Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
30/11/2022, 23:22
Static task
static1
Behavioral task
behavioral1
Sample
ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe
Resource
win10v2004-20220812-en
General
-
Target
ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe
-
Size
375KB
-
MD5
4fe012a53f34f315e693ddf8a8a7cbb8
-
SHA1
dc38010ba1a416db24e69d745d5cbd5eec1192c5
-
SHA256
ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98
-
SHA512
f0a3bb9aedf1c7b3089fc6affa6ce0967c46762a783343cf1291500a339fd6d3807344bda0ce863c51a2caf26ccea4d4a8fcd07d499f6e9f2ac652d3849f67f6
-
SSDEEP
6144:8UvbxAQd6J+1i77CGTaTVEcL0Dv7isAzP5yiY2EDEtz:pKQd6Q1dGmhEcM9gz
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 892 8Wwv7q9FNDpZ.exe 1648 8Wwv7q9FNDpZ.exe -
Deletes itself 1 IoCs
pid Process 1648 8Wwv7q9FNDpZ.exe -
Loads dropped DLL 4 IoCs
pid Process 1036 ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe 1036 ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe 1036 ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe 1648 8Wwv7q9FNDpZ.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\PztVA0CMV6Z = "C:\\ProgramData\\EndO8bz6eg\\8Wwv7q9FNDpZ.exe" ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1064 set thread context of 1036 1064 ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe 27 PID 892 set thread context of 1648 892 8Wwv7q9FNDpZ.exe 29 PID 1648 set thread context of 1444 1648 8Wwv7q9FNDpZ.exe 30 -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1064 wrote to memory of 1036 1064 ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe 27 PID 1064 wrote to memory of 1036 1064 ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe 27 PID 1064 wrote to memory of 1036 1064 ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe 27 PID 1064 wrote to memory of 1036 1064 ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe 27 PID 1064 wrote to memory of 1036 1064 ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe 27 PID 1064 wrote to memory of 1036 1064 ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe 27 PID 1036 wrote to memory of 892 1036 ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe 28 PID 1036 wrote to memory of 892 1036 ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe 28 PID 1036 wrote to memory of 892 1036 ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe 28 PID 1036 wrote to memory of 892 1036 ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe 28 PID 892 wrote to memory of 1648 892 8Wwv7q9FNDpZ.exe 29 PID 892 wrote to memory of 1648 892 8Wwv7q9FNDpZ.exe 29 PID 892 wrote to memory of 1648 892 8Wwv7q9FNDpZ.exe 29 PID 892 wrote to memory of 1648 892 8Wwv7q9FNDpZ.exe 29 PID 892 wrote to memory of 1648 892 8Wwv7q9FNDpZ.exe 29 PID 892 wrote to memory of 1648 892 8Wwv7q9FNDpZ.exe 29 PID 1648 wrote to memory of 1444 1648 8Wwv7q9FNDpZ.exe 30 PID 1648 wrote to memory of 1444 1648 8Wwv7q9FNDpZ.exe 30 PID 1648 wrote to memory of 1444 1648 8Wwv7q9FNDpZ.exe 30 PID 1648 wrote to memory of 1444 1648 8Wwv7q9FNDpZ.exe 30 PID 1648 wrote to memory of 1444 1648 8Wwv7q9FNDpZ.exe 30 PID 1648 wrote to memory of 1444 1648 8Wwv7q9FNDpZ.exe 30 PID 1648 wrote to memory of 1444 1648 8Wwv7q9FNDpZ.exe 30 PID 1648 wrote to memory of 1444 1648 8Wwv7q9FNDpZ.exe 30 PID 1648 wrote to memory of 1444 1648 8Wwv7q9FNDpZ.