Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 14:09
Static task
static1
Behavioral task
behavioral1
Sample
bda6c1ed66ad82ca4f51eb589abd5ee768c81e51cac6af4bc606b92d8ddac0ce.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bda6c1ed66ad82ca4f51eb589abd5ee768c81e51cac6af4bc606b92d8ddac0ce.exe
Resource
win10v2004-20220812-en
General
-
Target
bda6c1ed66ad82ca4f51eb589abd5ee768c81e51cac6af4bc606b92d8ddac0ce.exe
-
Size
118KB
-
MD5
60e0bb0651734e438a73d5fd130dae13
-
SHA1
3fd37138aeb73d4590f018fade81ce108f550269
-
SHA256
bda6c1ed66ad82ca4f51eb589abd5ee768c81e51cac6af4bc606b92d8ddac0ce
-
SHA512
5958b23206568a510ad3e2b01f6446e8ba208d179280206f83f0c4f2635287f7d8753e627a6df141c8f57f68b514ecb6739a06058229ff7d89e93ad0a6ec138d
-
SSDEEP
3072:hsNCMCN4me7rNzAuxq5XelL044RI4bX1C1uKJrF+SjGeRoc:hscBNqrNUuw5uh04LKi/5F+CGeRo
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 1152 rundll32.exe 1152 rundll32.exe 1152 rundll32.exe 1152 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\qmsvef = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Roaming\\qmsvef.dll\",FreeTempFileList" bda6c1ed66ad82ca4f51eb589abd5ee768c81e51cac6af4bc606b92d8ddac0ce.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1352 wrote to memory of 1152 1352 bda6c1ed66ad82ca4f51eb589abd5ee768c81e51cac6af4bc606b92d8ddac0ce.exe 26 PID 1352 wrote to memory of 1152 1352 bda6c1ed66ad82ca4f51eb589abd5ee768c81e51cac6af4bc606b92d8ddac0ce.exe 26 PID 1352 wrote to memory of 1152 1352 bda6c1ed66ad82ca4f51eb589abd5ee768c81e51cac6af4bc606b92d8ddac0ce.exe 26 PID 1352 wrote to memory of 1152 1352 bda6c1ed66ad82ca4f51eb589abd5ee768c81e51cac6af4bc606b92d8ddac0ce.exe 26 PID 1352 wrote to memory of 1152 1352 bda6c1ed66ad82ca4f51eb589abd5ee768c81e51cac6af4bc606b92d8ddac0ce.exe 26 PID 1352 wrote to memory of 1152 1352 bda6c1ed66ad82ca4f51eb589abd5ee768c81e51cac6af4bc606b92d8ddac0ce.exe 26 PID 1352 wrote to memory of 1152 1352 bda6c1ed66ad82ca4f51eb589abd5ee768c81e51cac6af4bc606b92d8ddac0ce.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\bda6c1ed66ad82ca4f51eb589abd5ee768c81e51cac6af4bc606b92d8ddac0ce.exe"C:\Users\Admin\AppData\Local\Temp\bda6c1ed66ad82ca4f51eb589abd5ee768c81e51cac6af4bc606b92d8ddac0ce.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\qmsvef.dll",GetCounter2⤵
- Loads dropped DLL
PID:1152
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
118KB
MD57d9f4b0c349ca8b768bc439c19f078ef
SHA11de2f215d2e422475a3dd0bb264f66f7766c070b
SHA256ebb250386e03988bc4dd6a590ac418e7696e2a21409ad761972bffff78482f8a
SHA51244df32bd041fffad1971b704e999deef3bd9b6af8f84d80c783b6261d12dcd068fd84807c85569b980dce5923e57cfad3710055f4d804b4f2b0124f4a1a39109
-
Filesize
118KB
MD57d9f4b0c349ca8b768bc439c19f078ef
SHA11de2f215d2e422475a3dd0bb264f66f7766c070b
SHA256ebb250386e03988bc4dd6a590ac418e7696e2a21409ad761972bffff78482f8a
SHA51244df32bd041fffad1971b704e999deef3bd9b6af8f84d80c783b6261d12dcd068fd84807c85569b980dce5923e57cfad3710055f4d804b4f2b0124f4a1a39109
-
Filesize
118KB
MD57d9f4b0c349ca8b768bc439c19f078ef
SHA11de2f215d2e422475a3dd0bb264f66f7766c070b
SHA256ebb250386e03988bc4dd6a590ac418e7696e2a21409ad761972bffff78482f8a
SHA51244df32bd041fffad1971b704e999deef3bd9b6af8f84d80c783b6261d12dcd068fd84807c85569b980dce5923e57cfad3710055f4d804b4f2b0124f4a1a39109
-
Filesize
118KB
MD57d9f4b0c349ca8b768bc439c19f078ef
SHA11de2f215d2e422475a3dd0bb264f66f7766c070b
SHA256ebb250386e03988bc4dd6a590ac418e7696e2a21409ad761972bffff78482f8a
SHA51244df32bd041fffad1971b704e999deef3bd9b6af8f84d80c783b6261d12dcd068fd84807c85569b980dce5923e57cfad3710055f4d804b4f2b0124f4a1a39109
-
Filesize
118KB
MD57d9f4b0c349ca8b768bc439c19f078ef
SHA11de2f215d2e422475a3dd0bb264f66f7766c070b
SHA256ebb250386e03988bc4dd6a590ac418e7696e2a21409ad761972bffff78482f8a
SHA51244df32bd041fffad1971b704e999deef3bd9b6af8f84d80c783b6261d12dcd068fd84807c85569b980dce5923e57cfad3710055f4d804b4f2b0124f4a1a39109