Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
45s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 19:52
Behavioral task
behavioral1
Sample
f2f30d65b2dc6f9951e13d44b6f659dff1a0da10549131d5d6a7316ca87622f0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f2f30d65b2dc6f9951e13d44b6f659dff1a0da10549131d5d6a7316ca87622f0.exe
Resource
win10v2004-20220812-en
General
-
Target
f2f30d65b2dc6f9951e13d44b6f659dff1a0da10549131d5d6a7316ca87622f0.exe
-
Size
45KB
-
MD5
30136420f67e5f3d4f6d992c0a2b45c0
-
SHA1
61500185141906c9dc29696c3843d8156cf7ace8
-
SHA256
f2f30d65b2dc6f9951e13d44b6f659dff1a0da10549131d5d6a7316ca87622f0
-
SHA512
70e7798ee7c82715a14c77af8f840a49b167ce290fd36026ee609264557105b0a377104f098ad93308c27dcc8e8d3f1861a5273b377bc4a3321bcc440026a799
-
SSDEEP
768:6x2ZiddEC7lRaqtcSI3QpG3bvb2m9RkUT4rdlnjUsWc5ax3deVFv0fGJPLVbPY6m:6ATWlsCNI3bvyyb2FjUmMe+GJP5jY6/+
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x0008000000005c51-54.dat aspack_v212_v242 behavioral1/files/0x0008000000005c51-56.dat aspack_v212_v242 behavioral1/files/0x0008000000005c51-57.dat aspack_v212_v242 -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run livevideo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ErrorReportSent = "C:\\Users\\Admin\\AppData\\Roaming\\livevideo.exe" livevideo.exe -
Executes dropped EXE 1 IoCs
pid Process 1160 livevideo.exe -
Deletes itself 1 IoCs
pid Process 2032 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1292 f2f30d65b2dc6f9951e13d44b6f659dff1a0da10549131d5d6a7316ca87622f0.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1292 wrote to memory of 1160 1292 f2f30d65b2dc6f9951e13d44b6f659dff1a0da10549131d5d6a7316ca87622f0.exe 27 PID 1292 wrote to memory of 1160 1292 f2f30d65b2dc6f9951e13d44b6f659dff1a0da10549131d5d6a7316ca87622f0.exe 27 PID 1292 wrote to memory of 1160 1292 f2f30d65b2dc6f9951e13d44b6f659dff1a0da10549131d5d6a7316ca87622f0.exe 27 PID 1292 wrote to memory of 1160 1292 f2f30d65b2dc6f9951e13d44b6f659dff1a0da10549131d5d6a7316ca87622f0.exe 27 PID 1292 wrote to memory of 2032 1292 f2f30d65b2dc6f9951e13d44b6f659dff1a0da10549131d5d6a7316ca87622f0.exe 28 PID 1292 wrote to memory of 2032 1292 f2f30d65b2dc6f9951e13d44b6f659dff1a0da10549131d5d6a7316ca87622f0.exe 28 PID 1292 wrote to memory of 2032 1292 f2f30d65b2dc6f9951e13d44b6f659dff1a0da10549131d5d6a7316ca87622f0.exe 28 PID 1292 wrote to memory of 2032 1292 f2f30d65b2dc6f9951e13d44b6f659dff1a0da10549131d5d6a7316ca87622f0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2f30d65b2dc6f9951e13d44b6f659dff1a0da10549131d5d6a7316ca87622f0.exe"C:\Users\Admin\AppData\Local\Temp\f2f30d65b2dc6f9951e13d44b6f659dff1a0da10549131d5d6a7316ca87622f0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Roaming\livevideo.exeC:\Users\Admin\AppData\Roaming\livevideo.exe2⤵
- Adds policy Run key to start application
- Executes dropped EXE
PID:1160
-
-
C:\Windows\SysWOW64\cmd.execmd /c UNISTA~1.BAT2⤵
- Deletes itself
PID:2032
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88B
MD5c96d7a7e71763ecb0fe4e604132ee0f8
SHA13b4c74237328bd4a7ae8ee10d72a28ca84887e06
SHA256b9954ca4696fc4b7a871d497d304b30e53decda9532d07fa598b237e2eef125a
SHA512071e04b4c86413f9ac20cda2d87f0dc6f71e0e8b9a0118c04e8eab4ae09536a803da2aec23d859e6e0675c2b554f67238c69490d047aa5a1b1d95423624d33f4
-
Filesize
45KB
MD5523b6c7362bdd993247e0449e37a4c57
SHA12fae090afc5ab34599fd64168c7041e62b42d63d
SHA25668a7535689e8b8f5dfd2fbdd447952622bd2b6f8b362aff0c5c01a9254edf9c9
SHA5124787f423bfcd2f7f803949631a2e8c739659e52a6c7617b9717a57e48856e794b1c2394dde5a26f9c08f66329561f19f8bdb7817ebdc7b2679bf60ebe3305a13
-
Filesize
45KB
MD5523b6c7362bdd993247e0449e37a4c57
SHA12fae090afc5ab34599fd64168c7041e62b42d63d
SHA25668a7535689e8b8f5dfd2fbdd447952622bd2b6f8b362aff0c5c01a9254edf9c9
SHA5124787f423bfcd2f7f803949631a2e8c739659e52a6c7617b9717a57e48856e794b1c2394dde5a26f9c08f66329561f19f8bdb7817ebdc7b2679bf60ebe3305a13
-
Filesize
45KB
MD5523b6c7362bdd993247e0449e37a4c57
SHA12fae090afc5ab34599fd64168c7041e62b42d63d
SHA25668a7535689e8b8f5dfd2fbdd447952622bd2b6f8b362aff0c5c01a9254edf9c9
SHA5124787f423bfcd2f7f803949631a2e8c739659e52a6c7617b9717a57e48856e794b1c2394dde5a26f9c08f66329561f19f8bdb7817ebdc7b2679bf60ebe3305a13