Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 20:17
Static task
static1
Behavioral task
behavioral1
Sample
664d34a421900283c0f9c9a099ce80cd4774df50979888fe711be51b878c84f4.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
664d34a421900283c0f9c9a099ce80cd4774df50979888fe711be51b878c84f4.exe
Resource
win10v2004-20230915-en
General
-
Target
664d34a421900283c0f9c9a099ce80cd4774df50979888fe711be51b878c84f4.exe
-
Size
957KB
-
MD5
da23352a594c97e931832f1ece7e3b1e
-
SHA1
8eeb6854088d07502578b467ad716c39d985f7b6
-
SHA256
664d34a421900283c0f9c9a099ce80cd4774df50979888fe711be51b878c84f4
-
SHA512
77de8c75004aae778baf63f83b6d54ae1772d80139653ae79ed67d828319589c8b73a7ade7e255356635701ffbaaf9f17df4900864df17ac94b945400ac9e901
-
SSDEEP
24576:ey1Fu2uC2q1c8V5tHIGvLk/y2FI/IjC9RS4lvbG9bi2:t1BfX1v5tHfv462uFqLi
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1400 x1357206.exe 2004 x6653951.exe 1284 x8082293.exe 2648 g2267800.exe -
Loads dropped DLL 13 IoCs
pid Process 1408 664d34a421900283c0f9c9a099ce80cd4774df50979888fe711be51b878c84f4.exe 1400 x1357206.exe 1400 x1357206.exe 2004 x6653951.exe 2004 x6653951.exe 1284 x8082293.exe 1284 x8082293.exe 1284 x8082293.exe 2648 g2267800.exe 2596 WerFault.exe 2596 WerFault.exe 2596 WerFault.exe 2596 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x8082293.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 664d34a421900283c0f9c9a099ce80cd4774df50979888fe711be51b878c84f4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x1357206.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x6653951.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2648 set thread context of 2096 2648 g2267800.exe 34 -
Program crash 2 IoCs
pid pid_target Process procid_target 2596 2648 WerFault.exe 33 2700 2096 WerFault.exe 34 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1408 wrote to memory of 1400 1408 664d34a421900283c0f9c9a099ce80cd4774df50979888fe711be51b878c84f4.exe 30 PID 1408 wrote to memory of 1400 1408 664d34a421900283c0f9c9a099ce80cd4774df50979888fe711be51b878c84f4.exe 30 PID 1408 wrote to memory of 1400 1408 664d34a421900283c0f9c9a099ce80cd4774df50979888fe711be51b878c84f4.exe 30 PID 1408 wrote to memory of 1400 1408 664d34a421900283c0f9c9a099ce80cd4774df50979888fe711be51b878c84f4.exe 30 PID 1408 wrote to memory of 1400 1408 664d34a421900283c0f9c9a099ce80cd4774df50979888fe711be51b878c84f4.exe 30 PID 1408 wrote to memory of 1400 1408 664d34a421900283c0f9c9a099ce80cd4774df50979888fe711be51b878c84f4.exe 30 PID 1408 wrote to memory of 1400 1408 664d34a421900283c0f9c9a099ce80cd4774df50979888fe711be51b878c84f4.exe 30 PID 1400 wrote to memory of 2004 1400 x1357206.exe 31 PID 1400 wrote to memory of 2004 1400 x1357206.exe 31 PID 1400 wrote to memory of 2004 1400 x1357206.exe 31 PID 1400 wrote to memory of 2004 1400 x1357206.exe 31 PID 1400 wrote to memory of 2004 1400 x1357206.exe 31 PID 1400 wrote to memory of 2004 1400 x1357206.exe 31 PID 1400 wrote to memory of 2004 1400 x1357206.exe 31 PID 2004 wrote to memory of 1284 2004 x6653951.exe 32 PID 2004 wrote to memory of 1284 2004 x6653951.exe 32 PID 2004 wrote to memory of 1284 2004 x6653951.exe 32 PID 2004 wrote to memory of 1284 2004 x6653951.exe 32 PID 2004 wrote to