Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
23/09/2023, 19:31
Static task
static1
Behavioral task
behavioral1
Sample
ee71c06dd3be0dc446332865efe81e5433d9b1a679cb8aade839a17379fda5da_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ee71c06dd3be0dc446332865efe81e5433d9b1a679cb8aade839a17379fda5da_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
ee71c06dd3be0dc446332865efe81e5433d9b1a679cb8aade839a17379fda5da_JC.exe
-
Size
1.3MB
-
MD5
47b71dd381f7c798944b0f137803f3a9
-
SHA1
887714d31fee90b70fb6adc2598a5d6ba110807d
-
SHA256
ee71c06dd3be0dc446332865efe81e5433d9b1a679cb8aade839a17379fda5da
-
SHA512
a6a49757b88dfc6898ed65686a0cc485a498e65e45a4cba0704155fb525d0720f860573304b605c2dec5917d77427f94b04d2435aafb3e74a76223cfd1c7fb7d
-
SSDEEP
24576:dyZpEwtiE7hgnY5c8l8Ugdg2GxKf13RMElW6R+Ie5M36bZ7GRT6GrOiGI:4ZpEwtr715c8CFiA1BX/Be31Pi
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2672 v5633970.exe 2592 v4313662.exe 2740 v5102183.exe 2688 a6347093.exe -
Loads dropped DLL 13 IoCs
pid Process 2432 ee71c06dd3be0dc446332865efe81e5433d9b1a679cb8aade839a17379fda5da_JC.exe 2672 v5633970.exe 2672 v5633970.exe 2592 v4313662.exe 2592 v4313662.exe 2740 v5102183.exe 2740 v5102183.exe 2740 v5102183.exe 2688 a6347093.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe 2540 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v5633970.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v4313662.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v5102183.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ee71c06dd3be0dc446332865efe81e5433d9b1a679cb8aade839a17379fda5da_JC.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2688 set thread context of 2508 2688 a6347093.exe 35 -
Program crash 2 IoCs
pid pid_target Process procid_target 2540 2688 WerFault.exe 31 2500 2508 WerFault.exe 35 -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2672 2432 ee71c06dd3be0dc446332865efe81e5433d9b1a679cb8aade839a17379fda5da_JC.exe 28 PID 2432 wrote to memory of 2672 2432 ee71c06dd3be0dc446332865efe81e5433d9b1a679cb8aade839a17379fda5da_JC.exe 28 PID 2432 wrote to memory of 2672 2432 ee71c06dd3be0dc446332865efe81e5433d9b1a679cb8aade839a17379fda5da_JC.exe 28 PID 2432 wrote to memory of 2672 2432 ee71c06dd3be0dc446332865efe81e5433d9b1a679cb8aade839a17379fda5da_JC.exe 28 PID 2432 wrote to memory of 2672 2432 ee71c06dd3be0dc446332865efe81e5433d9b1a679cb8aade839a17379fda5da_JC.exe 28 PID 2432 wrote to memory of 2672 2432 ee71c06dd3be0dc446332865efe81e5433d9b1a679cb8aade839a17379fda5da_JC.exe 28 PID 2432 wrote to memory of 2672 2432 ee71c06dd3be0dc446332865efe81e5433d9b1a679cb8aade839a17379fda5da_JC.exe 28 PID 2672 wrote to memory of 2592 2672 v5633970.exe 29 PID 2672 wrote to memory of 2592 2672 v5633970.exe 29 PID 2672 wrote to memory of 2592 2672 v5633970.exe 29 PID 2672 wrote to memory of 2592 2672 v5633970.exe 29 PID 2672 wrote to memory of 2592 2672 v5633970.exe 29 PID 2672 wrote to memory of 2592 2672 v5633970.exe 29 PID 2672 wrote to memory of 2592 2672 v5633970.exe 29 PID 2592 wrote to memory of 2740 2592 v4313662.exe 30 PID 2592 wrote to memory of 2740 2592 v4313662.exe 30 PID 2592 wrote to memory of 2740 2592 v4313662.exe 30 PID 2592 wrote to memory of 2740 2592 v4313662.exe 30 PID 2592 wrote to memory of 2740 2592 v4313662.exe 30 PID 2592 wrote to memory of 2740 2592 v4313662.exe 30 PID 2592 wrote to memory of 