Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 03:34
Static task
static1
Behavioral task
behavioral1
Sample
6b70ffc25486e3c82f904a6e5793b4e8a25e607e2ac7c85bb63fbdf985121cc1.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6b70ffc25486e3c82f904a6e5793b4e8a25e607e2ac7c85bb63fbdf985121cc1.exe
Resource
win10v2004-20230915-en
General
-
Target
6b70ffc25486e3c82f904a6e5793b4e8a25e607e2ac7c85bb63fbdf985121cc1.exe
-
Size
937KB
-
MD5
ede54b1684018891a17bd10c478eda44
-
SHA1
4a2b27d8989151400eb02c0199b84b63a12ae9d7
-
SHA256
6b70ffc25486e3c82f904a6e5793b4e8a25e607e2ac7c85bb63fbdf985121cc1
-
SHA512
9c2de726fcd9fe8a9af2057cbbb5cc49817e97f9486195654544c327469440c5d3e1b34e9ec5475cdc627dd1df83a9f677c5c63934b459a5d992cdabd7b040d6
-
SSDEEP
24576:jy4q5mlJWWeuQhH48lPx6ZF+iGsS9dbhD8ri6z7w:24q5ml6hHRx6ZYVbyV
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2632 x8795829.exe 1152 x6483988.exe 2800 x1826574.exe 1616 g3927233.exe -
Loads dropped DLL 12 IoCs
pid Process 2792 6b70ffc25486e3c82f904a6e5793b4e8a25e607e2ac7c85bb63fbdf985121cc1.exe 2632 x8795829.exe 2632 x8795829.exe 1152 x6483988.exe 1152 x6483988.exe 2800 x1826574.exe 2800 x1826574.exe 1616 g3927233.exe 3036 WerFault.exe 3036 WerFault.exe 3036 WerFault.exe 3036 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6b70ffc25486e3c82f904a6e5793b4e8a25e607e2ac7c85bb63fbdf985121cc1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x8795829.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x6483988.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x1826574.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1616 set thread context of 2520 1616 g3927233.exe 33 -
Program crash 2 IoCs
pid pid_target Process procid_target 3036 1616 WerFault.exe 32 2052 2520 WerFault.exe 33 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2632 2792 6b70ffc25486e3c82f904a6e5793b4e8a25e607e2ac7c85bb63fbdf985121cc1.exe 29 PID 2792 wrote to memory of 2632 2792 6b70ffc25486e3c82f904a6e5793b4e8a25e607e2ac7c85bb63fbdf985121cc1.exe 29 PID 2792 wrote to memory of 2632 2792 6b70ffc25486e3c82f904a6e5793b4e8a25e607e2ac7c85bb63fbdf985121cc1.exe 29 PID 2792 wrote to memory of 2632 2792 6b70ffc25486e3c82f904a6e5793b4e8a25e607e2ac7c85bb63fbdf985121cc1.exe 29 PID 2792 wrote to memory of 2632 2792 6b70ffc25486e3c82f904a6e5793b4e8a25e607e2ac7c85bb63fbdf985121cc1.exe 29 PID 2792 wrote to memory of 2632 2792 6b70ffc25486e3c82f904a6e5793b4e8a25e607e2ac7c85bb63fbdf985121cc1.exe 29 PID 2792 wrote to memory of 2632 2792 6b70ffc25486e3c82f904a6e5793b4e8a25e607e2ac7c85bb63fbdf985121cc1.exe 29 PID 2632 wrote to memory of 1152 2632 x8795829.exe 30 PID 2632 wrote to memory of 1152 2632 x8795829.exe 30 PID 2632 wrote to memory of 1152 2632 x8795829.exe 30 PID 2632 wrote to memory of 1152 2632 x8795829.exe 30 PID 2632 wrote to memory of 1152 2632 x8795829.exe 30 PID 2632 wrote to memory of 1152 2632 x8795829.exe 30 PID 2632 wrote to memory of 1152 2632 x8795829.exe 30 PID 1152 wrote to memory of 2800 1152 x6483988.exe 31 PID 1152 wrote to memory of 2800 1152 x6483988.exe 31 PID 1152 