Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
20/09/2023, 17:24
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
General
-
Target
file.exe
-
Size
1.4MB
-
MD5
748b2d86b4a88da177bd92331e79986e
-
SHA1
3971c0981eacb1c7d6efec7617eeb7097f6d3d98
-
SHA256
9ed376f6a207601c6cd314a0475feca5ba4b0ff3077b048a8eeaac0aab30d4ac
-
SHA512
e4d0693553b9dd49bfaea7b5f619124c0fe1d743a6df9475dc54ed5874f5cf1eb422e6bea41cb89d77b4258856766908f32832eca8d25e3d52562110a7000901
-
SSDEEP
24576:UyMrGd44yJPRGgqOy0v2uO3RLBYVVqyp0b9z7dZS+0ESDdnOdCXVKWiwT8HHnrn:jMrGQRGghU3Avqq0Z3/iESpnOdGrYnrc
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2948 v7449632.exe 2296 v8496377.exe 2752 v8826133.exe 2668 a1840366.exe -
Loads dropped DLL 13 IoCs
pid Process 3028 file.exe 2948 v7449632.exe 2948 v7449632.exe 2296 v8496377.exe 2296 v8496377.exe 2752 v8826133.exe 2752 v8826133.exe 2752 v8826133.exe 2668 a1840366.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe 2724 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v7449632.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v8496377.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v8826133.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2668 set thread context of 2764 2668 a1840366.exe 33 -
Program crash 2 IoCs
pid pid_target Process procid_target 2724 2668 WerFault.exe 31 2708 2764 WerFault.exe 33 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2948 3028 file.exe 28 PID 3028 wrote to memory of 2948 3028 file.exe 28 PID 3028 wrote to memory of 2948 3028 file.exe 28 PID 3028 wrote to memory of 2948 3028 file.exe 28 PID 3028 wrote to memory of 2948 3028 file.exe 28 PID 3028 wrote to memory of 2948 3028 file.exe 28 PID 3028 wrote to memory of 2948 3028 file.exe 28 PID 2948 wrote to memory of 2296 2948 v7449632.exe 29 PID 2948 wrote to memory of 2296 2948 v7449632.exe 29 PID 2948 wrote to memory of 2296 2948 v7449632.exe 29 PID 2948 wrote to memory of 2296 2948 v7449632.exe 29 PID 2948 wrote to memory of 2296 2948 v7449632.exe 29 PID 2948 wrote to memory of 2296 2948 v7449632.exe 29 PID 2948 wrote to memory of 2296 2948 v7449632.exe 29 PID 2296 wrote to memory of 2752 2296 v8496377.exe 30 PID 2296 wrote to memory of 2752 2296 v8496377.exe 30 PID 2296 wrote to memory of 2752 2296 v8496377.exe 30 PID 2296 wrote to memory of 2752 2296 v8496377.exe 30 PID 2296 wrote to memory of 2752 2296 v8496377.exe 30 PID 2296 wrote to memory of 2752 2296 v8496377.exe 30 PID 2296 wrote to memory of 2752 2296 v8496377.exe 30 PID 2752 wrote to memory of 2668 2752 v8826133.exe 31 PID 2752 wrote to memory of 2668 2752 v8826133.exe 31 PID 2752 wrote to memory of 2668 2752 v8826133.exe 31 PID 2752 wrote to memory of 2668 2752 v8826133.exe 31 PID 2752 wrote to memory of 2668 2752 v8826133.exe 31 PID 2752 wrote to memory of 2668 2752 v8826133.exe 31 PID 2752 wrote to memory of 2668 2752 v8826133.exe 31 PID 2668 wrote to memory of 2764 2668 a1840366.exe 33 PID 2668 wrote to memory