Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
40s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/11/2022, 23:13
Static task
static1
Behavioral task
behavioral1
Sample
b0cd2f54b5e857e58ad7622031e96f9815bf694a373d54413c4c17578fd089a1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b0cd2f54b5e857e58ad7622031e96f9815bf694a373d54413c4c17578fd089a1.exe
Resource
win10v2004-20220901-en
General
-
Target
b0cd2f54b5e857e58ad7622031e96f9815bf694a373d54413c4c17578fd089a1.exe
-
Size
1.1MB
-
MD5
bcbf56917932494cd01bb7a700f9b57e
-
SHA1
790cc2c909a093e8f52544d41b4c75348146ffc0
-
SHA256
b0cd2f54b5e857e58ad7622031e96f9815bf694a373d54413c4c17578fd089a1
-
SHA512
96e68ff4b6a68b74d5942b023a55823be0ad3ed398baf8a1e4f2f692f05de8995eea4b923e54dedc0b2d4f093ca3e1c4983fec3e2852d84fce69513963cab4f2
-
SSDEEP
12288:p7g75OSQVvVRUg4hFkSqnZQF+lluGWt8X8+ZIZ6olP1VmL:utWvVRUzhOdKF+llj6iKZ6oT6
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 988 4EAZXSDgDiIZVCw.exe 1956 4EAZXSDgDiIZVCw.exe -
Deletes itself 1 IoCs
pid Process 1956 4EAZXSDgDiIZVCw.exe -
Loads dropped DLL 4 IoCs
pid Process 1448 b0cd2f54b5e857e58ad7622031e96f9815bf694a373d54413c4c17578fd089a1.exe 1448 b0cd2f54b5e857e58ad7622031e96f9815bf694a373d54413c4c17578fd089a1.exe 1448 b0cd2f54b5e857e58ad7622031e96f9815bf694a373d54413c4c17578fd089a1.exe 1956 4EAZXSDgDiIZVCw.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run b0cd2f54b5e857e58ad7622031e96f9815bf694a373d54413c4c17578fd089a1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mcjt09EZ = "C:\\ProgramData\\ZVRP7mOCwu\\4EAZXSDgDiIZVCw.exe" b0cd2f54b5e857e58ad7622031e96f9815bf694a373d54413c4c17578fd089a1.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1372 set thread context of 1448 1372 b0cd2f54b5e857e58ad7622031e96f9815bf694a373d54413c4c17578fd089a1.exe 28 PID 988 set thread context of 1956 988 4EAZXSDgDiIZVCw.exe 30 PID 1956 set thread context of 1136 1956 4EAZXSDgDiIZVCw.exe 31 -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1372 wrote to memory of 1448 1372 b0cd2f54b5e857e58ad7622031e96f9815bf694a373d54413c4c17578fd089a1.exe 28 PID 1372 wrote to memory of 1448 1372 b0cd2f54b5e857e58ad7622031e96f9815bf694a373d54413c4c17578fd089a1.exe 28 PID 1372 wrote to memory of 1448 1372 b0cd2f54b5e857e58ad7622031e96f9815bf694a373d54413c4c17578fd089a1.exe 28 PID 1372 wrote to memory of 1448 1372 b0cd2f54b5e857e58ad7622031e96f9815bf694a373d54413c4c17578fd089a1.exe 28 PID 1372 wrote to memory of 1448 1372 b0cd2f54b5e857e58ad7622031e96f9815bf694a373d54413c4c17578fd089a1.exe 28 PID 1372 wrote to memory of 1448 1372 b0cd2f54b5e857e58ad7622031e96f9815bf694a373d54413c4c17578fd089a1.exe 28 PID 1448 wrote to memory of 988 1448 b0cd2f54b5e857e58ad7622031e96f9815bf694a373d54413c4c17578fd089a1.exe 29 PID 1448 wrote to memory of 988 1448 b0cd2f54b5e857e58ad7622031e96f9815bf694a373d54413c4c17578fd089a1.exe 29 PID 1448 wrote to memory of 988 1448 b0cd2f54b5e857e58ad7622031e96f9815bf694a373d54413c4c17578fd089a1.exe 29 PID 1448 wrote to memory of 988 1448 b0cd2f54b5e857e58ad7622031e96f9815bf694a373d54413c4c17578fd089a1.exe 29 PID 988 wrote to memory of 1956 988 4EAZXSDgDiIZVCw.exe 30 PID 988 wrote to memory of 1956 988 4EAZXSDgDiIZVCw.exe 30 PID 988 wrote to memory of 1956 988 4EAZXSDgDiIZVCw.exe 30 PID 988 wrote to memory of 1956 988 4EAZXSDgDiIZVCw.exe 30 PID 988 wrote to memory of 1956 988 4EAZXSDgDiIZVCw.exe 30 PID 988 wrote to memory of 1956 988 4EAZXSDgDiIZVCw.exe 30 PID 1956 wrote to memory of 1136 1956 4EAZXSDgDiIZVCw.exe 31 PID 1956 wrote to memory of 1136 1956 4EAZXSDgDiIZVCw.exe 31 PID 1956 wrote to memory of 1136 1956 4EAZXSDgDiIZVCw.exe 31 PID 1956 wrote to memory of 1136 1956 4EAZXSDgDiIZVCw.exe 31 PID 1956 wrote to memory of 1136 1956 4EAZXSDgDiIZVCw.exe 31 PID 1956 wrote to memory of 1136 1956 4EAZXSDgDiIZVCw.exe 31 PID 1956 wrote to memory of 1136 1956 4EAZXSDgDiIZVCw.exe 31 PID 1956 wrote to memory of 1136 1956 4EAZXSDgDiIZVCw.exe 31 PID 1956 wrote to memory of 1136 1956 4EAZXSDgDiIZVCw.