Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
44s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06/06/2023, 11:33
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
03731599.exe
Resource
win7-20230220-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
03731599.exe
Resource
win10v2004-20230221-en
8 signatures
150 seconds
General
-
Target
03731599.exe
-
Size
460KB
-
MD5
6df4109027cf0cdb396aa7e8cb00306e
-
SHA1
b677cc1b123fa8a5f81ad082b79f80b10d2a3efd
-
SHA256
b99d0a2610e65b8ab1e10b959b15b25c07124b4f8761a71b99aa002affe6d6e4
-
SHA512
c2a1547f4e8019308ea948283f56fb6d1faea62587c100c2e374361a74e380ee749c185ab4a4b3834fd611ae5b96a099955e8b2c827262d5870fc4e43c9ae280
-
SSDEEP
12288:+5SBXNJ5TKooCJPV7rZPDI/iz0hbtsODTJ:+5i0ozZJrpz0T
Score
10/10
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1148 created 1320 1148 03731599.exe 16 -
Deletes itself 1 IoCs
pid Process 468 certreq.exe -
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Office\10.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Office\11.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Office\12.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook certreq.exe Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook certreq.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 certreq.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString certreq.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1148 03731599.exe 1148 03731599.exe 1148 03731599.exe 1148 03731599.exe 468 certreq.exe 468 certreq.exe 468 certreq.exe 468 certreq.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1148 wrote to memory of 468 1148 03731599.exe 29 PID 1148 wrote to memory of 468 1148 03731599.exe 29 PID 1148 wrote to memory of 468 1148 03731599.exe 29 PID 1148 wrote to memory of 468 1148 03731599.exe 29 PID 1148 wrote to memory of 468 1148 03731599.exe 29 PID 1148 wrote to memory of 468 1148 03731599.exe 29 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook certreq.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3430344531-3702557399-3004411149-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook certreq.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\03731599.exe"C:\Users\Admin\AppData\Local\Temp\03731599.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1148
-
-
C:\Windows\system32\certreq.exe"C:\Windows\system32\certreq.exe"2⤵
- Deletes itself
- Accesses Microsoft Outlook profiles
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
PID:468
-