Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
50s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 01:00
Behavioral task
behavioral1
Sample
8d0f02b1fee9e88ba489f1fc63b51a18b92d1f17cebc4587b41e0bdc14bfa821.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8d0f02b1fee9e88ba489f1fc63b51a18b92d1f17cebc4587b41e0bdc14bfa821.exe
Resource
win10v2004-20221111-en
General
-
Target
8d0f02b1fee9e88ba489f1fc63b51a18b92d1f17cebc4587b41e0bdc14bfa821.exe
-
Size
1.1MB
-
MD5
004e8683b9c031550d365e1a39fcc6a5
-
SHA1
91040dd8d47613b14ffe4a2c8654caaa80cab60e
-
SHA256
8d0f02b1fee9e88ba489f1fc63b51a18b92d1f17cebc4587b41e0bdc14bfa821
-
SHA512
405561b75f5f0c172526625b5dec35f08c32a23606e1697ba134fbe768f8decf480ab2973ff106d17fa1cd4c23fb5a248efc70dc84558885230a4d2f6e6830e9
-
SSDEEP
24576:W9kY7vgEeJPq34ZTdQXtnqhz2cOmsRQsmjmPOIzAFMn0kr:W9kYuZTdAtS2lpSovcFI
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1088 6c09c2.exe -
resource yara_rule behavioral1/files/0x0007000000015c41-55.dat upx behavioral1/files/0x0007000000015c41-56.dat upx behavioral1/files/0x0007000000015c41-58.dat upx behavioral1/files/0x0007000000015c41-60.dat upx behavioral1/memory/556-61-0x0000000000400000-0x00000000007AC000-memory.dmp upx behavioral1/memory/1088-63-0x0000000000400000-0x00000000007AC000-memory.dmp upx behavioral1/memory/556-64-0x0000000000400000-0x00000000007AC000-memory.dmp upx behavioral1/memory/1088-65-0x0000000000400000-0x00000000007AC000-memory.dmp upx behavioral1/files/0x0007000000015c41-67.dat upx behavioral1/files/0x0007000000015c41-69.dat upx behavioral1/files/0x0007000000015c41-68.dat upx behavioral1/files/0x0007000000015c41-70.dat upx behavioral1/files/0x0007000000015c41-72.dat upx behavioral1/files/0x0007000000015c41-71.dat upx behavioral1/files/0x0007000000015c41-73.dat upx -
Loads dropped DLL 9 IoCs
pid Process 556 8d0f02b1fee9e88ba489f1fc63b51a18b92d1f17cebc4587b41e0bdc14bfa821.exe 556 8d0f02b1fee9e88ba489f1fc63b51a18b92d1f17cebc4587b41e0bdc14bfa821.exe 852 WerFault.exe 852 WerFault.exe 852 WerFault.exe 852 WerFault.exe 852 WerFault.exe 852 WerFault.exe 852 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 852 1088 WerFault.exe 27 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 6c09c2.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 6c09c2.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 556 8d0f02b1fee9e88ba489f1fc63b51a18b92d1f17cebc4587b41e0bdc14bfa821.exe 556 8d0f02b1fee9e88ba489f1fc63b51a18b92d1f17cebc4587b41e0bdc14bfa821.exe 1088 6c09c2.exe 1088 6c09c2.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 556 wrote to memory of 1088 556 8d0f02b1fee9e88ba489f1fc63b51a18b92d1f17cebc4587b41e0bdc14bfa821.exe 27 PID 556 wrote to memory of 1088 556 8d0f02b1fee9e88ba489f1fc63b51a18b92d1f17cebc4587b41e0bdc14bfa821.exe 27 PID 556 wrote to memory of 1088 556 8d0f02b1fee9e88ba489f1fc63b51a18b92d1f17cebc4587b41e0bdc14bfa821.exe 27 PID 556 wrote to memory of 1088 556 8d0f02b1fee9e88ba489f1fc63b51a18b92d1f17cebc4587b41e0bdc14bfa821.exe 27 PID 1088 wrote to memory of 852 1088 6c09c2.exe 30 PID 1088 wrote to memory of 852 1088 6c09c2.exe 30 PID 1088 wrote to memory of 852 1088 6c09c2.exe 30 PID 1088 wrote to memory of 852 1088 6c09c2.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d0f02b1fee9e88ba489f1fc63b51a18b92d1f17cebc4587b41e0bdc14bfa821.exe"C:\Users\Admin\AppData\Local\Temp\8d0f02b1fee9e88ba489f1fc63b51a18b92d1f17cebc4587b41e0bdc14bfa821.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\6c09c2.exeC:\Users\Admin\AppData\Local\Temp\ÅäÖÃ\6c09c2.exe 70804012⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1088 -s 14443⤵