wrote to memory of 2800 1152 x6483988.exe 31 PID 1152 wrote to memory of 2800 1152 x6483988.exe 31 PID 1152 wrote to memory of 2800 1152 x6483988.exe 31 PID 1152 wrote to memory of 2800 1152 x6483988.exe 31 PID 1152 wrote to memory of 2800 1152 x6483988.exe 31 PID 2800 wrote to memory of 1616 2800 x1826574.exe 32 PID 2800 wrote to memory of 1616 2800 x1826574.exe 32 PID 2800 wrote to memory of 1616 2800 x1826574.exe 32 PID 2800 wrote to memory of 1616 2800 x1826574.exe 32 PID 2800 wrote to memory of 1616 2800 x1826574.exe 32 PID 2800 wrote to memory of 1616 2800 x1826574.exe 32 PID 2800 wrote to memory of 1616 2800 x1826574.exe 32 PID 1616 wrote to memory of 2520 1616 g3927233.exe 33 PID 1616 wrote to memory of 2520 1616 g3927233.exe 33 PID 1616 wrote to memory of 2520 1616 g3927233.exe 33 PID 1616 wrote to memory of 2520 1616 g3927233.exe 33 PID 1616 wrote to memory of 2520 1616 g3927233.exe 33 PID 1616 wrote to memory of 2520 1616 g3927233.exe 33 PID 1616 wrote to memory of 2520 1616 g3927233.exe 33 PID 1616 wrote to memory of 2520 1616 g3927233.exe 33 PID 1616 wrote to memory of 2520 1616 g3927233.exe 33 PID 1616 wrote to memory of 2520 1616 g3927233.exe 33 PID 1616 wrote to memory of 2520 1616 g3927233.exe 33 PID 1616 wrote to memory of 2520 1616 g3927233.exe 33 PID 1616 wrote to memory of 2520 1616 g3927233.exe 33 PID 1616 wrote to memory of 2520 1616 g3927233.exe 33 PID 2520 wrote to memory of 2052 2520 AppLaunch.exe 35 PID 2520 wrote to memory of 2052 2520 AppLaunch.exe 35 PID 2520 wrote to memory of 2052 2520 AppLaunch.exe 35 PID 2520 wrote to memory of 2052 2520 AppLaunch.exe 35 PID 2520 wrote to memory of 2052 2520 AppLaunch.exe 35 PID 2520 wrote to memory of 2052 2520 AppLaunch.exe 35 PID 2520 wrote to memory of 2052 2520 AppLaunch.exe 35 PID 1616 wrote to memory of 3036 1616 g3927233.exe 34 PID 1616 wrote to memory of 3036 1616 g3927233.exe 34 PID 1616 wrote to memory of 3036 1616 g3927233.exe 34 PID 1616 wrote to memory of 3036 1616 g3927233.exe 34 PID 1616 wrote to memory of 3036 1616 g3927233.exe 34 PID 1616 wrote to memory of 3036 1616 g3927233.exe 34 PID 1616 wrote to memory of 3036 1616 g3927233.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b70ffc25486e3c82f904a6e5793b4e8a25e607e2ac7c85bb63fbdf985121cc1.exe"C:\Users\Admin\AppData\Local\Temp\6b70ffc25486e3c82f904a6e5793b4e8a25e607e2ac7c85bb63fbdf985121cc1.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8795829.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8795829.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6483988.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6483988.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1826574.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1826574.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3927233.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3927233.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2520 -s 2687⤵
- Program crash
PID:2052
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:3036
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