memory of 1284 2004 x6653951.exe 32 PID 2004 wrote to memory of 1284 2004 x6653951.exe 32 PID 2004 wrote to memory of 1284 2004 x6653951.exe 32 PID 1284 wrote to memory of 2648 1284 x8082293.exe 33 PID 1284 wrote to memory of 2648 1284 x8082293.exe 33 PID 1284 wrote to memory of 2648 1284 x8082293.exe 33 PID 1284 wrote to memory of 2648 1284 x8082293.exe 33 PID 1284 wrote to memory of 2648 1284 x8082293.exe 33 PID 1284 wrote to memory of 2648 1284 x8082293.exe 33 PID 1284 wrote to memory of 2648 1284 x8082293.exe 33 PID 2648 wrote to memory of 2096 2648 g2267800.exe 34 PID 2648 wrote to memory of 2096 2648 g2267800.exe 34 PID 2648 wrote to memory of 2096 2648 g2267800.exe 34 PID 2648 wrote to memory of 2096 2648 g2267800.exe 34 PID 2648 wrote to memory of 2096 2648 g2267800.exe 34 PID 2648 wrote to memory of 2096 2648 g2267800.exe 34 PID 2648 wrote to memory of 2096 2648 g2267800.exe 34 PID 2648 wrote to memory of 2096 2648 g2267800.exe 34 PID 2648 wrote to memory of 2096 2648 g2267800.exe 34 PID 2648 wrote to memory of 2096 2648 g2267800.exe 34 PID 2648 wrote to memory of 2096 2648 g2267800.exe 34 PID 2648 wrote to memory of 2096 2648 g2267800.exe 34 PID 2648 wrote to memory of 2096 2648 g2267800.exe 34 PID 2648 wrote to memory of 2096 2648 g2267800.exe 34 PID 2648 wrote to memory of 2596 2648 g2267800.exe 35 PID 2648 wrote to memory of 2596 2648 g2267800.exe 35 PID 2648 wrote to memory of 2596 2648 g2267800.exe 35 PID 2648 wrote to memory of 2596 2648 g2267800.exe 35 PID 2648 wrote to memory of 2596 2648 g2267800.exe 35 PID 2648 wrote to memory of 2596 2648 g2267800.exe 35 PID 2648 wrote to memory of 2596 2648 g2267800.exe 35 PID 2096 wrote to memory of 2700 2096 AppLaunch.exe 36 PID 2096 wrote to memory of 2700 2096 AppLaunch.exe 36 PID 2096 wrote to memory of 2700 2096 AppLaunch.exe 36 PID 2096 wrote to memory of 2700 2096 AppLaunch.exe 36 PID 2096 wrote to memory of 2700 2096 AppLaunch.exe 36 PID 2096 wrote to memory of 2700 2096 AppLaunch.exe 36 PID 2096 wrote to memory of 2700 2096 AppLaunch.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\664d34a421900283c0f9c9a099ce80cd4774df50979888fe711be51b878c84f4.exe"C:\Users\Admin\AppData\Local\Temp\664d34a421900283c0f9c9a099ce80cd4774df50979888fe711be51b878c84f4.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1357206.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1357206.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6653951.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6653951.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8082293.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8082293.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2267800.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2267800.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2096 -s 2687⤵
- Program crash
PID:2700
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2596
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
855KB
MD5b2ae320a7af8a505b20d79308d8dcf7a
SHA110f3deb279abd75e13a072c9a4f044344fc78828
SHA256845b627d6647f896f4cc4e6b7dd1b9c1bb6fa795692f6a35dfd9c191b2e5491e
SHA51248be35a1c3048a9cb766496bd7872ed1b2317376bf3d7ced4e88955f2a95ef189d7ec793e4060afed6075f9c0edae27a076c46418125724d2f1e77f9d2845236
