Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
80s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 00:01
Static task
static1
Behavioral task
behavioral1
Sample
a08338594bf10cbe2214d6748800f0660a7720d30449b61fb9593416f1a8826e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a08338594bf10cbe2214d6748800f0660a7720d30449b61fb9593416f1a8826e.exe
Resource
win10v2004-20221111-en
General
-
Target
a08338594bf10cbe2214d6748800f0660a7720d30449b61fb9593416f1a8826e.exe
-
Size
44KB
-
MD5
528b9c115d04a42cbc9e708a30dc1b72
-
SHA1
13bb2778f317bce63cdcb2f36fb67f663f5011f5
-
SHA256
a08338594bf10cbe2214d6748800f0660a7720d30449b61fb9593416f1a8826e
-
SHA512
3785679747183c61b26ef126591642e3821c30cbef6c509946a0d8d5100d5333a3568176f17e92f5d04fd0e8f9ee2c031c3e9fe7eac527ac192ee4a6ba05dcc8
-
SSDEEP
384:/TSjaZaaH2fRFsN1lNhECh0cUSlgXmF0KloSrYjPQ1M0z8ueD00SnZWf7:/mjTJY1lNXhXUa6Q0KlXrYj+z8/qcf
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1952 winlogon.exe -
Loads dropped DLL 2 IoCs
pid Process 748 a08338594bf10cbe2214d6748800f0660a7720d30449b61fb9593416f1a8826e.exe 748 a08338594bf10cbe2214d6748800f0660a7720d30449b61fb9593416f1a8826e.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Winlogon = "c:\\Windows\\Winmain\\winlogon.exe" winlogon.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created \??\c:\Windows\Winmain\winlogon.exe a08338594bf10cbe2214d6748800f0660a7720d30449b61fb9593416f1a8826e.exe File opened for modification \??\c:\Windows\Winmain\winlogon.exe a08338594bf10cbe2214d6748800f0660a7720d30449b61fb9593416f1a8826e.exe File created \??\c:\Windows\Winmain\winlogon.exe winlogon.exe File created \??\c:\Windows\System32.dat winlogon.exe File opened for modification \??\c:\Windows\System32.dat winlogon.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 748 a08338594bf10cbe2214d6748800f0660a7720d30449b61fb9593416f1a8826e.exe 1952 winlogon.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 748 wrote to memory of 1952 748 a08338594bf10cbe2214d6748800f0660a7720d30449b61fb9593416f1a8826e.exe 27 PID 748 wrote to memory of 1952 748 a08338594bf10cbe2214d6748800f0660a7720d30449b61fb9593416f1a8826e.exe 27 PID 748 wrote to memory of 1952 748 a08338594bf10cbe2214d6748800f0660a7720d30449b61fb9593416f1a8826e.exe 27 PID 748 wrote to memory of 1952 748 a08338594bf10cbe2214d6748800f0660a7720d30449b61fb9593416f1a8826e.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\a08338594bf10cbe2214d6748800f0660a7720d30449b61fb9593416f1a8826e.exe"C:\Users\Admin\AppData\Local\Temp\a08338594bf10cbe2214d6748800f0660a7720d30449b61fb9593416f1a8826e.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:748 -
\??\c:\Windows\Winmain\winlogon.exec:\Windows\Winmain\winlogon.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1952
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5528b9c115d04a42cbc9e708a30dc1b72
SHA113bb2778f317bce63cdcb2f36fb67f663f5011f5
SHA256a08338594bf10cbe2214d6748800f0660a7720d30449b61fb9593416f1a8826e
SHA5123785679747183c61b26ef126591642e3821c30cbef6c509946a0d8d5100d5333a3568176f17e92f5d04fd0e8f9ee2c031c3e9fe7eac527ac192ee4a6ba05dcc8
-
Filesize
44KB
MD5528b9c115d04a42cbc9e708a30dc1b72
SHA113bb2778f317bce63cdcb2f36fb67f663f5011f5
SHA256a08338594bf10cbe2214d6748800f0660a7720d30449b61fb9593416f1a8826e
SHA5123785679747183c61b26ef126591642e3821c30cbef6c509946a0d8d5100d5333a3568176f17e92f5d04fd0e8f9ee2c031c3e9fe7eac527ac192ee4a6ba05dcc8
-
Filesize
44KB
MD5528b9c115d04a42cbc9e708a30dc1b72
SHA113bb2778f317bce63cdcb2f36fb67f663f5011f5
SHA256a08338594bf10cbe2214d6748800f0660a7720d30449b61fb9593416f1a8826e
SHA5123785679747183c61b26ef126591642e3821c30cbef6c509946a0d8d5100d5333a3568176f17e92f5d04fd0e8f9ee2c031c3e9fe7eac527ac192ee4a6ba05dcc8
-
Filesize
44KB
MD5528b9c115d04a42cbc9e708a30dc1b72
SHA113bb2778f317bce63cdcb2f36fb67f663f5011f5
SHA256a08338594bf10cbe2214d6748800f0660a7720d30449b61fb9593416f1a8826e
SHA5123785679747183c61b26ef126591642e3821c30cbef6c509946a0d8d5100d5333a3568176f17e92f5d04fd0e8f9ee2c031c3e9fe7eac527ac192ee4a6ba05dcc8