2740 2592 v4313662.exe 30 PID 2740 wrote to memory of 2688 2740 v5102183.exe 31 PID 2740 wrote to memory of 2688 2740 v5102183.exe 31 PID 2740 wrote to memory of 2688 2740 v5102183.exe 31 PID 2740 wrote to memory of 2688 2740 v5102183.exe 31 PID 2740 wrote to memory of 2688 2740 v5102183.exe 31 PID 2740 wrote to memory of 2688 2740 v5102183.exe 31 PID 2740 wrote to memory of 2688 2740 v5102183.exe 31 PID 2688 wrote to memory of 1480 2688 a6347093.exe 33 PID 2688 wrote to memory of 1480 2688 a6347093.exe 33 PID 2688 wrote to memory of 1480 2688 a6347093.exe 33 PID 2688 wrote to memory of 1480 2688 a6347093.exe 33 PID 2688 wrote to memory of 1480 2688 a6347093.exe 33 PID 2688 wrote to memory of 1480 2688 a6347093.exe 33 PID 2688 wrote to memory of 1480 2688 a6347093.exe 33 PID 2688 wrote to memory of 2732 2688 a6347093.exe 34 PID 2688 wrote to memory of 2732 2688 a6347093.exe 34 PID 2688 wrote to memory of 2732 2688 a6347093.exe 34 PID 2688 wrote to memory of 2732 2688 a6347093.exe 34 PID 2688 wrote to memory of 2732 2688 a6347093.exe 34 PID 2688 wrote to memory of 2732 2688 a6347093.exe 34 PID 2688 wrote to memory of 2732 2688 a6347093.exe 34 PID 2688 wrote to memory of 2508 2688 a6347093.exe 35 PID 2688 wrote to memory of 2508 2688 a6347093.exe 35 PID 2688 wrote to memory of 2508 2688 a6347093.exe 35 PID 2688 wrote to memory of 2508 2688 a6347093.exe 35 PID 2688 wrote to memory of 2508 2688 a6347093.exe 35 PID 2688 wrote to memory of 2508 2688 a6347093.exe 35 PID 2688 wrote to memory of 2508 2688 a6347093.exe 35 PID 2688 wrote to memory of 2508 2688 a6347093.exe 35 PID 2688 wrote to memory of 2508 2688 a6347093.exe 35 PID 2688 wrote to memory of 2508 2688 a6347093.exe 35 PID 2688 wrote to memory of 2508 2688 a6347093.exe 35 PID 2688 wrote to memory of 2508 2688 a6347093.exe 35 PID 2688 wrote to memory of 2508 2688 a6347093.exe 35 PID 2688 wrote to memory of 2508 2688 a6347093.exe 35 PID 2688 wrote to memory of 2540 2688 a6347093.exe 36 PID 2688 wrote to memory of 2540 2688 a6347093.exe 36 PID 2688 wrote to memory of 2540 2688 a6347093.exe 36 PID 2688 wrote to memory of 2540 2688 a6347093.exe 36 PID 2688 wrote to memory of 2540 2688 a6347093.exe 36 PID 2688 wrote to memory of 2540 2688 a6347093.exe 36 PID 2688 wrote to memory of 2540 2688 a6347093.exe 36 PID 2508 wrote to memory of 2500 2508 AppLaunch.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee71c06dd3be0dc446332865efe81e5433d9b1a679cb8aade839a17379fda5da_JC.exe"C:\Users\Admin\AppData\Local\Temp\ee71c06dd3be0dc446332865efe81e5433d9b1a679cb8aade839a17379fda5da_JC.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5633970.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5633970.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4313662.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4313662.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5102183.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5102183.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6347093.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6347093.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:1480
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2732
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 2687⤵
- Program crash
PID:2500
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 2886⤵
- Loads dropped DLL
- Program crash
PID:2540
