Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
154s -
max time network
164s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
02/09/2023, 18:37
Static task
static1
Behavioral task
behavioral1
Sample
2ee96582f8901cf86bbbfb191dfaec0b8389a5b3059fa32d1757fc5e6ad625fc.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
2ee96582f8901cf86bbbfb191dfaec0b8389a5b3059fa32d1757fc5e6ad625fc.exe
Resource
win10v2004-20230831-en
General
-
Target
2ee96582f8901cf86bbbfb191dfaec0b8389a5b3059fa32d1757fc5e6ad625fc.exe
-
Size
1.1MB
-
MD5
703cb6483aac00afe66453d67698964e
-
SHA1
d07cd417c7756483d6faa9a64a9681da73d59e16
-
SHA256
2ee96582f8901cf86bbbfb191dfaec0b8389a5b3059fa32d1757fc5e6ad625fc
-
SHA512
e160c755969a5f8939d1b463e85924ccf9067779db72aafba13a402d420db85644310abb7e6c0b33f3580a17579c1395247320ed4fd1eaa14ee5cc48ef30333c
-
SSDEEP
24576:4qg8zeKPja85nd0T9RAN0P30mqym6hzsGoRlG4qqjwg1mRWRux:44zeI/0XqymkulG4qmxmiux
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\win.lnk 2ee96582f8901cf86bbbfb191dfaec0b8389a5b3059fa32d1757fc5e6ad625fc.exe -
Loads dropped DLL 2 IoCs
pid Process 1896 2ee96582f8901cf86bbbfb191dfaec0b8389a5b3059fa32d1757fc5e6ad625fc.exe 1896 2ee96582f8901cf86bbbfb191dfaec0b8389a5b3059fa32d1757fc5e6ad625fc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\360safo = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\svchcst.exe" 2ee96582f8901cf86bbbfb191dfaec0b8389a5b3059fa32d1757fc5e6ad625fc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1896 2ee96582f8901cf86bbbfb191dfaec0b8389a5b3059fa32d1757fc5e6ad625fc.exe 1896 2ee96582f8901cf86bbbfb191dfaec0b8389a5b3059fa32d1757fc5e6ad625fc.exe 1896 2ee96582f8901cf86bbbfb191dfaec0b8389a5b3059fa32d1757fc5e6ad625fc.exe 1896 2ee96582f8901cf86bbbfb191dfaec0b8389a5b3059fa32d1757fc5e6ad625fc.exe 1896 2ee96582f8901cf86bbbfb191dfaec0b8389a5b3059fa32d1757fc5e6ad625fc.exe 1896 2ee96582f8901cf86bbbfb191dfaec0b8389a5b3059fa32d1757fc5e6ad625fc.exe 1896 2ee96582f8901cf86bbbfb191dfaec0b8389a5b3059fa32d1757fc5e6ad625fc.exe 1896 2ee96582f8901cf86bbbfb191dfaec0b8389a5b3059fa32d1757fc5e6ad625fc.exe 1896 2ee96582f8901cf86bbbfb191dfaec0b8389a5b3059fa32d1757fc5e6ad625fc.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1896 2ee96582f8901cf86bbbfb191dfaec0b8389a5b3059fa32d1757fc5e6ad625fc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1896 2ee96582f8901cf86bbbfb191dfaec0b8389a5b3059fa32d1757fc5e6ad625fc.exe 1896 2ee96582f8901cf86bbbfb191dfaec0b8389a5b3059fa32d1757fc5e6ad625fc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1896 wrote to memory of 2112 1896 2ee96582f8901cf86bbbfb191dfaec0b8389a5b3059fa32d1757fc5e6ad625fc.exe 28 PID 1896 wrote to memory of 2112 1896 2ee96582f8901cf86bbbfb191dfaec0b8389a5b3059fa32d1757fc5e6ad625fc.exe 28 PID 1896 wrote to memory of 2112 