Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
27/08/2023, 13:31
Static task
static1
Behavioral task
behavioral1
Sample
8be53871f6ee10795c892f5a1274b30608e7b3e8b722bc6d88484f49cfd8f580.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
8be53871f6ee10795c892f5a1274b30608e7b3e8b722bc6d88484f49cfd8f580.exe
Resource
win10v2004-20230703-en
General
-
Target
8be53871f6ee10795c892f5a1274b30608e7b3e8b722bc6d88484f49cfd8f580.exe
-
Size
3.2MB
-
MD5
787db21989a9b6a297a53c33bd8827d4
-
SHA1
14c3a0d5fa7ebf062a729140d2f8c97e647c4ff3
-
SHA256
8be53871f6ee10795c892f5a1274b30608e7b3e8b722bc6d88484f49cfd8f580
-
SHA512
36c5105cae3c08ad044d8e8b06742a8f99b6ad24bc3b0f6f62104a771346263e95759d257525745690b203331ff278226c121a737d4348c4c986ab9a6b941d52
-
SSDEEP
49152:3BFsVkDH/AEeB4IFlBgcO8Ipc8dOjYAZ3oHrj/i6jbY:RS+DH/AEe2IFlBgcIpc8dOsI3QJj8
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2580 cmd.exe 2560 csrss.exe -
resource yara_rule behavioral1/files/0x000b00000001223e-15.dat upx behavioral1/files/0x000b00000001223e-23.dat upx behavioral1/memory/2580-13-0x0000000000850000-0x0000000000858000-memory.dmp upx behavioral1/memory/2560-24-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\cmd.exe = "C:\\Windows\\cmd.exe" cmd.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\AppPatch\NetSyst81.dll csrss.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\cmd.exe 8be53871f6ee10795c892f5a1274b30608e7b3e8b722bc6d88484f49cfd8f580.exe File created C:\Windows\csrss.exe cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2640 8be53871f6ee10795c892f5a1274b30608e7b3e8b722bc6d88484f49cfd8f580.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2640 8be53871f6ee10795c892f5a1274b30608e7b3e8b722bc6d88484f49cfd8f580.exe 2640 8be53871f6ee10795c892f5a1274b30608e7b3e8b722bc6d88484f49cfd8f580.exe 2580 cmd.exe 2580 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2580 2640 8be53871f6ee10795c892f5a1274b30608e7b3e8b722bc6d88484f49cfd8f580.exe 28 PID 2640 wrote to memory of 2580 2640 8be53871f6ee10795c892f5a1274b30608e7b3e8b722bc6d88484f49cfd8f580.exe 28 PID 2640 wrote to memory of 2580 2640 8be53871f6ee10795c892f5a1274b30608e7b3e8b722bc6d88484f49cfd8f580.exe 28 PID 2640 wrote to memory of 2580 2640 8be53871f6ee10795c892f5a1274b30608e7b3e8b722bc6d88484f49cfd8f580.exe 28 PID 2580 wrote to memory of 2560 2580 cmd.exe 29 PID 2580 wrote to memory of 2560 2580 cmd.exe 29 PID 2580 wrote to memory of 2560 2580 cmd.exe 29 PID 2580 wrote to memory of 2560 2580 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\8be53871f6ee10795c892f5a1274b30608e7b3e8b722bc6d88484f49cfd8f580.exe"C:\Users\Admin\AppData\Local\Temp\8be53871f6ee10795c892f5a1274b30608e7b3e8b722bc6d88484f49cfd8f580.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\cmd.exe"C:\Windows\cmd.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\csrss.exe"C:\Windows\csrss.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:2560
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
808KB
MD5d5f5f0ebb134ca0c67ab60c659a1ae41
SHA1529dd9fbb43659279d083862c0208c7d883d72cf
SHA256598fafb86d687aafc0db520f2534fff2cc449366e0a4a5858f4fc050f4940740
SHA512439a10d432aaaf40d53ffbdf60817cacae4c3518adc7d4ad8be947f90f19c50acbf6bac5a018d063441fd79af02ddd68c65f8fc496d8a81afdd002df478cb96c
-
Filesize
808KB
MD5d5f5f0ebb134ca0c67ab60c659a1ae41
SHA1529dd9fbb43659279d083862c0208c7d883d72cf
SHA256598fafb86d687aafc0db520f2534fff2cc449366e0a4a5858f4fc050f4940740
SHA512439a10d432aaaf40d53ffbdf60817cacae4c3518adc7d4ad8be947f90f19c50acbf6bac5a018d063441fd79af02ddd68c65f8fc496d8a81afdd002df478cb96c
-
Filesize
6KB
MD5b58a5bc5705e66b3fdaeba17e346ffe6
SHA1b3ba09b9625096119a28ba979e1cafb7be769786
SHA25655f1c3dc84b498fc3bbf05d80e23cb168716053989f922d4dcf53c9279fc66cb
SHA5121343e67cee9cd1ad746d12d41ae1c9a3e98d19b728491c4e813e8cfa708e5978557e3f206c921955538a6af60246e6ea8b4349d5c62289442cbb61c3d255456f
-
Filesize
6KB
MD5b58a5bc5705e66b3fdaeba17e346ffe6
SHA1b3ba09b9625096119a28ba979e1cafb7be769786
SHA25655f1c3dc84b498fc3bbf05d80e23cb168716053989f922d4dcf53c9279fc66cb
SHA5121343e67cee9cd1ad746d12d41ae1c9a3e98d19b728491c4e813e8cfa708e5978557e3f206c921955538a6af60246e6ea8b4349d5c62289442cbb61c3d255456f