Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
192s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2023, 21:10
Static task
static1
Behavioral task
behavioral1
Sample
2e2f7a5b58169c1ad43eefe702d631583eff8ef4f3692ca190c867e115de1157.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2e2f7a5b58169c1ad43eefe702d631583eff8ef4f3692ca190c867e115de1157.exe
Resource
win10v2004-20230220-en
General
-
Target
2e2f7a5b58169c1ad43eefe702d631583eff8ef4f3692ca190c867e115de1157.exe
-
Size
599KB
-
MD5
579ba1c8fe2dafba83ffe2aba5f6a07d
-
SHA1
35ef464b64c6e0c2bc97d619fd9a1e54dde2c33e
-
SHA256
2e2f7a5b58169c1ad43eefe702d631583eff8ef4f3692ca190c867e115de1157
-
SHA512
5ac8a105b59d188a6b33402782595a47df3f1a17385abaa9f3e5bd8c2f64751663609980625184a7e333522dbe1a0c9ba551c0262709882aa634699097c5086d
-
SSDEEP
12288:xMrey906Emu9BKLLbroX1IDDToyXIi6a9YEGeSduYyz:fydoBaga9XJx+/eSduYa
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 300 y0052950.exe 1868 k8932178.exe -
Loads dropped DLL 4 IoCs
pid Process 2000 2e2f7a5b58169c1ad43eefe702d631583eff8ef4f3692ca190c867e115de1157.exe 300 y0052950.exe 300 y0052950.exe 1868 k8932178.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce y0052950.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y0052950.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2e2f7a5b58169c1ad43eefe702d631583eff8ef4f3692ca190c867e115de1157.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2e2f7a5b58169c1ad43eefe702d631583eff8ef4f3692ca190c867e115de1157.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2000 wrote to memory of 300 2000 2e2f7a5b58169c1ad43eefe702d631583eff8ef4f3692ca190c867e115de1157.exe 28 PID 2000 wrote to memory of 300 2000 2e2f7a5b58169c1ad43eefe702d631583eff8ef4f3692ca190c867e115de1157.exe 28 PID 2000 wrote to memory of 300 2000 2e2f7a5b58169c1ad43eefe702d631583eff8ef4f3692ca190c867e115de1157.exe 28 PID 2000 wrote to memory of 300 2000 2e2f7a5b58169c1ad43eefe702d631583eff8ef4f3692ca190c867e115de1157.exe 28 PID 2000 wrote to memory of 300 2000 2e2f7a5b58169c1ad43eefe702d631583eff8ef4f3692ca190c867e115de1157.exe 28 PID 2000 wrote to memory of 300 2000 2e2f7a5b58169c1ad43eefe702d631583eff8ef4f3692ca190c867e115de1157.exe 28 PID 2000 wrote to memory of 300 2000 2e2f7a5b58169c1ad43eefe702d631583eff8ef4f3692ca190c867e115de1157.exe 28 PID 300 wrote to memory of 1868 300 y0052950.exe 29 PID 300 wrote to memory of 1868 300 y0052950.exe 29 PID 300 wrote to memory of 1868 300 y0052950.exe 29 PID 300 wrote to memory of 1868 300 y0052950.exe 29 PID 300 wrote to memory of 1868 300 y0052950.exe 29 PID 300 wrote to memory of 1868 300 y0052950.exe 29 PID 300 wrote to memory of 1868 300 y0052950.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e2f7a5b58169c1ad43eefe702d631583eff8ef4f3692ca190c867e115de1157.exe"C:\Users\Admin\AppData\Local\Temp\2e2f7a5b58169c1ad43eefe702d631583eff8ef4f3692ca190c867e115de1157.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0052950.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0052950.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:300 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8932178.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8932178.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1868
