Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
18/09/2023, 02:42
Static task
static1
Behavioral task
behavioral1
Sample
714d0fd0cd52facb8993c3029fd0281745abbcbd1e76fbbd68c45370abf737b0.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
714d0fd0cd52facb8993c3029fd0281745abbcbd1e76fbbd68c45370abf737b0.exe
Resource
win10v2004-20230915-en
General
-
Target
714d0fd0cd52facb8993c3029fd0281745abbcbd1e76fbbd68c45370abf737b0.exe
-
Size
912KB
-
MD5
6deb78a5534ff19df00880aba40abbfc
-
SHA1
07ead9e52f2c770758d555363a194ad3222794b8
-
SHA256
714d0fd0cd52facb8993c3029fd0281745abbcbd1e76fbbd68c45370abf737b0
-
SHA512
98b0f81a5ac8e0f44f508578a49cec309ec14b03a969086b39b45df55f41c52b430b5176fa2da351146dfa2110b66d2c3bb864785a93b62f7c495bfa36a95c26
-
SSDEEP
12288:VBY5+TojQNj49ekhsDE1hxBzpDI0F1zqKf66yeD:VBY1jQB4AkGEfx/I0F1zbfPBD
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\DcMem\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\f762f6a.tmp" 714d0fd0cd52facb8993c3029fd0281745abbcbd1e76fbbd68c45370abf737b0.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2712 1144 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1144 714d0fd0cd52facb8993c3029fd0281745abbcbd1e76fbbd68c45370abf737b0.exe 1144 714d0fd0cd52facb8993c3029fd0281745abbcbd1e76fbbd68c45370abf737b0.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1144 714d0fd0cd52facb8993c3029fd0281745abbcbd1e76fbbd68c45370abf737b0.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1144 714d0fd0cd52facb8993c3029fd0281745abbcbd1e76fbbd68c45370abf737b0.exe 1144 714d0fd0cd52facb8993c3029fd0281745abbcbd1e76fbbd68c45370abf737b0.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1144 wrote to memory of 2712 1144 714d0fd0cd52facb8993c3029fd0281745abbcbd1e76fbbd68c45370abf737b0.exe 29 PID 1144 wrote to memory of 2712 1144 714d0fd0cd52facb8993c3029fd0281745abbcbd1e76fbbd68c45370abf737b0.exe 29 PID 1144 wrote to memory of 2712 1144 714d0fd0cd52facb8993c3029fd0281745abbcbd1e76fbbd68c45370abf737b0.exe 29 PID 1144 wrote to memory of 2712 1144 714d0fd0cd52facb8993c3029fd0281745abbcbd1e76fbbd68c45370abf737b0.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\714d0fd0cd52facb8993c3029fd0281745abbcbd1e76fbbd68c45370abf737b0.exe"C:\Users\Admin\AppData\Local\Temp\714d0fd0cd52facb8993c3029fd0281745abbcbd1e76fbbd68c45370abf737b0.exe"1⤵
- Sets service image path in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1144 -s 3682⤵
- Program crash
PID:2712
-