Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
51s -
max time network
90s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 10:16
Static task
static1
Behavioral task
behavioral1
Sample
12cfe9977cd669018236d56c3bbb46139039a8b346e6c6efac04604ef7dee139.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
12cfe9977cd669018236d56c3bbb46139039a8b346e6c6efac04604ef7dee139.exe
Resource
win10v2004-20221111-en
General
-
Target
12cfe9977cd669018236d56c3bbb46139039a8b346e6c6efac04604ef7dee139.exe
-
Size
140KB
-
MD5
e05c617916fa14f40f7d2d7252ce58ba
-
SHA1
92c415f627b3f5fa6d4ccfca5b73ada7ec993e61
-
SHA256
12cfe9977cd669018236d56c3bbb46139039a8b346e6c6efac04604ef7dee139
-
SHA512
0c52b9f14e96e3bf01d95076219f6c8337e5bd40cc9bc56f1fd7bc45fe3f2165b5f25325b312ddc88b782f05a8c9d4200f30c5c71ca39c42da4742bfd35172ef
-
SSDEEP
1536:jLe2G4hiyrKfU0B296MAkgu8cBjFouoGNWAD5v2i9l4hT:OEhiy2fR0UMANYoufIAcySh
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Google = "C:\\Users\\Admin\\AppData\\Roaming\\abgjtdcv\\wuivtsru.exe" svchost.exe -
Deletes itself 1 IoCs
pid Process 1240 svchost.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 12cfe9977cd669018236d56c3bbb46139039a8b346e6c6efac04604ef7dee139.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 12cfe9977cd669018236d56c3bbb46139039a8b346e6c6efac04604ef7dee139.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2020 set thread context of 1184 2020 12cfe9977cd669018236d56c3bbb46139039a8b346e6c6efac04604ef7dee139.exe 28 -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1184 12cfe9977cd669018236d56c3bbb46139039a8b346e6c6efac04604ef7dee139.exe 1184 12cfe9977cd669018236d56c3bbb46139039a8b346e6c6efac04604ef7dee139.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2020 12cfe9977cd669018236d56c3bbb46139039a8b346e6c6efac04604ef7dee139.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2020 wrote to memory of 1184 2020 12cfe9977cd669018236d56c3bbb46139039a8b346e6c6efac04604ef7dee139.exe 28 PID 2020 wrote to memory of 1184 2020 12cfe9977cd669018236d56c3bbb46139039a8b346e6c6efac04604ef7dee139.exe 28 PID 2020 wrote to memory of 1184 2020 12cfe9977cd669018236d56c3bbb46139039a8b346e6c6efac04604ef7dee139.exe 28 PID 2020 wrote to memory of 1184 2020 12cfe9977cd669018236d56c3bbb46139039a8b346e6c6efac04604ef7dee139.exe 28 PID 2020 wrote to memory of 1184 2020 12cfe9977cd669018236d56c3bbb46139039a8b346e6c6efac04604ef7dee139.exe 28 PID 2020 wrote to memory of 1184 2020 12cfe9977cd669018236d56c3bbb46139039a8b346e6c6efac04604ef7dee139.exe 28 PID 2020 wrote to memory of 1184 2020 12cfe9977cd669018236d56c3bbb46139039a8b346e6c6efac04604ef7dee139.exe 28 PID 1184 wrote to memory of 1240 1184 12cfe9977cd669018236d56c3bbb46139039a8b346e6c6efac04604ef7dee139.exe 29 PID 1184 wrote to memory of 1240 1184 12cfe9977cd669018236d56c3bbb46139039a8b346e6c6efac04604ef7dee139.exe 29 PID 1184 wrote to memory of 1240 1184 12cfe9977cd669018236d56c3bbb46139039a8b346e6c6efac04604ef7dee139.exe 29 PID 1184 wrote to memory of 1240 1184 12cfe9977cd669018236d56c3bbb46139039a8b346e6c6efac04604ef7dee139.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\12cfe9977cd669018236d56c3bbb46139039a8b346e6c6efac04604ef7dee139.exe"C:\Users\Admin\AppData\Local\Temp\12cfe9977cd669018236d56c3bbb46139039a8b346e6c6efac04604ef7dee139.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\12cfe9977cd669018236d56c3bbb46139039a8b346e6c6efac04604ef7dee139.exe"C:\Users\Admin\AppData\Local\Temp\12cfe9977cd669018236d56c3bbb46139039a8b346e6c6efac04604ef7dee139.exe"2⤵
- Maps connected drives based on registry
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Adds policy Run key to start application
- Deletes itself
PID:1240
-
-