-
Filesize
855KB
MD5b2ae320a7af8a505b20d79308d8dcf7a
SHA110f3deb279abd75e13a072c9a4f044344fc78828
SHA256845b627d6647f896f4cc4e6b7dd1b9c1bb6fa795692f6a35dfd9c191b2e5491e
SHA51248be35a1c3048a9cb766496bd7872ed1b2317376bf3d7ced4e88955f2a95ef189d7ec793e4060afed6075f9c0edae27a076c46418125724d2f1e77f9d2845236
-
Filesize
581KB
MD586739bb8edd55281ab0f027d59b60035
SHA1facb1a5e17a1a29a56e0a828ca3b57af5bfa9476
SHA25600d91f79dd4685a0936b59082d467c742cb647004aff1b7e71fad59aaa47a406
SHA5120bdb49ce02514707a9da47adb33b4252a8f44641e08ced15d813e6ea606abdeeedd34e4e23927685eca5b98b6d9b90ca894c39be502f7dbfec8208cd10311f5e
-
Filesize
581KB
MD586739bb8edd55281ab0f027d59b60035
SHA1facb1a5e17a1a29a56e0a828ca3b57af5bfa9476
SHA25600d91f79dd4685a0936b59082d467c742cb647004aff1b7e71fad59aaa47a406
SHA5120bdb49ce02514707a9da47adb33b4252a8f44641e08ced15d813e6ea606abdeeedd34e4e23927685eca5b98b6d9b90ca894c39be502f7dbfec8208cd10311f5e
-
Filesize
404KB
MD5836cb0c5835876a80cb5de835e85538c
SHA12e7c3d8c421ffaf74b9b02b372f60da44e742790
SHA256edd0b30dec5361c2407e1b038afd51330bb4e2080fde30a42b0ce115710f47cc
SHA5129eafdd0d718a1dfc89cb686a83c2ca09624b832d9a1c5fef039955eaf6f692eaac432c2b8fe367c8253e6599b13e95490010e055ba760076f4577a1ee836ecc3
-
Filesize
404KB
MD5836cb0c5835876a80cb5de835e85538c
SHA12e7c3d8c421ffaf74b9b02b372f60da44e742790
SHA256edd0b30dec5361c2407e1b038afd51330bb4e2080fde30a42b0ce115710f47cc
SHA5129eafdd0d718a1dfc89cb686a83c2ca09624b832d9a1c5fef039955eaf6f692eaac432c2b8fe367c8253e6599b13e95490010e055ba760076f4577a1ee836ecc3
-
Filesize
396KB
MD59258e8dc2792027ac93e44fb5514ddb5
SHA1b8d174874ef836316919c60873036c8573220295
SHA25623a488b12bc35647b6a06427a01d7587215060173be329dd3196044f343fe081
SHA512574d0ba014a68e11b29a1c2f60c7ef4a5b3597c12adcef26f901e275791422d0a948997a05d62ae61e80f0969eb76908442e13e19755882fc3d428c23519d6ae
-
Filesize
396KB
MD59258e8dc2792027ac93e44fb5514ddb5
SHA1b8d174874ef836316919c60873036c8573220295
SHA25623a488b12bc35647b6a06427a01d7587215060173be329dd3196044f343fe081
SHA512574d0ba014a68e11b29a1c2f60c7ef4a5b3597c12adcef26f901e275791422d0a948997a05d62ae61e80f0969eb76908442e13e19755882fc3d428c23519d6ae
-
Filesize
396KB
MD59258e8dc2792027ac93e44fb5514ddb5
SHA1b8d174874ef836316919c60873036c8573220295
SHA25623a488b12bc35647b6a06427a01d7587215060173be329dd3196044f343fe081
SHA512574d0ba014a68e11b29a1c2f60c7ef4a5b3597c12adcef26f901e275791422d0a948997a05d62ae61e80f0969eb76908442e13e19755882fc3d428c23519d6ae
-
Filesize
855KB
MD5b2ae320a7af8a505b20d79308d8dcf7a
SHA110f3deb279abd75e13a072c9a4f044344fc78828
SHA256845b627d6647f896f4cc4e6b7dd1b9c1bb6fa795692f6a35dfd9c191b2e5491e
SHA51248be35a1c3048a9cb766496bd7872ed1b2317376bf3d7ced4e88955f2a95ef189d7ec793e4060afed6075f9c0edae27a076c46418125724d2f1e77f9d2845236
-
Filesize
855KB
MD5b2ae320a7af8a505b20d79308d8dcf7a
SHA110f3deb279abd75e13a072c9a4f044344fc78828
SHA256845b627d6647f896f4cc4e6b7dd1b9c1bb6fa795692f6a35dfd9c191b2e5491e
SHA51248be35a1c3048a9cb766496bd7872ed1b2317376bf3d7ced4e88955f2a95ef189d7ec793e4060afed6075f9c0edae27a076c46418125724d2f1e77f9d2845236
-
Filesize
581KB
MD586739bb8edd55281ab0f027d59b60035
SHA1facb1a5e17a1a29a56e0a828ca3b57af5bfa9476
SHA25600d91f79dd4685a0936b59082d467c742cb647004aff1b7e71fad59aaa47a406
