Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 21:51
Static task
static1
Behavioral task
behavioral1
Sample
4f6a0ddfcb845de6b8486b0134b48e65ccfbc10ef394862baa6c4147e41f3bbe.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4f6a0ddfcb845de6b8486b0134b48e65ccfbc10ef394862baa6c4147e41f3bbe.exe
Resource
win10v2004-20230221-en
General
-
Target
4f6a0ddfcb845de6b8486b0134b48e65ccfbc10ef394862baa6c4147e41f3bbe.exe
-
Size
479KB
-
MD5
a7197f87435b55aed36005c1d7a44054
-
SHA1
35673ff66b6ea4c9057a9e56d838511d29d2845e
-
SHA256
4f6a0ddfcb845de6b8486b0134b48e65ccfbc10ef394862baa6c4147e41f3bbe
-
SHA512
28a22752459740b48ead8ccb06160a525d1b4700edfb945c34ad0efd1202f495b76ede88e8139cc769decd425bf4cace41a3da7516c1a432c8a2181b0849abe0
-
SSDEEP
12288:nMrxy90FOgdm8vDKJgGZKVBPmGn88bwZpf30kpd:qyrWCVZUhS8c/30gd
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1744 x5782298.exe 1476 g2913555.exe -
Loads dropped DLL 4 IoCs
pid Process 1204 4f6a0ddfcb845de6b8486b0134b48e65ccfbc10ef394862baa6c4147e41f3bbe.exe 1744 x5782298.exe 1744 x5782298.exe 1476 g2913555.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4f6a0ddfcb845de6b8486b0134b48e65ccfbc10ef394862baa6c4147e41f3bbe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4f6a0ddfcb845de6b8486b0134b48e65ccfbc10ef394862baa6c4147e41f3bbe.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce x5782298.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x5782298.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1204 wrote to memory of 1744 1204 4f6a0ddfcb845de6b8486b0134b48e65ccfbc10ef394862baa6c4147e41f3bbe.exe 28 PID 1204 wrote to memory of 1744 1204 4f6a0ddfcb845de6b8486b0134b48e65ccfbc10ef394862baa6c4147e41f3bbe.exe 28 PID 1204 wrote to memory of 1744 1204 4f6a0ddfcb845de6b8486b0134b48e65ccfbc10ef394862baa6c4147e41f3bbe.exe 28 PID 1204 wrote to memory of 1744 1204 4f6a0ddfcb845de6b8486b0134b48e65ccfbc10ef394862baa6c4147e41f3bbe.exe 28 PID 1204 wrote to memory of 1744 1204 4f6a0ddfcb845de6b8486b0134b48e65ccfbc10ef394862baa6c4147e41f3bbe.exe 28 PID 1204 wrote to memory of 1744 1204 4f6a0ddfcb845de6b8486b0134b48e65ccfbc10ef394862baa6c4147e41f3bbe.exe 28 PID 1204 wrote to memory of 1744 1204 4f6a0ddfcb845de6b8486b0134b48e65ccfbc10ef394862baa6c4147e41f3bbe.exe 28 PID 1744 wrote to memory of 1476 1744 x5782298.exe 29 PID 1744 wrote to memory of 1476 1744 x5782298.exe 29 PID 1744 wrote to memory of 1476 1744 x5782298.exe 29 PID 1744 wrote to memory of 1476 1744 x5782298.exe 29 PID 1744 wrote to memory of 1476 1744 x5782298.exe 29 PID 1744 wrote to memory of 1476 1744 x5782298.exe 29 PID 1744 wrote to memory of 1476 1744 x5782298.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f6a0ddfcb845de6b8486b0134b48e65ccfbc10ef394862baa6c4147e41f3bbe.exe"C:\Users\Admin\AppData\Local\Temp\4f6a0ddfcb845de6b8486b0134b48e65ccfbc10ef394862baa6c4147e41f3bbe.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5782298.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5782298.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g2913555.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g2913555.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1476