of 2764 2668 a1840366.exe 33 PID 2668 wrote to memory of 2764 2668 a1840366.exe 33 PID 2668 wrote to memory of 2764 2668 a1840366.exe 33 PID 2668 wrote to memory of 2764 2668 a1840366.exe 33 PID 2668 wrote to memory of 2764 2668 a1840366.exe 33 PID 2668 wrote to memory of 2764 2668 a1840366.exe 33 PID 2668 wrote to memory of 2764 2668 a1840366.exe 33 PID 2668 wrote to memory of 2764 2668 a1840366.exe 33 PID 2668 wrote to memory of 2764 2668 a1840366.exe 33 PID 2668 wrote to memory of 2764 2668 a1840366.exe 33 PID 2668 wrote to memory of 2764 2668 a1840366.exe 33 PID 2668 wrote to memory of 2764 2668 a1840366.exe 33 PID 2668 wrote to memory of 2764 2668 a1840366.exe 33 PID 2764 wrote to memory of 2708 2764 AppLaunch.exe 35 PID 2764 wrote to memory of 2708 2764 AppLaunch.exe 35 PID 2764 wrote to memory of 2708 2764 AppLaunch.exe 35 PID 2668 wrote to memory of 2724 2668 a1840366.exe 34 PID 2764 wrote to memory of 2708 2764 AppLaunch.exe 35 PID 2668 wrote to memory of 2724 2668 a1840366.exe 34 PID 2668 wrote to memory of 2724 2668 a1840366.exe 34 PID 2764 wrote to memory of 2708 2764 AppLaunch.exe 35 PID 2764 wrote to memory of 2708 2764 AppLaunch.exe 35 PID 2764 wrote to memory of 2708 2764 AppLaunch.exe 35 PID 2668 wrote to memory of 2724 2668 a1840366.exe 34 PID 2668 wrote to memory of 2724 2668 a1840366.exe 34 PID 2668 wrote to memory of 2724 2668 a1840366.exe 34 PID 2668 wrote to memory of 2724 2668 a1840366.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7449632.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7449632.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8496377.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8496377.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8826133.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8826133.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1840366.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1840366.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 2687⤵
- Program crash
PID:2708
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2668 -s 2686⤵
- Loads dropped DLL
- Program crash
PID:2724
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD57172c4c27c118939b53a99f73bdbc0aa
SHA1012a47ae2c02558e46e738508fdded3749722a4d
SHA2561848f726ef5f8801fb393af1e6f8a9a3efb74487b796e1c72af6b963aa28ae13
SHA51268af5c0fad6059b9a38365b32f94927f22ead1215685cd9ec3b17ec72f1b659b32ae2bef07ea5d15f48e9d0bff459a2b00cab705af9f0fd6cc163de0796226d5
-
Filesize
1.3MB
MD57172c4c27c118939b53a99f73bdbc0aa
SHA1012a47ae2c02558e46e738508fdded3749722a4d
SHA2561848f726ef5f8801fb393af1e6f8a9a3efb74487b796e1c72af6b963aa28ae13
SHA51268af5c0fad6059b9a38365b32f94927f22ead1215685cd9ec3b17ec72f1b659b32ae2bef07ea5d15f48e9d0bff459a2b00cab705af9f0fd6cc163de0796226d5
-
Filesize
953KB
MD591baa50e1d7bb9b3e13c95e58f543ffb
SHA14b7e2176feb497c1f447c68d7968bae504149a3e
SHA256bfa3f1e83b9482f4ed5006a0df473a974ded15a8919bb072c96a5735d02aaa85
