Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
01/09/2023, 22:53
Static task
static1
Behavioral task
behavioral1
Sample
99b64fb5afa891594926f40154df1cf5.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
99b64fb5afa891594926f40154df1cf5.exe
Resource
win10v2004-20230831-en
General
-
Target
99b64fb5afa891594926f40154df1cf5.exe
-
Size
2.3MB
-
MD5
99b64fb5afa891594926f40154df1cf5
-
SHA1
8f0361a9a69d166e36a58cfbc30ac237107b95a9
-
SHA256
ecb9d6e6bd48f11c73f03c7fa605449eb2828dac1605069b1abc94f6e915dcde
-
SHA512
d3057a4069a7c42968c995ddf17c95a7487aab6e73a380d96da637b33831f5083d359a76a6dfd9ed2f5ced29d02e4c6dc1c0e65ef84b679e70f1b9806c546437
-
SSDEEP
49152:acbz6i3uwY1/PHXL0yx8TRv5c/Y8kHlsTg+Y7zKSLpCdLWL1:acbVuw0/ws89Rc/Y8oCg+OzNLpWLQ1
Malware Config
Signatures
-
Loads dropped DLL 8 IoCs
pid Process 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe 2800 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe 2520 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1288 wrote to memory of 2116 1288 99b64fb5afa891594926f40154df1cf5.exe 28 PID 1288 wrote to memory of 2116 1288 99b64fb5afa891594926f40154df1cf5.exe 28 PID 1288 wrote to memory of 2116 1288 99b64fb5afa891594926f40154df1cf5.exe 28 PID 1288 wrote to memory of 2116 1288 99b64fb5afa891594926f40154df1cf5.exe 28 PID 2116 wrote to memory of 2800 2116 control.exe 29 PID 2116 wrote to memory of 2800 2116 control.exe 29 PID 2116 wrote to memory of 2800 2116 control.exe 29 PID 2116 wrote to memory of 2800 2116 control.exe 29 PID 2116 wrote to memory of 2800 2116 control.exe 29 PID 2116 wrote to memory of 2800 2116 control.exe 29 PID 2116 wrote to memory of 2800 2116 control.exe 29 PID 2800 wrote to memory of 2852 2800 rundll32.exe 32 PID 2800 wrote to memory of 2852 2800 rundll32.exe 32 PID 2800 wrote to memory of 2852 2800 rundll32.exe 32 PID 2800 wrote to memory of 2852 2800 rundll32.exe 32 PID 2852 wrote to memory of 2520 2852 RunDll32.exe 33 PID 2852 wrote to memory of 2520 2852 RunDll32.exe 33 PID 2852 wrote to memory of 2520 2852 RunDll32.exe 33 PID 2852 wrote to memory of 2520 2852 RunDll32.exe 33 PID 2852 wrote to memory of 2520 2852 RunDll32.exe 33 PID 2852 wrote to memory of 2520 2852 RunDll32.exe 33 PID 2852 wrote to memory of 2520 2852 RunDll32.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\99b64fb5afa891594926f40154df1cf5.exe"C:\Users\Admin\AppData\Local\Temp\99b64fb5afa891594926f40154df1cf5.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\IJdB.cpl",2⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\IJdB.cpl",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\IJdB.cpl",4⤵
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\IJdB.cpl",5⤵
- Loads dropped DLL
PID:2520