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD510f05a531c697fd3fc57c14fbcdca498
SHA130ef526e424157a6bead127b5c3eda60ce7683d0
SHA2566f0525e710b1ae50ecbbe11e07efc75586ba6c3599faca401b6b43d8ebbedac9
SHA512d03dece36bc0021ed76ba6c53c199006f634ad0b84c695b56e55856f1e0912f7391c7f8e2c2b205a1585ff69075b42f8ebd8723a3a57497523ed534cdd3a2d49
-
Filesize
307KB
MD510f05a531c697fd3fc57c14fbcdca498
SHA130ef526e424157a6bead127b5c3eda60ce7683d0
SHA2566f0525e710b1ae50ecbbe11e07efc75586ba6c3599faca401b6b43d8ebbedac9
SHA512d03dece36bc0021ed76ba6c53c199006f634ad0b84c695b56e55856f1e0912f7391c7f8e2c2b205a1585ff69075b42f8ebd8723a3a57497523ed534cdd3a2d49
-
Filesize
136KB
MD51dd5f288f46e1dc1964b5b595c31d6b3
SHA15fa9eda2c2eed89dd7edb694cf298cdde03f5984
SHA2563aa79ff6bc819242ae7eadbcfcce9c276c4b8cfb7c64d579b21dac86ec51d62d
SHA5124f939bf8f82120b584da7ee4dc8d515d4f5c7748d5daf542a6e62c1274b517aeca0e80e14039209501c08e26bd37f2a26fedaf10a4502ef3321d020023ad28df
-
Filesize
136KB
MD51dd5f288f46e1dc1964b5b595c31d6b3
SHA15fa9eda2c2eed89dd7edb694cf298cdde03f5984
SHA2563aa79ff6bc819242ae7eadbcfcce9c276c4b8cfb7c64d579b21dac86ec51d62d
SHA5124f939bf8f82120b584da7ee4dc8d515d4f5c7748d5daf542a6e62c1274b517aeca0e80e14039209501c08e26bd37f2a26fedaf10a4502ef3321d020023ad28df
-
Filesize
307KB
MD510f05a531c697fd3fc57c14fbcdca498
SHA130ef526e424157a6bead127b5c3eda60ce7683d0
SHA2566f0525e710b1ae50ecbbe11e07efc75586ba6c3599faca401b6b43d8ebbedac9
SHA512d03dece36bc0021ed76ba6c53c199006f634ad0b84c695b56e55856f1e0912f7391c7f8e2c2b205a1585ff69075b42f8ebd8723a3a57497523ed534cdd3a2d49
-
Filesize
307KB
MD510f05a531c697fd3fc57c14fbcdca498
SHA130ef526e424157a6bead127b5c3eda60ce7683d0
SHA2566f0525e710b1ae50ecbbe11e07efc75586ba6c3599faca401b6b43d8ebbedac9
SHA512d03dece36bc0021ed76ba6c53c199006f634ad0b84c695b56e55856f1e0912f7391c7f8e2c2b205a1585ff69075b42f8ebd8723a3a57497523ed534cdd3a2d49
-
Filesize
136KB
MD51dd5f288f46e1dc1964b5b595c31d6b3
SHA15fa9eda2c2eed89dd7edb694cf298cdde03f5984
SHA2563aa79ff6bc819242ae7eadbcfcce9c276c4b8cfb7c64d579b21dac86ec51d62d
SHA5124f939bf8f82120b584da7ee4dc8d515d4f5c7748d5daf542a6e62c1274b517aeca0e80e14039209501c08e26bd37f2a26fedaf10a4502ef3321d020023ad28df
-
Filesize
136KB
MD51dd5f288f46e1dc1964b5b595c31d6b3
SHA15fa9eda2c2eed89dd7edb694cf298cdde03f5984
SHA2563aa79ff6bc819242ae7eadbcfcce9c276c4b8cfb7c64d579b21dac86ec51d62d
SHA5124f939bf8f82120b584da7ee4dc8d515d4f5c7748d5daf542a6e62c1274b517aeca0e80e14039209501c08e26bd37f2a26fedaf10a4502ef3321d020023ad28df