1896 2ee96582f8901cf86bbbfb191dfaec0b8389a5b3059fa32d1757fc5e6ad625fc.exe 28 PID 1896 wrote to memory of 2112 1896 2ee96582f8901cf86bbbfb191dfaec0b8389a5b3059fa32d1757fc5e6ad625fc.exe 28 PID 1896 wrote to memory of 2304 1896 2ee96582f8901cf86bbbfb191dfaec0b8389a5b3059fa32d1757fc5e6ad625fc.exe 29 PID 1896 wrote to memory of 2304 1896 2ee96582f8901cf86bbbfb191dfaec0b8389a5b3059fa32d1757fc5e6ad625fc.exe 29 PID 1896 wrote to memory of 2304 1896 2ee96582f8901cf86bbbfb191dfaec0b8389a5b3059fa32d1757fc5e6ad625fc.exe 29 PID 1896 wrote to memory of 2304 1896 2ee96582f8901cf86bbbfb191dfaec0b8389a5b3059fa32d1757fc5e6ad625fc.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ee96582f8901cf86bbbfb191dfaec0b8389a5b3059fa32d1757fc5e6ad625fc.exe"C:\Users\Admin\AppData\Local\Temp\2ee96582f8901cf86bbbfb191dfaec0b8389a5b3059fa32d1757fc5e6ad625fc.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:2112
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD55611518085f0e601b7af262b73ca1e21
SHA1679e284b4e15030b11e9fcab9e54090f6128c6c2
SHA2568e59e3dc5427519534af0cfb2713d94388d03240f4f6d2c9ec6a13db1d9812ab
SHA5120fc4c396d00386c7942366bab8bf30b59723f4a8b0d5bfe00dbc4a74df13acb68cd6616694a81de199bcd2409ff41b6dcaca931614165deefadd728350c52bcc
-
Filesize
753B
MD510ac1fc5c64c991d40fc528f691e43ac
SHA1a53c77243ae87ce8bd1d8be56d9d6c6fbc50713d
SHA256cd5310560a368e3c322897f18fb37adb5017ef0b7797beab56b37a7e8f82b4e5
SHA512aa67e3670d3e24b662ac638facf6ec3a62ecbaa5e082df7b2fc3b3e52144a7325cc1affc83d2221fba88a5850120e6da48e18035b2ed71feae70abcf95bb0bab
-
Filesize
753B
MD510ac1fc5c64c991d40fc528f691e43ac
SHA1a53c77243ae87ce8bd1d8be56d9d6c6fbc50713d
SHA256cd5310560a368e3c322897f18fb37adb5017ef0b7797beab56b37a7e8f82b4e5
SHA512aa67e3670d3e24b662ac638facf6ec3a62ecbaa5e082df7b2fc3b3e52144a7325cc1affc83d2221fba88a5850120e6da48e18035b2ed71feae70abcf95bb0bab
-
Filesize
1.1MB
MD511807cb05618c4b6608f14e2cf4ba3b6
SHA10b53962ddbd29d004c945f24f7a046c04e307bdf
SHA256040fcd219b68295f9deaf342d66eb34f86714c6be2c35c0c9b235cce191fd46a
SHA51293b0ff78384e9cf55e3ef030f9547be6e24e81c97f8a8179cde5e8566bb8fcd331fe0c7dca0f3ca7e549a6125e302f14c52ab54aaac0c38c405a31f7354863ee
-
Filesize
1.1MB
MD511807cb05618c4b6608f14e2cf4ba3b6
SHA10b53962ddbd29d004c945f24f7a046c04e307bdf
SHA256040fcd219b68295f9deaf342d66eb34f86714c6be2c35c0c9b235cce191fd46a
SHA51293b0ff78384e9cf55e3ef030f9547be6e24e81c97f8a8179cde5e8566bb8fcd331fe0c7dca0f3ca7e549a6125e302f14c52ab54aaac0c38c405a31f7354863ee
-
Filesize
1.1MB
MD511807cb05618c4b6608f14e2cf4ba3b6
SHA10b53962ddbd29d004c945f24f7a046c04e307bdf
SHA256040fcd219b68295f9deaf342d66eb34f86714c6be2c35c0c9b235cce191fd46a
SHA51293b0ff78384e9cf55e3ef030f9547be6e24e81c97f8a8179cde5e8566bb8fcd331fe0c7dca0f3ca7e549a6125e302f14c52ab54aaac0c38c405a31f7354863ee