836KB
MD500f1e5b26c6069e838d6f3b9e4d5fc3b
SHA1463bd55af681c244345c06662bfc4e24364ffb53
SHA256a8fdb45e9c2a20836e29cb1110c425757da860470368f9688b006e2b58eba242
SHA5123615e8a41d6b9990849a9b2db8c9790851cf451332d16967855d9862278b448fafbb079683e8bfcad3c6ce815c44c56bdfe2bcc7ac159aff879011861da757be
-
Filesize
836KB
MD500f1e5b26c6069e838d6f3b9e4d5fc3b
SHA1463bd55af681c244345c06662bfc4e24364ffb53
SHA256a8fdb45e9c2a20836e29cb1110c425757da860470368f9688b006e2b58eba242
SHA5123615e8a41d6b9990849a9b2db8c9790851cf451332d16967855d9862278b448fafbb079683e8bfcad3c6ce815c44c56bdfe2bcc7ac159aff879011861da757be
-
Filesize
571KB
MD5998069d1f184617e80f137e9b16d272f
SHA13f95beca13ee43f303dd75cc5623b7364ab99de7
SHA2566b6415c2a8da4c3ebdf8877d2103333793e248272a1d58e248461ddc89e526fa
SHA5127e0618db1f95702dfbc380f1baed307d3f045932b64110fc7f0fbcee34d5c8fa5764aa09502bb2289f8da34fb139f0fc0cbb4ecc8beeebba6dafcab6eaa1bd69
-
Filesize
571KB
MD5998069d1f184617e80f137e9b16d272f
SHA13f95beca13ee43f303dd75cc5623b7364ab99de7
SHA2566b6415c2a8da4c3ebdf8877d2103333793e248272a1d58e248461ddc89e526fa
SHA5127e0618db1f95702dfbc380f1baed307d3f045932b64110fc7f0fbcee34d5c8fa5764aa09502bb2289f8da34fb139f0fc0cbb4ecc8beeebba6dafcab6eaa1bd69
-
Filesize
394KB
MD518771d7bdd771966ca52ddc1acb58fb0
SHA169a18f87eb1e658cb419bc864cb4e5a1f9a64f73
SHA256a4b0c9d80f8329ae4b427df816b4085f2302de704860bfbc758ce23dc34dceb6
SHA51251dcb9617d39ebdebda0c0a82fcd76fcf3e4acd855ea2aba69fdebefb7a879183e0ffd39789afe96834faa3d55735c217fac85659c0150b7e1e956e8eacf71b1
-
Filesize
394KB
MD518771d7bdd771966ca52ddc1acb58fb0
SHA169a18f87eb1e658cb419bc864cb4e5a1f9a64f73
SHA256a4b0c9d80f8329ae4b427df816b4085f2302de704860bfbc758ce23dc34dceb6
SHA51251dcb9617d39ebdebda0c0a82fcd76fcf3e4acd855ea2aba69fdebefb7a879183e0ffd39789afe96834faa3d55735c217fac85659c0150b7e1e956e8eacf71b1
-
Filesize
365KB
MD56d094330acf1ac4df12903f64e0b898b
SHA102618f8bcc536bf163ffa268f2188601c9c9a1ad
SHA256266681ac76224bbb893f632164f50b588625b8d161e6459b93e4705119e81d89
SHA512d9166fac863a8bc94bad2a459d182ef02012b12cea711b02f5bfa2c7c387cd1e4029e708e8ed3b6431b5e717205a5145d4953ad1777c5aa52a2368f25589ae8c
-
Filesize
365KB
MD56d094330acf1ac4df12903f64e0b898b
SHA102618f8bcc536bf163ffa268f2188601c9c9a1ad
SHA256266681ac76224bbb893f632164f50b588625b8d161e6459b93e4705119e81d89
SHA512d9166fac863a8bc94bad2a459d182ef02012b12cea711b02f5bfa2c7c387cd1e4029e708e8ed3b6431b5e717205a5145d4953ad1777c5aa52a2368f25589ae8c
-
Filesize
836KB
MD500f1e5b26c6069e838d6f3b9e4d5fc3b
SHA1463bd55af681c244345c06662bfc4e24364ffb53
SHA256a8fdb45e9c2a20836e29cb1110c425757da860470368f9688b006e2b58eba242
SHA5123615e8a41d6b9990849a9b2db8c9790851cf451332d16967855d9862278b448fafbb079683e8bfcad3c6ce815c44c56bdfe2bcc7ac159aff879011861da757be
-
Filesize
836KB
MD500f1e5b26c6069e838d6f3b9e4d5fc3b
SHA1463bd55af681c244345c06662bfc4e24364ffb53
SHA256a8fdb45e9c2a20836e29cb1110c425757da860470368f9688b006e2b58eba242
SHA5123615e8a41d6b9990849a9b2db8c9790851cf451332d16967855d9862278b448fafbb079683e8bfcad3c6ce815c44c56bdfe2bcc7ac159aff879011861da757be
