Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
28s -
max time network
32s -
platform
windows7_x64 -
resource
win7-20230705-en -
resource tags
arch:x64arch:x86image:win7-20230705-enlocale:en-usos:windows7-x64system -
submitted
07/07/2023, 03:38
Static task
static1
Behavioral task
behavioral1
Sample
7526a108e24d1f7479bd33864057b806e0bc63f0f55fb234263f7a8ea751a6a6.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
7526a108e24d1f7479bd33864057b806e0bc63f0f55fb234263f7a8ea751a6a6.exe
Resource
win10-20230703-en
General
-
Target
7526a108e24d1f7479bd33864057b806e0bc63f0f55fb234263f7a8ea751a6a6.exe
-
Size
1.7MB
-
MD5
07566dc1e1cd7a75b11f8cefa85245cb
-
SHA1
ad9f60d6b923f3d492deae644ab7ea838bebc97d
-
SHA256
7526a108e24d1f7479bd33864057b806e0bc63f0f55fb234263f7a8ea751a6a6
-
SHA512
fb46ca2175f18301ded5e1cbe720fc147503bc079dfa69cb091417c2a20a09d2203c059f73164a496b3dd8a9b99f5e9be4866e485098bedc5fae11bc368613be
-
SSDEEP
24576:PgZXoZUTVdt7K7UbPLJTRaF76SB1MUewOBeuiCeeMZFvW5lekw7VHIlSr3AKjz30:u5O6SwQDCeeMf2lrsr3AKjz3Fyo2L
Malware Config
Signatures
-
Loads dropped DLL 8 IoCs
pid Process 2560 rundll32.exe 2560 rundll32.exe 2560 rundll32.exe 2560 rundll32.exe 2088 rundll32.exe 2088 rundll32.exe 2088 rundll32.exe 2088 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2832 3040 7526a108e24d1f7479bd33864057b806e0bc63f0f55fb234263f7a8ea751a6a6.exe 28 PID 3040 wrote to memory of 2832 3040 7526a108e24d1f7479bd33864057b806e0bc63f0f55fb234263f7a8ea751a6a6.exe 28 PID 3040 wrote to memory of 2832 3040 7526a108e24d1f7479bd33864057b806e0bc63f0f55fb234263f7a8ea751a6a6.exe 28 PID 3040 wrote to memory of 2832 3040 7526a108e24d1f7479bd33864057b806e0bc63f0f55fb234263f7a8ea751a6a6.exe 28 PID 2832 wrote to memory of 2560 2832 control.exe 29 PID 2832 wrote to memory of 2560 2832 control.exe 29 PID 2832 wrote to memory of 2560 2832 control.exe 29 PID 2832 wrote to memory of 2560 2832 control.exe 29 PID 2832 wrote to memory of 2560 2832 control.exe 29 PID 2832 wrote to memory of 2560 2832 control.exe 29 PID 2832 wrote to memory of 2560 2832 control.exe 29 PID 2560 wrote to memory of 2100 2560 rundll32.exe 30 PID 2560 wrote to memory of 2100 2560 rundll32.exe 30 PID 2560 wrote to memory of 2100 2560 rundll32.exe 30 PID 2560 wrote to memory of 2100 2560 rundll32.exe 30 PID 2100 wrote to memory of 2088 2100 RunDll32.exe 31 PID 2100 wrote to memory of 2088 2100 RunDll32.exe 31 PID 2100 wrote to memory of 2088 2100 RunDll32.exe 31 PID 2100 wrote to memory of 2088 2100 RunDll32.exe 31 PID 2100 wrote to memory of 2088 2100 RunDll32.exe 31 PID 2100 wrote to memory of 2088 2100 RunDll32.exe 31 PID 2100 wrote to memory of 2088 2100 RunDll32.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\7526a108e24d1f7479bd33864057b806e0bc63f0f55fb234263f7a8ea751a6a6.exe"C:\Users\Admin\AppData\Local\Temp\7526a108e24d1f7479bd33864057b806e0bc63f0f55fb234263f7a8ea751a6a6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\27BC_bF.cpl",2⤵