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
308KB
MD5c11417d0f2ae2e687434d7a8299428a0
SHA15e79129836d34a887322964f23d82f01f221d02e
SHA256780ce1a07fc44af73bb29df7e5fefdb032a038811f93b3f0139a487242273af3
SHA512c198bf6dfb7d890f1575fd60ed7e702f6bb452f8a06d87332a931a9dafb7893bdde2cc6d593aa605ba00cad72b80ace55e78c7a6ab99edd89e7a7baad47e17e2
-
Filesize
308KB
MD5c11417d0f2ae2e687434d7a8299428a0
SHA15e79129836d34a887322964f23d82f01f221d02e
SHA256780ce1a07fc44af73bb29df7e5fefdb032a038811f93b3f0139a487242273af3
SHA512c198bf6dfb7d890f1575fd60ed7e702f6bb452f8a06d87332a931a9dafb7893bdde2cc6d593aa605ba00cad72b80ace55e78c7a6ab99edd89e7a7baad47e17e2
-
Filesize
136KB
MD54b2e594eefb2a3e883b2db4fae05f3b6
SHA12dd0cc22701588ff040fdba5ae91ac0044cf1e44
SHA256975ec8b091898fff325c1d7ed26a13198985750592ec50e96d76d4d0ef12ce82
SHA512c20665dbb80f63d0a62a8a29766d3492574234ee7c363beaae81bea3c46388b65435f8f98ce6cc5d723234369da05f2300b2ccc09fbded294f0cd4177778070b
-
Filesize
136KB
MD54b2e594eefb2a3e883b2db4fae05f3b6
SHA12dd0cc22701588ff040fdba5ae91ac0044cf1e44
SHA256975ec8b091898fff325c1d7ed26a13198985750592ec50e96d76d4d0ef12ce82
SHA512c20665dbb80f63d0a62a8a29766d3492574234ee7c363beaae81bea3c46388b65435f8f98ce6cc5d723234369da05f2300b2ccc09fbded294f0cd4177778070b
-
Filesize
308KB
MD5c11417d0f2ae2e687434d7a8299428a0
SHA15e79129836d34a887322964f23d82f01f221d02e
SHA256780ce1a07fc44af73bb29df7e5fefdb032a038811f93b3f0139a487242273af3
SHA512c198bf6dfb7d890f1575fd60ed7e702f6bb452f8a06d87332a931a9dafb7893bdde2cc6d593aa605ba00cad72b80ace55e78c7a6ab99edd89e7a7baad47e17e2
-
Filesize
308KB
MD5c11417d0f2ae2e687434d7a8299428a0
SHA15e79129836d34a887322964f23d82f01f221d02e
SHA256780ce1a07fc44af73bb29df7e5fefdb032a038811f93b3f0139a487242273af3
SHA512c198bf6dfb7d890f1575fd60ed7e702f6bb452f8a06d87332a931a9dafb7893bdde2cc6d593aa605ba00cad72b80ace55e78c7a6ab99edd89e7a7baad47e17e2
-
Filesize
136KB
MD54b2e594eefb2a3e883b2db4fae05f3b6
SHA12dd0cc22701588ff040fdba5ae91ac0044cf1e44
SHA256975ec8b091898fff325c1d7ed26a13198985750592ec50e96d76d4d0ef12ce82
SHA512c20665dbb80f63d0a62a8a29766d3492574234ee7c363beaae81bea3c46388b65435f8f98ce6cc5d723234369da05f2300b2ccc09fbded294f0cd4177778070b
-
Filesize
136KB
MD54b2e594eefb2a3e883b2db4fae05f3b6
SHA12dd0cc22701588ff040fdba5ae91ac0044cf1e44
SHA256975ec8b091898fff325c1d7ed26a13198985750592ec50e96d76d4d0ef12ce82
SHA512c20665dbb80f63d0a62a8a29766d3492574234ee7c363beaae81bea3c46388b65435f8f98ce6cc5d723234369da05f2300b2ccc09fbded294f0cd4177778070b