SHA51250f6bacd8c40833f7140d69ee4532165bb4568a1f550d6eaa5a3fab79875b20951153147dcea6bac87e61ae25ef75b405c20336dedede9ee298ef386e74f8bf1
-
Filesize
953KB
MD591baa50e1d7bb9b3e13c95e58f543ffb
SHA14b7e2176feb497c1f447c68d7968bae504149a3e
SHA256bfa3f1e83b9482f4ed5006a0df473a974ded15a8919bb072c96a5735d02aaa85
SHA51250f6bacd8c40833f7140d69ee4532165bb4568a1f550d6eaa5a3fab79875b20951153147dcea6bac87e61ae25ef75b405c20336dedede9ee298ef386e74f8bf1
-
Filesize
548KB
MD556337e5b3efd7528f87ff79a8573a2ff
SHA1397536ff8a89865854c29b192f460bb5c918fc3b
SHA25612b514ec3a91eb9b2597e965b594037cb9c15a1021f29269277652a550243eea
SHA51240b8a39a5e8d49eef6c69c954de1a4f0dee45acd48e880f9663fcb96617fb35e8de9a4c9acd48efa904ce9161818a4c8c79ddfc91b1f47f016d56fab48bdd49a
-
Filesize
548KB
MD556337e5b3efd7528f87ff79a8573a2ff
SHA1397536ff8a89865854c29b192f460bb5c918fc3b
SHA25612b514ec3a91eb9b2597e965b594037cb9c15a1021f29269277652a550243eea
SHA51240b8a39a5e8d49eef6c69c954de1a4f0dee45acd48e880f9663fcb96617fb35e8de9a4c9acd48efa904ce9161818a4c8c79ddfc91b1f47f016d56fab48bdd49a
-
Filesize
1.0MB
MD54bf9b3a4342c4227144001d34c240c83
SHA1ea09c4d8fc7a3706f2a5e124dd10a03deb839682
SHA2563177859ceeda6aee545c1443329402e13e940499638209a64041c170479ae2df
SHA512b40fd3960585165237c45569a2d62119a403fc3ba2e1d30813c5ee023e81bc686eb8d1a25cc234c9fc8ffce8ae6772c0a2b5351c7a4debbe36c7b64863e0c104
-
Filesize
1.0MB
MD54bf9b3a4342c4227144001d34c240c83
SHA1ea09c4d8fc7a3706f2a5e124dd10a03deb839682
SHA2563177859ceeda6aee545c1443329402e13e940499638209a64041c170479ae2df
SHA512b40fd3960585165237c45569a2d62119a403fc3ba2e1d30813c5ee023e81bc686eb8d1a25cc234c9fc8ffce8ae6772c0a2b5351c7a4debbe36c7b64863e0c104
-
Filesize
1.0MB
MD54bf9b3a4342c4227144001d34c240c83
SHA1ea09c4d8fc7a3706f2a5e124dd10a03deb839682
SHA2563177859ceeda6aee545c1443329402e13e940499638209a64041c170479ae2df
SHA512b40fd3960585165237c45569a2d62119a403fc3ba2e1d30813c5ee023e81bc686eb8d1a25cc234c9fc8ffce8ae6772c0a2b5351c7a4debbe36c7b64863e0c104
-
Filesize
1.3MB
MD57172c4c27c118939b53a99f73bdbc0aa
SHA1012a47ae2c02558e46e738508fdded3749722a4d
SHA2561848f726ef5f8801fb393af1e6f8a9a3efb74487b796e1c72af6b963aa28ae13
SHA51268af5c0fad6059b9a38365b32f94927f22ead1215685cd9ec3b17ec72f1b659b32ae2bef07ea5d15f48e9d0bff459a2b00cab705af9f0fd6cc163de0796226d5
-
Filesize
1.3MB
MD57172c4c27c118939b53a99f73bdbc0aa
SHA1012a47ae2c02558e46e738508fdded3749722a4d
SHA2561848f726ef5f8801fb393af1e6f8a9a3efb74487b796e1c72af6b963aa28ae13
SHA51268af5c0fad6059b9a38365b32f94927f22ead1215685cd9ec3b17ec72f1b659b32ae2bef07ea5d15f48e9d0bff459a2b00cab705af9f0fd6cc163de0796226d5
-
Filesize
953KB
MD591baa50e1d7bb9b3e13c95e58f543ffb
SHA14b7e2176feb497c1f447c68d7968bae504149a3e
SHA256bfa3f1e83b9482f4ed5006a0df473a974ded15a8919bb072c96a5735d02aaa85
SHA51250f6bacd8c40833f7140d69ee4532165bb4568a1f550d6eaa5a3fab79875b20951153147dcea6bac87e61ae25ef75b405c20336dedede9ee298ef386e74f8bf1
-
Filesize
953KB
MD591baa50e1d7bb9b3e13c95e58f543ffb
SHA14b7e2176feb497c1f447c68d7968bae504149a3e