-
Filesize
571KB
MD5998069d1f184617e80f137e9b16d272f
SHA13f95beca13ee43f303dd75cc5623b7364ab99de7
SHA2566b6415c2a8da4c3ebdf8877d2103333793e248272a1d58e248461ddc89e526fa
SHA5127e0618db1f95702dfbc380f1baed307d3f045932b64110fc7f0fbcee34d5c8fa5764aa09502bb2289f8da34fb139f0fc0cbb4ecc8beeebba6dafcab6eaa1bd69
-
Filesize
571KB
MD5998069d1f184617e80f137e9b16d272f
SHA13f95beca13ee43f303dd75cc5623b7364ab99de7
SHA2566b6415c2a8da4c3ebdf8877d2103333793e248272a1d58e248461ddc89e526fa
SHA5127e0618db1f95702dfbc380f1baed307d3f045932b64110fc7f0fbcee34d5c8fa5764aa09502bb2289f8da34fb139f0fc0cbb4ecc8beeebba6dafcab6eaa1bd69
-
Filesize
394KB
MD518771d7bdd771966ca52ddc1acb58fb0
SHA169a18f87eb1e658cb419bc864cb4e5a1f9a64f73
SHA256a4b0c9d80f8329ae4b427df816b4085f2302de704860bfbc758ce23dc34dceb6
SHA51251dcb9617d39ebdebda0c0a82fcd76fcf3e4acd855ea2aba69fdebefb7a879183e0ffd39789afe96834faa3d55735c217fac85659c0150b7e1e956e8eacf71b1
-
Filesize
394KB
MD518771d7bdd771966ca52ddc1acb58fb0
SHA169a18f87eb1e658cb419bc864cb4e5a1f9a64f73
SHA256a4b0c9d80f8329ae4b427df816b4085f2302de704860bfbc758ce23dc34dceb6
SHA51251dcb9617d39ebdebda0c0a82fcd76fcf3e4acd855ea2aba69fdebefb7a879183e0ffd39789afe96834faa3d55735c217fac85659c0150b7e1e956e8eacf71b1
-
Filesize
365KB
MD56d094330acf1ac4df12903f64e0b898b
SHA102618f8bcc536bf163ffa268f2188601c9c9a1ad
SHA256266681ac76224bbb893f632164f50b588625b8d161e6459b93e4705119e81d89
SHA512d9166fac863a8bc94bad2a459d182ef02012b12cea711b02f5bfa2c7c387cd1e4029e708e8ed3b6431b5e717205a5145d4953ad1777c5aa52a2368f25589ae8c
-
Filesize
365KB
MD56d094330acf1ac4df12903f64e0b898b
SHA102618f8bcc536bf163ffa268f2188601c9c9a1ad
SHA256266681ac76224bbb893f632164f50b588625b8d161e6459b93e4705119e81d89
SHA512d9166fac863a8bc94bad2a459d182ef02012b12cea711b02f5bfa2c7c387cd1e4029e708e8ed3b6431b5e717205a5145d4953ad1777c5aa52a2368f25589ae8c
-
Filesize
365KB
MD56d094330acf1ac4df12903f64e0b898b
SHA102618f8bcc536bf163ffa268f2188601c9c9a1ad
SHA256266681ac76224bbb893f632164f50b588625b8d161e6459b93e4705119e81d89
SHA512d9166fac863a8bc94bad2a459d182ef02012b12cea711b02f5bfa2c7c387cd1e4029e708e8ed3b6431b5e717205a5145d4953ad1777c5aa52a2368f25589ae8c
-
Filesize
365KB
MD56d094330acf1ac4df12903f64e0b898b
SHA102618f8bcc536bf163ffa268f2188601c9c9a1ad
SHA256266681ac76224bbb893f632164f50b588625b8d161e6459b93e4705119e81d89
SHA512d9166fac863a8bc94bad2a459d182ef02012b12cea711b02f5bfa2c7c387cd1e4029e708e8ed3b6431b5e717205a5145d4953ad1777c5aa52a2368f25589ae8c
-
Filesize
365KB
MD56d094330acf1ac4df12903f64e0b898b
SHA102618f8bcc536bf163ffa268f2188601c9c9a1ad
SHA256266681ac76224bbb893f632164f50b588625b8d161e6459b93e4705119e81d89
SHA512d9166fac863a8bc94bad2a459d182ef02012b12cea711b02f5bfa2c7c387cd1e4029e708e8ed3b6431b5e717205a5145d4953ad1777c5aa52a2368f25589ae8c
-
Filesize
365KB
MD56d094330acf1ac4df12903f64e0b898b
SHA102618f8bcc536bf163ffa268f2188601c9c9a1ad
SHA256266681ac76224bbb893f632164f50b588625b8d161e6459b93e4705119e81d89
SHA512d9166fac863a8bc94bad2a459d182ef02012b12cea711b02f5bfa2c7c387cd1e4029e708e8ed3b6431b5e717205a5145d4953ad1777c5aa52a2368f25589ae8c