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0cd2f54b5e857e58ad7622031e96f9815bf694a373d54413c4c17578fd089a1.exe"C:\Users\Admin\AppData\Local\Temp\b0cd2f54b5e857e58ad7622031e96f9815bf694a373d54413c4c17578fd089a1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\b0cd2f54b5e857e58ad7622031e96f9815bf694a373d54413c4c17578fd089a1.exe"C:\Users\Admin\AppData\Local\Temp\b0cd2f54b5e857e58ad7622031e96f9815bf694a373d54413c4c17578fd089a1.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\ProgramData\ZVRP7mOCwu\4EAZXSDgDiIZVCw.exe"C:\ProgramData\ZVRP7mOCwu\4EAZXSDgDiIZVCw.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:988 -
C:\ProgramData\ZVRP7mOCwu\4EAZXSDgDiIZVCw.exe"C:\ProgramData\ZVRP7mOCwu\4EAZXSDgDiIZVCw.exe"4⤵
- Executes dropped EXE
- Deletes itself
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\airappinstaller.exe"C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\airappinstaller.exe" /i:19565⤵PID:1136
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5a108c8f637cbf19ad873ad883c4ead7b
SHA1e018417fec4f35cd3070ae8f1426034590328551
SHA2562792ae371d873a68059e97ef24f3a311d974e087edbfb2eb9e6822f62f658f1f
SHA512267bb6ccfbb1ec3a1a742c4afc1d5581078d82633aae8c432280e46d36e853e40dac73dad927f08c6d6b1efed9c209a2663ce811f9ea1ccf1865704338821a63
-
Filesize
1.1MB
MD5a108c8f637cbf19ad873ad883c4ead7b
SHA1e018417fec4f35cd3070ae8f1426034590328551
SHA2562792ae371d873a68059e97ef24f3a311d974e087edbfb2eb9e6822f62f658f1f
SHA512267bb6ccfbb1ec3a1a742c4afc1d5581078d82633aae8c432280e46d36e853e40dac73dad927f08c6d6b1efed9c209a2663ce811f9ea1ccf1865704338821a63
-
Filesize
1.1MB
MD5a108c8f637cbf19ad873ad883c4ead7b
SHA1e018417fec4f35cd3070ae8f1426034590328551
SHA2562792ae371d873a68059e97ef24f3a311d974e087edbfb2eb9e6822f62f658f1f
SHA512267bb6ccfbb1ec3a1a742c4afc1d5581078d82633aae8c432280e46d36e853e40dac73dad927f08c6d6b1efed9c209a2663ce811f9ea1ccf1865704338821a63
-
Filesize
1.1MB
MD5a108c8f637cbf19ad873ad883c4ead7b
SHA1e018417fec4f35cd3070ae8f1426034590328551
SHA2562792ae371d873a68059e97ef24f3a311d974e087edbfb2eb9e6822f62f658f1f
SHA512267bb6ccfbb1ec3a1a742c4afc1d5581078d82633aae8c432280e46d36e853e40dac73dad927f08c6d6b1efed9c209a2663ce811f9ea1ccf1865704338821a63
-
Filesize
1.1MB
MD5a108c8f637cbf19ad873ad883c4ead7b
SHA1e018417fec4f35cd3070ae8f1426034590328551
SHA2562792ae371d873a68059e97ef24f3a311d974e087edbfb2eb9e6822f62f658f1f
SHA512267bb6ccfbb1ec3a1a742c4afc1d5581078d82633aae8c432280e46d36e853e40dac73dad927f08c6d6b1efed9c209a2663ce811f9ea1ccf1865704338821a63
-
Filesize
1.1MB
MD5bcbf56917932494cd01bb7a700f9b57e
SHA1790cc2c909a093e8f52544d41b4c75348146ffc0
SHA256b0cd2f54b5e857e58ad7622031e96f9815bf694a373d54413c4c17578fd089a1
SHA51296e68ff4b6a68b74d5942b023a55823be0ad3ed398baf8a1e4f2f692f05de8995eea4b923e54dedc0b2d4f093ca3e1c4983fec3e2852d84fce69513963cab4f2
-
Filesize
1.1MB
MD5a108c8f637cbf19ad873ad883c4ead7b
SHA1e018417fec4f35cd3070ae8f1426034590328551
SHA2562792ae371d873a68059e97ef24f3a311d974e087edbfb2eb9e6822f62f658f1f
SHA512267bb6ccfbb1ec3a1a742c4afc1d5581078d82633aae8c432280e46d36e853e40dac73dad927f08c6d6b1efed9c209a2663ce811f9ea1ccf1865704338821a63