SHA256bfa3f1e83b9482f4ed5006a0df473a974ded15a8919bb072c96a5735d02aaa85
SHA51250f6bacd8c40833f7140d69ee4532165bb4568a1f550d6eaa5a3fab79875b20951153147dcea6bac87e61ae25ef75b405c20336dedede9ee298ef386e74f8bf1
-
Filesize
548KB
MD556337e5b3efd7528f87ff79a8573a2ff
SHA1397536ff8a89865854c29b192f460bb5c918fc3b
SHA25612b514ec3a91eb9b2597e965b594037cb9c15a1021f29269277652a550243eea
SHA51240b8a39a5e8d49eef6c69c954de1a4f0dee45acd48e880f9663fcb96617fb35e8de9a4c9acd48efa904ce9161818a4c8c79ddfc91b1f47f016d56fab48bdd49a
-
Filesize
548KB
MD556337e5b3efd7528f87ff79a8573a2ff
SHA1397536ff8a89865854c29b192f460bb5c918fc3b
SHA25612b514ec3a91eb9b2597e965b594037cb9c15a1021f29269277652a550243eea
SHA51240b8a39a5e8d49eef6c69c954de1a4f0dee45acd48e880f9663fcb96617fb35e8de9a4c9acd48efa904ce9161818a4c8c79ddfc91b1f47f016d56fab48bdd49a
-
Filesize
1.0MB
MD54bf9b3a4342c4227144001d34c240c83
SHA1ea09c4d8fc7a3706f2a5e124dd10a03deb839682
SHA2563177859ceeda6aee545c1443329402e13e940499638209a64041c170479ae2df
SHA512b40fd3960585165237c45569a2d62119a403fc3ba2e1d30813c5ee023e81bc686eb8d1a25cc234c9fc8ffce8ae6772c0a2b5351c7a4debbe36c7b64863e0c104
-
Filesize
1.0MB
MD54bf9b3a4342c4227144001d34c240c83
SHA1ea09c4d8fc7a3706f2a5e124dd10a03deb839682
SHA2563177859ceeda6aee545c1443329402e13e940499638209a64041c170479ae2df
SHA512b40fd3960585165237c45569a2d62119a403fc3ba2e1d30813c5ee023e81bc686eb8d1a25cc234c9fc8ffce8ae6772c0a2b5351c7a4debbe36c7b64863e0c104
-
Filesize
1.0MB
MD54bf9b3a4342c4227144001d34c240c83
SHA1ea09c4d8fc7a3706f2a5e124dd10a03deb839682
SHA2563177859ceeda6aee545c1443329402e13e940499638209a64041c170479ae2df
SHA512b40fd3960585165237c45569a2d62119a403fc3ba2e1d30813c5ee023e81bc686eb8d1a25cc234c9fc8ffce8ae6772c0a2b5351c7a4debbe36c7b64863e0c104
-
Filesize
1.0MB
MD54bf9b3a4342c4227144001d34c240c83
SHA1ea09c4d8fc7a3706f2a5e124dd10a03deb839682
SHA2563177859ceeda6aee545c1443329402e13e940499638209a64041c170479ae2df
SHA512b40fd3960585165237c45569a2d62119a403fc3ba2e1d30813c5ee023e81bc686eb8d1a25cc234c9fc8ffce8ae6772c0a2b5351c7a4debbe36c7b64863e0c104
-
Filesize
1.0MB
MD54bf9b3a4342c4227144001d34c240c83
SHA1ea09c4d8fc7a3706f2a5e124dd10a03deb839682
SHA2563177859ceeda6aee545c1443329402e13e940499638209a64041c170479ae2df
SHA512b40fd3960585165237c45569a2d62119a403fc3ba2e1d30813c5ee023e81bc686eb8d1a25cc234c9fc8ffce8ae6772c0a2b5351c7a4debbe36c7b64863e0c104
-
Filesize
1.0MB
MD54bf9b3a4342c4227144001d34c240c83
SHA1ea09c4d8fc7a3706f2a5e124dd10a03deb839682
SHA2563177859ceeda6aee545c1443329402e13e940499638209a64041c170479ae2df
SHA512b40fd3960585165237c45569a2d62119a403fc3ba2e1d30813c5ee023e81bc686eb8d1a25cc234c9fc8ffce8ae6772c0a2b5351c7a4debbe36c7b64863e0c104
-
Filesize
1.0MB
MD54bf9b3a4342c4227144001d34c240c83
SHA1ea09c4d8fc7a3706f2a5e124dd10a03deb839682
SHA2563177859ceeda6aee545c1443329402e13e940499638209a64041c170479ae2df
SHA512b40fd3960585165237c45569a2d62119a403fc3ba2e1d30813c5ee023e81bc686eb8d1a25cc234c9fc8ffce8ae6772c0a2b5351c7a4debbe36c7b64863e0c104