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5f79ad2db96c20db2a18eb4692c50c108
SHA1c81b568e6950cc0d1da12ce07851dcb0aa09141b
SHA256a2e701e95dfd27857534eb048911045055f950db3ca31760d146c8c7f08fc634
SHA512e4b26d8dda8cfb668fbe5c9cd5025b21b5a816786f1fa999a917d14b1be4cc33c0fbb0ef4f931924c54bcb03cdc460264c30e44af5bcde65df89725adb2e8f40
-
Filesize
2.1MB
MD5f79ad2db96c20db2a18eb4692c50c108
SHA1c81b568e6950cc0d1da12ce07851dcb0aa09141b
SHA256a2e701e95dfd27857534eb048911045055f950db3ca31760d146c8c7f08fc634
SHA512e4b26d8dda8cfb668fbe5c9cd5025b21b5a816786f1fa999a917d14b1be4cc33c0fbb0ef4f931924c54bcb03cdc460264c30e44af5bcde65df89725adb2e8f40
-
Filesize
2.1MB
MD5f79ad2db96c20db2a18eb4692c50c108
SHA1c81b568e6950cc0d1da12ce07851dcb0aa09141b
SHA256a2e701e95dfd27857534eb048911045055f950db3ca31760d146c8c7f08fc634
SHA512e4b26d8dda8cfb668fbe5c9cd5025b21b5a816786f1fa999a917d14b1be4cc33c0fbb0ef4f931924c54bcb03cdc460264c30e44af5bcde65df89725adb2e8f40
-
Filesize
2.1MB
MD5f79ad2db96c20db2a18eb4692c50c108
SHA1c81b568e6950cc0d1da12ce07851dcb0aa09141b
SHA256a2e701e95dfd27857534eb048911045055f950db3ca31760d146c8c7f08fc634
SHA512e4b26d8dda8cfb668fbe5c9cd5025b21b5a816786f1fa999a917d14b1be4cc33c0fbb0ef4f931924c54bcb03cdc460264c30e44af5bcde65df89725adb2e8f40
-
Filesize
2.1MB
MD5f79ad2db96c20db2a18eb4692c50c108
SHA1c81b568e6950cc0d1da12ce07851dcb0aa09141b
SHA256a2e701e95dfd27857534eb048911045055f950db3ca31760d146c8c7f08fc634
SHA512e4b26d8dda8cfb668fbe5c9cd5025b21b5a816786f1fa999a917d14b1be4cc33c0fbb0ef4f931924c54bcb03cdc460264c30e44af5bcde65df89725adb2e8f40
-
Filesize
2.1MB
MD5f79ad2db96c20db2a18eb4692c50c108
SHA1c81b568e6950cc0d1da12ce07851dcb0aa09141b
SHA256a2e701e95dfd27857534eb048911045055f950db3ca31760d146c8c7f08fc634
SHA512e4b26d8dda8cfb668fbe5c9cd5025b21b5a816786f1fa999a917d14b1be4cc33c0fbb0ef4f931924c54bcb03cdc460264c30e44af5bcde65df89725adb2e8f40
-
Filesize
2.1MB
MD5f79ad2db96c20db2a18eb4692c50c108
SHA1c81b568e6950cc0d1da12ce07851dcb0aa09141b
SHA256a2e701e95dfd27857534eb048911045055f950db3ca31760d146c8c7f08fc634
SHA512e4b26d8dda8cfb668fbe5c9cd5025b21b5a816786f1fa999a917d14b1be4cc33c0fbb0ef4f931924c54bcb03cdc460264c30e44af5bcde65df89725adb2e8f40
-
Filesize
2.1MB
MD5f79ad2db96c20db2a18eb4692c50c108
SHA1c81b568e6950cc0d1da12ce07851dcb0aa09141b
SHA256a2e701e95dfd27857534eb048911045055f950db3ca31760d146c8c7f08fc634
SHA512e4b26d8dda8cfb668fbe5c9cd5025b21b5a816786f1fa999a917d14b1be4cc33c0fbb0ef4f931924c54bcb03cdc460264c30e44af5bcde65df89725adb2e8f40
-
Filesize
2.1MB
MD5f79ad2db96c20db2a18eb4692c50c108
SHA1c81b568e6950cc0d1da12ce07851dcb0aa09141b
SHA256a2e701e95dfd27857534eb048911045055f950db3ca31760d146c8c7f08fc634
SHA512e4b26d8dda8cfb668fbe5c9cd5025b21b5a816786f1fa999a917d14b1be4cc33c0fbb0ef4f931924c54bcb03cdc460264c30e44af5bcde65df89725adb2e8f40