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5a6c26e119c920f70c95d0fec223516cb
SHA1cd4e5eeba5e9bd0f9870b4d4b89a299d20d86d4e
SHA2563cdd5a14f1e48461c766aad4a1238f55117eb1f4ce06c4c1470369596332d76e
SHA5126f46a7cf7369d3cdbed562c5a01461f33d512de7131a213c87488ab8bb385152e0aa2194ffa10df228d2b7d157139b80425c04391b1c484b55c61b174b0f7977
-
Filesize
1.2MB
MD5a6c26e119c920f70c95d0fec223516cb
SHA1cd4e5eeba5e9bd0f9870b4d4b89a299d20d86d4e
SHA2563cdd5a14f1e48461c766aad4a1238f55117eb1f4ce06c4c1470369596332d76e
SHA5126f46a7cf7369d3cdbed562c5a01461f33d512de7131a213c87488ab8bb385152e0aa2194ffa10df228d2b7d157139b80425c04391b1c484b55c61b174b0f7977
-
Filesize
923KB
MD5445c48a2d7e8e24cee4ebf3490e8cc4f
SHA1090be32a2397bea6c70b269069c96ce445704f69
SHA2563932eb12577d4e697956c4c7659c7273afd3e212114de1bb86cfe5ccd66cb929
SHA512158a29b5d3a263df8d019c89704e017c94efc711b94b192a1da1e3f6ac075f41d957f0800852ea56111ab13c454d0c34889aabbdc84c08852089f7ee0949896b
-
Filesize
923KB
MD5445c48a2d7e8e24cee4ebf3490e8cc4f
SHA1090be32a2397bea6c70b269069c96ce445704f69
SHA2563932eb12577d4e697956c4c7659c7273afd3e212114de1bb86cfe5ccd66cb929
SHA512158a29b5d3a263df8d019c89704e017c94efc711b94b192a1da1e3f6ac075f41d957f0800852ea56111ab13c454d0c34889aabbdc84c08852089f7ee0949896b
-
Filesize
532KB
MD5495b3075da144176b20e165e58908190
SHA15e5151e0c8fb51ea11c7413da36272718b0fb6e7
SHA256c79ead509a78ed266b82cd41062cacc7a2dd5423299f50de8fd4b25fdbfefe45
SHA512c685e063337a60538d49914ca06d5502f1e7fa71b581de3112f65b5321d89a4b3e8ddf322aed3a319be84e63eeb85a8cc15ee68aef166cf778c34c7b44818e74
-
Filesize
532KB
MD5495b3075da144176b20e165e58908190
SHA15e5151e0c8fb51ea11c7413da36272718b0fb6e7
SHA256c79ead509a78ed266b82cd41062cacc7a2dd5423299f50de8fd4b25fdbfefe45
SHA512c685e063337a60538d49914ca06d5502f1e7fa71b581de3112f65b5321d89a4b3e8ddf322aed3a319be84e63eeb85a8cc15ee68aef166cf778c34c7b44818e74
-
Filesize
1.0MB
MD534ab1715842a73ae50230c4cabb65459
SHA1d1e170de39a75dbd13137dbd65656036442adbff
SHA2566310705a6c3abd4b6c49ac81ef0b8dd6e41c195fb279102b8068dd88d8912ab7
SHA5129012b86bd171a2ac48429f060a1b2160297590ec4dddec47cbd5cdc01c2e1fb3a2b9562345d221330b2cccbb47acd5a94ce9f5e34cb1c6c8e404a4523fe1b167
-
Filesize
1.0MB
MD534ab1715842a73ae50230c4cabb65459
SHA1d1e170de39a75dbd13137dbd65656036442adbff
SHA2566310705a6c3abd4b6c49ac81ef0b8dd6e41c195fb279102b8068dd88d8912ab7
SHA5129012b86bd171a2ac48429f060a1b2160297590ec4dddec47cbd5cdc01c2e1fb3a2b9562345d221330b2cccbb47acd5a94ce9f5e34cb1c6c8e404a4523fe1b167
-
Filesize
1.0MB
MD534ab1715842a73ae50230c4cabb65459
SHA1d1e170de39a75dbd13137dbd65656036442adbff
SHA2566310705a6c3abd4b6c49ac81ef0b8dd6e41c195fb279102b8068dd88d8912ab7
SHA5129012b86bd171a2ac48429f060a1b2160297590ec4dddec47cbd5cdc01c2e1fb3a2b9562345d221330b2cccbb47acd5a94ce9f5e34cb1c6c8e404a4523fe1b167
-
Filesize
1.2MB
MD5a6c26e119c920f70c95d0fec223516cb
SHA1cd4e5eeba5e9bd0f9870b4d4b89a299d20d86d4e
SHA2563cdd5a14f1e48461c766aad4a1238f55117eb1f4ce06c4c1470369596332d76e
SHA5126f46a7cf7369d3cdbed562c5a01461f33d512de7131a213c87488ab8bb385152e0aa2194ffa10df228d2b7d157139b80425c04391b1c484b55c61b174b0f7977
-
Filesize
1.2MB
MD5a6c26e119c920f70c95d0fec223516cb
SHA1cd4e5eeba5e9bd0f9870b4d4b89a299d20d86d4e
SHA2563cdd5a14f1e48461c766aad4a1238f55117eb1f4ce06c4c1470369596332d76e
SHA5126f46a7cf7369d3cdbed562c5a01461f33d512de7131a213c87488ab8bb385152e0aa2194ffa10df228d2b7d157139b80425c04391b1c484b55c61b174b0f7977