- Loads dropped DLL
- Program crash
PID:852
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD54dc74acd7ec29273b489ff711a5c7294
SHA10f50e0e4299ee29f2d972bb36585f73d2b63f6f2
SHA256ec012c1ef8c9014e10a2e9038b1c8cbc0ab3d8b914978796060814fb1ccd3376
SHA5124f8a7554a0c257096f024526185a05f68189f1fdbf44f9828b7b1eb88c7fb90f608b45e51ac92dec9893d05f5427e7137b6c55e1e1d6d1a1ec84eaeef8b91c87
-
Filesize
1.1MB
MD54dc74acd7ec29273b489ff711a5c7294
SHA10f50e0e4299ee29f2d972bb36585f73d2b63f6f2
SHA256ec012c1ef8c9014e10a2e9038b1c8cbc0ab3d8b914978796060814fb1ccd3376
SHA5124f8a7554a0c257096f024526185a05f68189f1fdbf44f9828b7b1eb88c7fb90f608b45e51ac92dec9893d05f5427e7137b6c55e1e1d6d1a1ec84eaeef8b91c87
-
Filesize
1.1MB
MD54dc74acd7ec29273b489ff711a5c7294
SHA10f50e0e4299ee29f2d972bb36585f73d2b63f6f2
SHA256ec012c1ef8c9014e10a2e9038b1c8cbc0ab3d8b914978796060814fb1ccd3376
SHA5124f8a7554a0c257096f024526185a05f68189f1fdbf44f9828b7b1eb88c7fb90f608b45e51ac92dec9893d05f5427e7137b6c55e1e1d6d1a1ec84eaeef8b91c87
-
Filesize
1.1MB
MD54dc74acd7ec29273b489ff711a5c7294
SHA10f50e0e4299ee29f2d972bb36585f73d2b63f6f2
SHA256ec012c1ef8c9014e10a2e9038b1c8cbc0ab3d8b914978796060814fb1ccd3376
SHA5124f8a7554a0c257096f024526185a05f68189f1fdbf44f9828b7b1eb88c7fb90f608b45e51ac92dec9893d05f5427e7137b6c55e1e1d6d1a1ec84eaeef8b91c87
-
Filesize
1.1MB
MD54dc74acd7ec29273b489ff711a5c7294
SHA10f50e0e4299ee29f2d972bb36585f73d2b63f6f2
SHA256ec012c1ef8c9014e10a2e9038b1c8cbc0ab3d8b914978796060814fb1ccd3376
SHA5124f8a7554a0c257096f024526185a05f68189f1fdbf44f9828b7b1eb88c7fb90f608b45e51ac92dec9893d05f5427e7137b6c55e1e1d6d1a1ec84eaeef8b91c87
-
Filesize
1.1MB
MD54dc74acd7ec29273b489ff711a5c7294
SHA10f50e0e4299ee29f2d972bb36585f73d2b63f6f2
SHA256ec012c1ef8c9014e10a2e9038b1c8cbc0ab3d8b914978796060814fb1ccd3376
SHA5124f8a7554a0c257096f024526185a05f68189f1fdbf44f9828b7b1eb88c7fb90f608b45e51ac92dec9893d05f5427e7137b6c55e1e1d6d1a1ec84eaeef8b91c87
-
Filesize
1.1MB
MD54dc74acd7ec29273b489ff711a5c7294
SHA10f50e0e4299ee29f2d972bb36585f73d2b63f6f2
SHA256ec012c1ef8c9014e10a2e9038b1c8cbc0ab3d8b914978796060814fb1ccd3376
SHA5124f8a7554a0c257096f024526185a05f68189f1fdbf44f9828b7b1eb88c7fb90f608b45e51ac92dec9893d05f5427e7137b6c55e1e1d6d1a1ec84eaeef8b91c87
-
Filesize
1.1MB
MD54dc74acd7ec29273b489ff711a5c7294
SHA10f50e0e4299ee29f2d972bb36585f73d2b63f6f2
SHA256ec012c1ef8c9014e10a2e9038b1c8cbc0ab3d8b914978796060814fb1ccd3376
SHA5124f8a7554a0c257096f024526185a05f68189f1fdbf44f9828b7b1eb88c7fb90f608b45e51ac92dec9893d05f5427e7137b6c55e1e1d6d1a1ec84eaeef8b91c87
-
Filesize
1.1MB
MD54dc74acd7ec29273b489ff711a5c7294
SHA10f50e0e4299ee29f2d972bb36585f73d2b63f6f2
SHA256ec012c1ef8c9014e10a2e9038b1c8cbc0ab3d8b914978796060814fb1ccd3376
SHA5124f8a7554a0c257096f024526185a05f68189f1fdbf44f9828b7b1eb88c7fb90f608b45e51ac92dec9893d05f5427e7137b6c55e1e1d6d1a1ec84eaeef8b91c87
-
Filesize
1.1MB
MD54dc74acd7ec29273b489ff711a5c7294
SHA10f50e0e4299ee29f2d972bb36585f73d2b63f6f2
SHA256ec012c1ef8c9014e10a2e9038b1c8cbc0ab3d8b914978796060814fb1ccd3376
SHA5124f8a7554a0c257096f024526185a05f68189f1fdbf44f9828b7b1eb88c7fb90f608b45e51ac92dec9893d05f5427e7137b6c55e1e1d6d1a1ec84eaeef8b91c87
-
Filesize
1.1MB
MD54dc74acd7ec29273b489ff711a5c7294
SHA10f50e0e4299ee29f2d972bb36585f73d2b63f6f2
SHA256ec012c1ef8c9014e10a2e9038b1c8cbc0ab3d8b914978796060814fb1ccd3376
SHA5124f8a7554a0c257096f024526185a05f68189f1fdbf44f9828b7b1eb88c7fb90f608b45e51ac92dec9893d05f5427e7137b6c55e1e1d6d1a1ec84eaeef8b91c87