote to memory of 1056 1200 c08e739264052466cf4ab1e22b891ba551f6f0f1abe62503687721ff8e1345fa.exe 27 PID 1056 wrote to memory of 892 1056 c08e739264052466cf4ab1e22b891ba551f6f0f1abe62503687721ff8e1345fa.exe 28 PID 1056 wrote to memory of 892 1056 c08e739264052466cf4ab1e22b891ba551f6f0f1abe62503687721ff8e1345fa.exe 28 PID 1056 wrote to memory of 892 1056 c08e739264052466cf4ab1e22b891ba551f6f0f1abe62503687721ff8e1345fa.exe 28 PID 1056 wrote to memory of 892 1056 c08e739264052466cf4ab1e22b891ba551f6f0f1abe62503687721ff8e1345fa.exe 28 PID 892 wrote to memory of 1972 892 winsvc.exe 29 PID 892 wrote to memory of 1972 892 winsvc.exe 29 PID 892 wrote to memory of 1972 892 winsvc.exe 29 PID 892 wrote to memory of 1972 892 winsvc.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c08e739264052466cf4ab1e22b891ba551f6f0f1abe62503687721ff8e1345fa.exe"C:\Users\Admin\AppData\Local\Temp\c08e739264052466cf4ab1e22b891ba551f6f0f1abe62503687721ff8e1345fa.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\c08e739264052466cf4ab1e22b891ba551f6f0f1abe62503687721ff8e1345fa.exe"C:\Users\Admin\AppData\Local\Temp\c08e739264052466cf4ab1e22b891ba551f6f0f1abe62503687721ff8e1345fa.exe"2⤵
- Modifies firewall policy service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\M-50507564324649683503740\winsvc.exeC:\Windows\M-50507564324649683503740\winsvc.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\M-50507564324649683503740\winsvc.exeC:\Windows\M-50507564324649683503740\winsvc.exe4⤵
- Executes dropped EXE
PID:1972
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
606KB
MD55109fd9935de26b52fc6bdc2b96c4ff2
SHA1963fb4f803b4875cfca0054c5076c178d8d28fe5
SHA256c08e739264052466cf4ab1e22b891ba551f6f0f1abe62503687721ff8e1345fa
SHA512c686a7805ad15d6e58e2dcd83d4ef52e07447ef11a09d624b256400bd28718d2958e3f8e5b9c20fde1094631a862a8f56c6bd78b9864a7df6ae0df47a7049307
-
Filesize
606KB
MD55109fd9935de26b52fc6bdc2b96c4ff2
SHA1963fb4f803b4875cfca0054c5076c178d8d28fe5
SHA256c08e739264052466cf4ab1e22b891ba551f6f0f1abe62503687721ff8e1345fa
SHA512c686a7805ad15d6e58e2dcd83d4ef52e07447ef11a09d624b256400bd28718d2958e3f8e5b9c20fde1094631a862a8f56c6bd78b9864a7df6ae0df47a7049307
-
Filesize
606KB
MD55109fd9935de26b52fc6bdc2b96c4ff2
SHA1963fb4f803b4875cfca0054c5076c178d8d28fe5
SHA256c08e739264052466cf4ab1e22b891ba551f6f0f1abe62503687721ff8e1345fa
SHA512c686a7805ad15d6e58e2dcd83d4ef52e07447ef11a09d624b256400bd28718d2958e3f8e5b9c20fde1094631a862a8f56c6bd78b9864a7df6ae0df47a7049307
-
Filesize
606KB
MD55109fd9935de26b52fc6bdc2b96c4ff2
SHA1963fb4f803b4875cfca0054c5076c178d8d28fe5
SHA256c08e739264052466cf4ab1e22b891ba551f6f0f1abe62503687721ff8e1345fa
SHA512c686a7805ad15d6e58e2dcd83d4ef52e07447ef11a09d624b256400bd28718d2958e3f8e5b9c20fde1094631a862a8f56c6bd78b9864a7df6ae0df47a7049307
-
Filesize
606KB
MD55109fd9935de26b52fc6bdc2b96c4ff2
SHA1963fb4f803b4875cfca0054c5076c178d8d28fe5
SHA256c08e739264052466cf4ab1e22b891ba551f6f0f1abe62503687721ff8e1345fa
SHA512c686a7805ad15d6e58e2dcd83d4ef52e07447ef11a09d624b256400bd28718d2958e3f8e5b9c20fde1094631a862a8f56c6bd78b9864a7df6ae0df47a7049307