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\27BC_bF.cpl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\27BC_bF.cpl",4⤵
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\27BC_bF.cpl",5⤵
- Loads dropped DLL
PID:2088
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD59649c9b7fc5e4df4152c258c95acbd0d
SHA1d57b276c577d86268ea672a8d084a24c5ba33a99
SHA2568b6ddd483fd4e6dd2347d70c4059a611709241be03e12773bfe13f3c2e7f6aad
SHA512f937971b39f89a471f8c15dce68d1bf92771061e0db18ba3bfebec0891e72290975a5507c95e446ec0a62bb1ec45a727fbf335c887913c35df454832629319f7
-
Filesize
1.3MB
MD59649c9b7fc5e4df4152c258c95acbd0d
SHA1d57b276c577d86268ea672a8d084a24c5ba33a99
SHA2568b6ddd483fd4e6dd2347d70c4059a611709241be03e12773bfe13f3c2e7f6aad
SHA512f937971b39f89a471f8c15dce68d1bf92771061e0db18ba3bfebec0891e72290975a5507c95e446ec0a62bb1ec45a727fbf335c887913c35df454832629319f7
-
Filesize
1.3MB
MD59649c9b7fc5e4df4152c258c95acbd0d
SHA1d57b276c577d86268ea672a8d084a24c5ba33a99
SHA2568b6ddd483fd4e6dd2347d70c4059a611709241be03e12773bfe13f3c2e7f6aad
SHA512f937971b39f89a471f8c15dce68d1bf92771061e0db18ba3bfebec0891e72290975a5507c95e446ec0a62bb1ec45a727fbf335c887913c35df454832629319f7
-
Filesize
1.3MB
MD59649c9b7fc5e4df4152c258c95acbd0d
SHA1d57b276c577d86268ea672a8d084a24c5ba33a99
SHA2568b6ddd483fd4e6dd2347d70c4059a611709241be03e12773bfe13f3c2e7f6aad
SHA512f937971b39f89a471f8c15dce68d1bf92771061e0db18ba3bfebec0891e72290975a5507c95e446ec0a62bb1ec45a727fbf335c887913c35df454832629319f7
-
Filesize
1.3MB
MD59649c9b7fc5e4df4152c258c95acbd0d
SHA1d57b276c577d86268ea672a8d084a24c5ba33a99
SHA2568b6ddd483fd4e6dd2347d70c4059a611709241be03e12773bfe13f3c2e7f6aad
SHA512f937971b39f89a471f8c15dce68d1bf92771061e0db18ba3bfebec0891e72290975a5507c95e446ec0a62bb1ec45a727fbf335c887913c35df454832629319f7
-
Filesize
1.3MB
MD59649c9b7fc5e4df4152c258c95acbd0d
SHA1d57b276c577d86268ea672a8d084a24c5ba33a99
SHA2568b6ddd483fd4e6dd2347d70c4059a611709241be03e12773bfe13f3c2e7f6aad
SHA512f937971b39f89a471f8c15dce68d1bf92771061e0db18ba3bfebec0891e72290975a5507c95e446ec0a62bb1ec45a727fbf335c887913c35df454832629319f7
-
Filesize
1.3MB
MD59649c9b7fc5e4df4152c258c95acbd0d
SHA1d57b276c577d86268ea672a8d084a24c5ba33a99
SHA2568b6ddd483fd4e6dd2347d70c4059a611709241be03e12773bfe13f3c2e7f6aad
SHA512f937971b39f89a471f8c15dce68d1bf92771061e0db18ba3bfebec0891e72290975a5507c95e446ec0a62bb1ec45a727fbf335c887913c35df454832629319f7
-
Filesize
1.3MB
MD59649c9b7fc5e4df4152c258c95acbd0d
SHA1d57b276c577d86268ea672a8d084a24c5ba33a99
SHA2568b6ddd483fd4e6dd2347d70c4059a611709241be03e12773bfe13f3c2e7f6aad
SHA512f937971b39f89a471f8c15dce68d1bf92771061e0db18ba3bfebec0891e72290975a5507c95e446ec0a62bb1ec45a727fbf335c887913c35df454832629319f7
-
Filesize
1.3MB
MD59649c9b7fc5e4df4152c258c95acbd0d
SHA1d57b276c577d86268ea672a8d084a24c5ba33a99
SHA2568b6ddd483fd4e6dd2347d70c4059a611709241be03e12773bfe13f3c2e7f6aad
SHA512f937971b39f89a471f8c15dce68d1bf92771061e0db18ba3bfebec0891e72290975a5507c95e446ec0a62bb1ec45a727fbf335c887913c35df454832629319f7