SHA5120bdb49ce02514707a9da47adb33b4252a8f44641e08ced15d813e6ea606abdeeedd34e4e23927685eca5b98b6d9b90ca894c39be502f7dbfec8208cd10311f5e
-
Filesize
581KB
MD586739bb8edd55281ab0f027d59b60035
SHA1facb1a5e17a1a29a56e0a828ca3b57af5bfa9476
SHA25600d91f79dd4685a0936b59082d467c742cb647004aff1b7e71fad59aaa47a406
SHA5120bdb49ce02514707a9da47adb33b4252a8f44641e08ced15d813e6ea606abdeeedd34e4e23927685eca5b98b6d9b90ca894c39be502f7dbfec8208cd10311f5e
-
Filesize
404KB
MD5836cb0c5835876a80cb5de835e85538c
SHA12e7c3d8c421ffaf74b9b02b372f60da44e742790
SHA256edd0b30dec5361c2407e1b038afd51330bb4e2080fde30a42b0ce115710f47cc
SHA5129eafdd0d718a1dfc89cb686a83c2ca09624b832d9a1c5fef039955eaf6f692eaac432c2b8fe367c8253e6599b13e95490010e055ba760076f4577a1ee836ecc3
-
Filesize
404KB
MD5836cb0c5835876a80cb5de835e85538c
SHA12e7c3d8c421ffaf74b9b02b372f60da44e742790
SHA256edd0b30dec5361c2407e1b038afd51330bb4e2080fde30a42b0ce115710f47cc
SHA5129eafdd0d718a1dfc89cb686a83c2ca09624b832d9a1c5fef039955eaf6f692eaac432c2b8fe367c8253e6599b13e95490010e055ba760076f4577a1ee836ecc3
-
Filesize
396KB
MD59258e8dc2792027ac93e44fb5514ddb5
SHA1b8d174874ef836316919c60873036c8573220295
SHA25623a488b12bc35647b6a06427a01d7587215060173be329dd3196044f343fe081
SHA512574d0ba014a68e11b29a1c2f60c7ef4a5b3597c12adcef26f901e275791422d0a948997a05d62ae61e80f0969eb76908442e13e19755882fc3d428c23519d6ae
-
Filesize
396KB
MD59258e8dc2792027ac93e44fb5514ddb5
SHA1b8d174874ef836316919c60873036c8573220295
SHA25623a488b12bc35647b6a06427a01d7587215060173be329dd3196044f343fe081
SHA512574d0ba014a68e11b29a1c2f60c7ef4a5b3597c12adcef26f901e275791422d0a948997a05d62ae61e80f0969eb76908442e13e19755882fc3d428c23519d6ae
-
Filesize
396KB
MD59258e8dc2792027ac93e44fb5514ddb5
SHA1b8d174874ef836316919c60873036c8573220295
SHA25623a488b12bc35647b6a06427a01d7587215060173be329dd3196044f343fe081
SHA512574d0ba014a68e11b29a1c2f60c7ef4a5b3597c12adcef26f901e275791422d0a948997a05d62ae61e80f0969eb76908442e13e19755882fc3d428c23519d6ae
-
Filesize
396KB
MD59258e8dc2792027ac93e44fb5514ddb5
SHA1b8d174874ef836316919c60873036c8573220295
SHA25623a488b12bc35647b6a06427a01d7587215060173be329dd3196044f343fe081
SHA512574d0ba014a68e11b29a1c2f60c7ef4a5b3597c12adcef26f901e275791422d0a948997a05d62ae61e80f0969eb76908442e13e19755882fc3d428c23519d6ae
-
Filesize
396KB
MD59258e8dc2792027ac93e44fb5514ddb5
SHA1b8d174874ef836316919c60873036c8573220295
SHA25623a488b12bc35647b6a06427a01d7587215060173be329dd3196044f343fe081
SHA512574d0ba014a68e11b29a1c2f60c7ef4a5b3597c12adcef26f901e275791422d0a948997a05d62ae61e80f0969eb76908442e13e19755882fc3d428c23519d6ae
-
Filesize
396KB
MD59258e8dc2792027ac93e44fb5514ddb5
SHA1b8d174874ef836316919c60873036c8573220295
SHA25623a488b12bc35647b6a06427a01d7587215060173be329dd3196044f343fe081
SHA512574d0ba014a68e11b29a1c2f60c7ef4a5b3597c12adcef26f901e275791422d0a948997a05d62ae61e80f0969eb76908442e13e19755882fc3d428c23519d6ae
-
Filesize
396KB
MD59258e8dc2792027ac93e44fb5514ddb5
SHA1b8d174874ef836316919c60873036c8573220295
SHA25623a488b12bc35647b6a06427a01d7587215060173be329dd3196044f343fe081
SHA512574d0ba014a68e11b29a1c2f60c7ef4a5b3597c12adcef26f901e275791422d0a948997a05d62ae61e80f0969eb76908442e13e19755882fc3d428c23519d6ae