Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
22/09/2023, 06:42
Static task
static1
Behavioral task
behavioral1
Sample
38a7f3e1d4974d6c9182e064a2c168d9c2d07daa72516d9f75c445fee5799fb2.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
38a7f3e1d4974d6c9182e064a2c168d9c2d07daa72516d9f75c445fee5799fb2.exe
Resource
win10v2004-20230915-en
General
-
Target
38a7f3e1d4974d6c9182e064a2c168d9c2d07daa72516d9f75c445fee5799fb2.exe
-
Size
14.1MB
-
MD5
69dd2866c7ac9a0244851e3652eaeb18
-
SHA1
a6ba4fb8e00b3b7eb861b550dd1407694fb04065
-
SHA256
38a7f3e1d4974d6c9182e064a2c168d9c2d07daa72516d9f75c445fee5799fb2
-
SHA512
010f46c4efd58caf1dd82125491e6b97839b9503ba4d01f09cdf8dc696169ade6b0dfef07c8f3b8f5deffec4699a29d3c2a1bd92beb737f5748f63b8642697e1
-
SSDEEP
196608:0/9RdqdXNMXwOYC+3d9qLsUdBx89709IkU4kRrJlPmP8ClivmS9CvyF/:SdqlWZ67qLsUdQa9IkU4d8GiZwvyF
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 1708 38a7f3e1d4974d6c9182e064a2c168d9c2d07daa72516d9f75c445fee5799fb2.exe 1708 38a7f3e1d4974d6c9182e064a2c168d9c2d07daa72516d9f75c445fee5799fb2.exe -
resource yara_rule behavioral1/memory/1708-50-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1708-52-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1708-53-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1708-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1708-57-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1708-59-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1708-61-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1708-63-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1708-65-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1708-67-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1708-69-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1708-71-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1708-73-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1708-75-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1708-97-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral1/memory/1708-134-0x0000000004330000-0x0000000004366000-memory.dmp upx behavioral1/memory/1708-253-0x0000000004330000-0x0000000004366000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1708 38a7f3e1d4974d6c9182e064a2c168d9c2d07daa72516d9f75c445fee5799fb2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main 38a7f3e1d4974d6c9182e064a2c168d9c2d07daa72516d9f75c445fee5799fb2.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 1708 38a7f3e1d4974d6c9182e064a2c168d9c2d07daa72516d9f75c445fee5799fb2.exe 1708 38a7f3e1d4974d6c9182e064a2c168d9c2d07daa72516d9f75c445fee5799fb2.exe 1708 38a7f3e1d4974d6c9182e064a2c168d9c2d07daa72516d9f75c445fee5799fb2.exe 1708 38a7f3e1d4974d6c9182e064a2c168d9c2d07daa72516d9f75c445fee5799fb2.exe 1708 38a7f3e1d4974d6c9182e064a2c168d9c2d07daa72516d9f75c445fee5799fb2.exe 1708 38a7f3e1d4974d6c9182e064a2c168d9c2d07daa72516d9f75c445fee5799fb2.exe 1708 38a7f3e1d4974d6c9182e064a2c168d9c2d07daa72516d9f75c445fee5799fb2.exe 1708 38a7f3e1d4974d6c9182e064a2c168d9c2d07daa72516d9f75c445fee5799fb2.exe 1708 38a7f3e1d4974d6c9182e064a2c168d9c2d07daa72516d9f75c445fee5799fb2.exe 1708 38a7f3e1d4974d6c9182e064a2c168d9c2d07daa72516d9f75c445fee5799fb2.exe 1708 38a7f3e1d4974d6c9182e064a2c168d9c2d07daa72516d9f75c445fee5799fb2.exe 1708 38a7f3e1d4974d6c9182e064a2c168d9c2d07daa72516d9f75c445fee5799fb2.exe 1708 38a7f3e1d4974d6c9182e064a2c168d9c2d07daa72516d9f75c445fee5799fb2.exe 1708 38a7f3e1d4974d6c9182e064a2c168d9c2d07daa72516d9f75c445fee5799fb2.exe 1708 38a7f3e1d4974d6c9182e064a2c168d9c2d07daa72516d9f75c445fee5799fb2.exe 1708 38a7f3e1d4974d6c9182e064a2c168d9c2d07daa72516d9f75c445fee5799fb2.exe 1708 38a7f3e1d4974d6c9182e064a2c168d9c2d07daa72516d9f75c445fee5799fb2.exe 1708 38a7f3e1d4974d6c9182e064a2c168d9c2d07daa72516d9f75c445fee5799fb2.exe 1708 38a7f3e1d4974d6c9182e064a2c168d9c2d07daa72516d9f75c445fee5799fb2.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1708 38a7f3e1d4974d6c9182e064a2c168d9c2d07daa72516d9f75c445fee5799fb2.exe 1708 38a7f3e1d4974d6c9182e064a2c168d9c2d07daa72516d9f75c445fee5799fb2.exe 1708 38a7f3e1d4974d6c9182e064a2c168d9c2d07daa72516d9f75c445fee5799fb2.exe 1708 38a7f3e1d4974d6c9182e064a2c168d9c2d07daa72516d9f75c445fee5799fb2.exe 1708 38a7f3e1d4974d6c9182e064a2c168d9c2d07daa72516d9f75c445fee5799fb2.exe 1708 38a7f3e1d4974d6c9182e064a2c168d9c2d07daa72516d9f75c445fee5799fb2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\38a7f3e1d4974d6c9182e064a2c168d9c2d07daa72516d9f75c445fee5799fb2.exe"C:\Users\Admin\AppData\Local\Temp\38a7f3e1d4974d6c9182e064a2c168d9c2d07daa72516d9f75c445fee5799fb2.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD53518a1304372c3008eb95256dba56bf5
SHA1b93af14f013e4ce0054dea19c9689becd10bd07e
SHA25674c1845f5adf66321f8018b0fbcab06ef2aa0cb469ccb31c27908e64290815c3
SHA512920cfc6f888c60df50c312362fbfb04b9bbb3512a14a6fd9f9dc9d3cc8ddbbc95d64a29b81cc8c7d329e3f82042bd5880b830411befe02c7748a5ef07f5afb8f
-
Filesize
8.4MB
MD58b6c94bbdbfb213e94a5dcb4fac28ce3
SHA1b56102ca4f03556f387f8b30e2b404efabe0cb65
SHA256982a177924762f270b36fe34c7d6847392b48ae53151dc2011078dceef487a53
SHA5129d6d63b5d8cf7a978d7e91126d7a343c2f7acd00022da9d692f63e50835fdd84a59a93328564f10622f2b1f6adfd7febdd98b8ddb294d0754ed45cc9c165d25a
-
Filesize
1.2MB
MD5e5e521468e2a9f9b314e06e29116b5a9
SHA14044a4efd7998e8c4245e632b18056b089f0aa53
SHA25619b4d189a73b79a73c2ddd678ed5ff7357d92494cf76a21372a58e3dce075d50
SHA51271b7fca9d2bf361daaa69f3855e49f635183b6a2c6fa7f82376c7e565694d14859adb649cdf8d12b6b6749f4777948d9164a2a8580143171f2970ce8b28f3a41