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe"C:\Users\Admin\AppData\Local\Temp\ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe"C:\Users\Admin\AppData\Local\Temp\ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\ProgramData\EndO8bz6eg\8Wwv7q9FNDpZ.exe"C:\ProgramData\EndO8bz6eg\8Wwv7q9FNDpZ.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:892 -
C:\ProgramData\EndO8bz6eg\8Wwv7q9FNDpZ.exe"C:\ProgramData\EndO8bz6eg\8Wwv7q9FNDpZ.exe"4⤵
- Executes dropped EXE
- Deletes itself
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleCrashHandler.exe"C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleCrashHandler.exe" /i:16485⤵PID:1444
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
375KB
MD56dc355dd75a02ed2f1155f46565274b5
SHA14aefe37ed87bcf530c56f0fab3993a92ff46905e
SHA256aaf8cefe49f0ec5105d49d6292683669de1848135283b907d6f56a900164f350
SHA5127abfdb14d7da6dbd045a3a288181b08aa64f307a1e4d05b91019685740a8a341d9a72e25a5edcfe870543ff56f6706eb1a64d739852e193c6ffb9fe22f7d3fba
-
Filesize
375KB
MD56dc355dd75a02ed2f1155f46565274b5
SHA14aefe37ed87bcf530c56f0fab3993a92ff46905e
SHA256aaf8cefe49f0ec5105d49d6292683669de1848135283b907d6f56a900164f350
SHA5127abfdb14d7da6dbd045a3a288181b08aa64f307a1e4d05b91019685740a8a341d9a72e25a5edcfe870543ff56f6706eb1a64d739852e193c6ffb9fe22f7d3fba
-
Filesize
375KB
MD56dc355dd75a02ed2f1155f46565274b5
SHA14aefe37ed87bcf530c56f0fab3993a92ff46905e
SHA256aaf8cefe49f0ec5105d49d6292683669de1848135283b907d6f56a900164f350
SHA5127abfdb14d7da6dbd045a3a288181b08aa64f307a1e4d05b91019685740a8a341d9a72e25a5edcfe870543ff56f6706eb1a64d739852e193c6ffb9fe22f7d3fba
-
Filesize
375KB
MD56dc355dd75a02ed2f1155f46565274b5
SHA14aefe37ed87bcf530c56f0fab3993a92ff46905e
SHA256aaf8cefe49f0ec5105d49d6292683669de1848135283b907d6f56a900164f350
SHA5127abfdb14d7da6dbd045a3a288181b08aa64f307a1e4d05b91019685740a8a341d9a72e25a5edcfe870543ff56f6706eb1a64d739852e193c6ffb9fe22f7d3fba
-
Filesize
375KB
MD56dc355dd75a02ed2f1155f46565274b5
SHA14aefe37ed87bcf530c56f0fab3993a92ff46905e
SHA256aaf8cefe49f0ec5105d49d6292683669de1848135283b907d6f56a900164f350
SHA5127abfdb14d7da6dbd045a3a288181b08aa64f307a1e4d05b91019685740a8a341d9a72e25a5edcfe870543ff56f6706eb1a64d739852e193c6ffb9fe22f7d3fba
-
Filesize
375KB
MD54fe012a53f34f315e693ddf8a8a7cbb8
SHA1dc38010ba1a416db24e69d745d5cbd5eec1192c5
SHA256ae807360e83e978da8627e93811e1ca7d910ded177c1bb2f1387e11aef1bdf98
SHA512f0a3bb9aedf1c7b3089fc6affa6ce0967c46762a783343cf1291500a339fd6d3807344bda0ce863c51a2caf26ccea4d4a8fcd07d499f6e9f2ac652d3849f67f6
-
Filesize
375KB
MD56dc355dd75a02ed2f1155f46565274b5
SHA14aefe37ed87bcf530c56f0fab3993a92ff46905e
SHA256aaf8cefe49f0ec5105d49d6292683669de1848135283b907d6f56a900164f350
SHA5127abfdb14d7da6dbd045a3a288181b08aa64f307a1e4d05b91019685740a8a341d9a72e25a5edcfe870543ff56f6706eb1a64d739852e193c6ffb9fe22f7d3fba