Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20230824-en -
resource tags
arch:x64arch:x86image:win7-20230824-enlocale:en-usos:windows7-x64system -
submitted
29/08/2023, 18:47
Static task
static1
Behavioral task
behavioral1
Sample
22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe
Resource
win10v2004-20230703-en
General
-
Target
22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe
-
Size
8.0MB
-
MD5
18620785ff64219f20bf5f1f6e797342
-
SHA1
afb51d0b92677de87042da47c6505f0a9f78af75
-
SHA256
22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739
-
SHA512
399988e34ba2e8bc5503fc97b92457f9354ecff2a52d783b0273e3daf6b6b5ed19d10bb518c6f8abf1d05e87e534daaf74842d5f28c4f2b003d59b69008a4902
-
SSDEEP
196608:5EtZkQkQsSkrQzw6Dqs/y+cNBKbQ4hrivFQhZI26G/Udrqn2:itGQkLNz69a+c684BAFQvF6S3n2
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 612 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe -
Executes dropped EXE 1 IoCs
pid Process 612 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe -
Loads dropped DLL 1 IoCs
pid Process 524 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe File opened (read-only) \??\B: 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe File opened (read-only) \??\E: 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe File opened (read-only) \??\M: 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe File opened (read-only) \??\O: 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe File opened (read-only) \??\R: 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe File opened (read-only) \??\S: 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe File opened (read-only) \??\T: 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe File opened (read-only) \??\Z: 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe File opened (read-only) \??\G: 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe File opened (read-only) \??\L: 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe File opened (read-only) \??\N: 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe File opened (read-only) \??\K: 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe File opened (read-only) \??\W: 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe File opened (read-only) \??\X: 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe File opened (read-only) \??\Y: 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe File opened (read-only) \??\H: 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe File opened (read-only) \??\I: 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe File opened (read-only) \??\J: 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe File opened (read-only) \??\P: 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe File opened (read-only) \??\Q: 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe File opened (read-only) \??\U: 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe File opened (read-only) \??\V: 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1528014236-771305907-3973026625-1000\Software\Microsoft\Internet Explorer\Main 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 612 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 524 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe 524 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe 524 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe 524 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe 524 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe 612 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe 612 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe 612 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe 612 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe 612 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 524 wrote to memory of 612 524 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe 32 PID 524 wrote to memory of 612 524 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe 32 PID 524 wrote to memory of 612 524 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe 32 PID 524 wrote to memory of 612 524 22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe"C:\Users\Admin\AppData\Local\Temp\22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:524 -
C:\·çÔÆ´«Ææ\22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exeC:\·çÔÆ´«Ææ\22cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD549322de86c414042b7a13f8282e55141
SHA11ca2e6be4a8fc1c6ea62464727044cf8f3cb8aed
SHA256643b5eb3767355428866a8f243dc129f12e805ccba5e8a649ff1e5ecd1f31a29
SHA512b275bfba91cfc05635eec21d02ee2e29a92a757d18b6db02ee85cd858fa082759d947df1a3d57b37042a3f86381f6846024a65ce58f517aa5a5baa637775d174
-
Filesize
5KB
MD556adfd0c123e2b4ffb67a1f29833f4db
SHA112c9aaf42ff420d8f7f6bf2da5897914cfcfca73
SHA256c2809df6b5f01443b434cb25ef8116f0f8c9630b060c608b89d7db05a4009184
SHA512c087c200d796afc7112284f151882178918109aee0e41eb8190ff018ef9e7a9b1098b68faf79d95626fc7af2d7e80a95f874437bdd95672bfd8ad85b5f6448a4
-
Filesize
11B
MD53113680af3d27410ad9736510cf6694b
SHA12afd3a340b72411d3ce6c085f3bdc9bb28a304ff
SHA256f018c9cabb7a61ddbe5be91a75e3c7b823922ec876323b96710a353b98c4e0b8
SHA51277b7d8a99d44c7de747c536ccdaee90154d469177f3d545b84f36e6022b102c65f885b52abdcea10891c76cb3c7298e350a9f19696af9517876e85cae2f832d2
-
Filesize
102B
MD5297c92bec11aba48c29df617048da371
SHA17358a4c412f6c2c0dcbafba3df691b5a691d7eaf
SHA2562d7d5d0c19bfa1aa9e1fb97d41ef68c566f55aac61e514735304f9053c026396
SHA512c22d7e0fcb112c0c30482f21f546007e9a20308f879dab240367b67c862204cf0cda6f53f3aed0f56078891bca7a54ae70b4d7bfb8a0eb23a15c1bc56ec79d59
-
Filesize
8.0MB
MD518620785ff64219f20bf5f1f6e797342
SHA1afb51d0b92677de87042da47c6505f0a9f78af75
SHA25622cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739
SHA512399988e34ba2e8bc5503fc97b92457f9354ecff2a52d783b0273e3daf6b6b5ed19d10bb518c6f8abf1d05e87e534daaf74842d5f28c4f2b003d59b69008a4902
-
Filesize
8.0MB
MD518620785ff64219f20bf5f1f6e797342
SHA1afb51d0b92677de87042da47c6505f0a9f78af75
SHA25622cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739
SHA512399988e34ba2e8bc5503fc97b92457f9354ecff2a52d783b0273e3daf6b6b5ed19d10bb518c6f8abf1d05e87e534daaf74842d5f28c4f2b003d59b69008a4902
-
Filesize
8.0MB
MD518620785ff64219f20bf5f1f6e797342
SHA1afb51d0b92677de87042da47c6505f0a9f78af75
SHA25622cf9fe9c4014a495789d9895ac7a3436166e4377dcc52cbbe1523a30137d739
SHA512399988e34ba2e8bc5503fc97b92457f9354ecff2a52d783b0273e3daf6b6b5ed19d10bb518c6f8abf1d05e87e534daaf74842d5f28c4f2b003d59b69008a4902