-
Filesize
923KB
MD5445c48a2d7e8e24cee4ebf3490e8cc4f
SHA1090be32a2397bea6c70b269069c96ce445704f69
SHA2563932eb12577d4e697956c4c7659c7273afd3e212114de1bb86cfe5ccd66cb929
SHA512158a29b5d3a263df8d019c89704e017c94efc711b94b192a1da1e3f6ac075f41d957f0800852ea56111ab13c454d0c34889aabbdc84c08852089f7ee0949896b
-
Filesize
923KB
MD5445c48a2d7e8e24cee4ebf3490e8cc4f
SHA1090be32a2397bea6c70b269069c96ce445704f69
SHA2563932eb12577d4e697956c4c7659c7273afd3e212114de1bb86cfe5ccd66cb929
SHA512158a29b5d3a263df8d019c89704e017c94efc711b94b192a1da1e3f6ac075f41d957f0800852ea56111ab13c454d0c34889aabbdc84c08852089f7ee0949896b
-
Filesize
532KB
MD5495b3075da144176b20e165e58908190
SHA15e5151e0c8fb51ea11c7413da36272718b0fb6e7
SHA256c79ead509a78ed266b82cd41062cacc7a2dd5423299f50de8fd4b25fdbfefe45
SHA512c685e063337a60538d49914ca06d5502f1e7fa71b581de3112f65b5321d89a4b3e8ddf322aed3a319be84e63eeb85a8cc15ee68aef166cf778c34c7b44818e74
-
Filesize
532KB
MD5495b3075da144176b20e165e58908190
SHA15e5151e0c8fb51ea11c7413da36272718b0fb6e7
SHA256c79ead509a78ed266b82cd41062cacc7a2dd5423299f50de8fd4b25fdbfefe45
SHA512c685e063337a60538d49914ca06d5502f1e7fa71b581de3112f65b5321d89a4b3e8ddf322aed3a319be84e63eeb85a8cc15ee68aef166cf778c34c7b44818e74
-
Filesize
1.0MB
MD534ab1715842a73ae50230c4cabb65459
SHA1d1e170de39a75dbd13137dbd65656036442adbff
SHA2566310705a6c3abd4b6c49ac81ef0b8dd6e41c195fb279102b8068dd88d8912ab7
SHA5129012b86bd171a2ac48429f060a1b2160297590ec4dddec47cbd5cdc01c2e1fb3a2b9562345d221330b2cccbb47acd5a94ce9f5e34cb1c6c8e404a4523fe1b167
-
Filesize
1.0MB
MD534ab1715842a73ae50230c4cabb65459
SHA1d1e170de39a75dbd13137dbd65656036442adbff
SHA2566310705a6c3abd4b6c49ac81ef0b8dd6e41c195fb279102b8068dd88d8912ab7
SHA5129012b86bd171a2ac48429f060a1b2160297590ec4dddec47cbd5cdc01c2e1fb3a2b9562345d221330b2cccbb47acd5a94ce9f5e34cb1c6c8e404a4523fe1b167
-
Filesize
1.0MB
MD534ab1715842a73ae50230c4cabb65459
SHA1d1e170de39a75dbd13137dbd65656036442adbff
SHA2566310705a6c3abd4b6c49ac81ef0b8dd6e41c195fb279102b8068dd88d8912ab7
SHA5129012b86bd171a2ac48429f060a1b2160297590ec4dddec47cbd5cdc01c2e1fb3a2b9562345d221330b2cccbb47acd5a94ce9f5e34cb1c6c8e404a4523fe1b167
-
Filesize
1.0MB
MD534ab1715842a73ae50230c4cabb65459
SHA1d1e170de39a75dbd13137dbd65656036442adbff
SHA2566310705a6c3abd4b6c49ac81ef0b8dd6e41c195fb279102b8068dd88d8912ab7
SHA5129012b86bd171a2ac48429f060a1b2160297590ec4dddec47cbd5cdc01c2e1fb3a2b9562345d221330b2cccbb47acd5a94ce9f5e34cb1c6c8e404a4523fe1b167
-
Filesize
1.0MB
MD534ab1715842a73ae50230c4cabb65459
SHA1d1e170de39a75dbd13137dbd65656036442adbff
SHA2566310705a6c3abd4b6c49ac81ef0b8dd6e41c195fb279102b8068dd88d8912ab7
SHA5129012b86bd171a2ac48429f060a1b2160297590ec4dddec47cbd5cdc01c2e1fb3a2b9562345d221330b2cccbb47acd5a94ce9f5e34cb1c6c8e404a4523fe1b167
-
Filesize
1.0MB
MD534ab1715842a73ae50230c4cabb65459
SHA1d1e170de39a75dbd13137dbd65656036442adbff
SHA2566310705a6c3abd4b6c49ac81ef0b8dd6e41c195fb279102b8068dd88d8912ab7
SHA5129012b86bd171a2ac48429f060a1b2160297590ec4dddec47cbd5cdc01c2e1fb3a2b9562345d221330b2cccbb47acd5a94ce9f5e34cb1c6c8e404a4523fe1b167
-
Filesize
1.0MB
MD534ab1715842a73ae50230c4cabb65459
SHA1d1e170de39a75dbd13137dbd65656036442adbff
SHA2566310705a6c3abd4b6c49ac81ef0b8dd6e41c195fb279102b8068dd88d8912ab7
SHA5129012b86bd171a2ac48429f060a1b2160297590ec4dddec47cbd5cdc01c2e1fb3a2b9562345d221330b2cccbb47acd5a94ce9f5e34cb1c6c8e404a4523fe1b167