Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 03:54
Static task
static1
Behavioral task
behavioral1
Sample
deb582549cc18ca902c0a76e000e8614774a55728c3d59a347a81f53fcf7afc1.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
deb582549cc18ca902c0a76e000e8614774a55728c3d59a347a81f53fcf7afc1.exe
Resource
win10v2004-20230915-en
General
-
Target
deb582549cc18ca902c0a76e000e8614774a55728c3d59a347a81f53fcf7afc1.exe
-
Size
937KB
-
MD5
de19beac14b6308561fb98448a53066c
-
SHA1
c417549534c948b5081769ed993f20fdcbd162e5
-
SHA256
deb582549cc18ca902c0a76e000e8614774a55728c3d59a347a81f53fcf7afc1
-
SHA512
ea4db55ebe2b11f11b85d25d8082cef90b8f998cd876ed62103c662c58ad85b7f15a7af1b04749397e820df07d65397aa8e2d6ba6bc7b5b158b1a3e209361f18
-
SSDEEP
12288:JMrEy90DyNHgGlnIh550AtV48OjOTBQKN9+yiy6acLNluNUnXP7EzBJBbeTQWfiL:tyLHg4nIhDNM5jCTK9P7yBfBWf5Ux
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 3020 x0219631.exe 2360 x8938523.exe 2764 x0376444.exe 2836 g3939047.exe -
Loads dropped DLL 12 IoCs
pid Process 2188 deb582549cc18ca902c0a76e000e8614774a55728c3d59a347a81f53fcf7afc1.exe 3020 x0219631.exe 3020 x0219631.exe 2360 x8938523.exe 2360 x8938523.exe 2764 x0376444.exe 2764 x0376444.exe 2836 g3939047.exe 2716 WerFault.exe 2716 WerFault.exe 2716 WerFault.exe 2716 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x0219631.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x8938523.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x0376444.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" deb582549cc18ca902c0a76e000e8614774a55728c3d59a347a81f53fcf7afc1.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2836 set thread context of 2612 2836 g3939047.exe 32 -
Program crash 2 IoCs
pid pid_target Process procid_target 2716 2836 WerFault.exe 31 2664 2612 WerFault.exe 32 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2188 wrote to memory of 3020 2188 deb582549cc18ca902c0a76e000e8614774a55728c3d59a347a81f53fcf7afc1.exe 28 PID 2188 wrote to memory of 3020 2188 deb582549cc18ca902c0a76e000e8614774a55728c3d59a347a81f53fcf7afc1.exe 28 PID 2188 wrote to memory of 3020 2188 deb582549cc18ca902c0a76e000e8614774a55728c3d59a347a81f53fcf7afc1.exe 28 PID 2188 wrote to memory of 3020 2188 deb582549cc18ca902c0a76e000e8614774a55728c3d59a347a81f53fcf7afc1.exe 28 PID 2188 wrote to memory of 3020 2188 deb582549cc18ca902c0a76e000e8614774a55728c3d59a347a81f53fcf7afc1.exe 28 PID 2188 wrote to memory of 3020 2188 deb582549cc18ca902c0a76e000e8614774a55728c3d59a347a81f53fcf7afc1.exe 28 PID 2188 wrote to memory of 3020 2188 deb582549cc18ca902c0a76e000e8614774a55728c3d59a347a81f53fcf7afc1.exe 28 PID 3020 wrote to memory of 2360 3020 x0219631.exe 29 PID 3020 wrote to memory of 2360 3020 x0219631.exe 29 PID 3020 wrote to memory of 2360 3020 x0219631.exe 29 PID 3020 wrote to memory of 2360 3020 x0219631.exe 29 PID 3020 wrote to memory of 2360 3020 x0219631.exe 29 PID 3020 wrote to memory of 2360 3020 x0219631.exe 29 PID 3020 wrote to memory of 2360 3020 x0219631.exe 29 PID 2360 wrote to memory of 2764 2360 x8938523.exe 30 PID 2360 wrote to memory of 2764 2360 x8938523.exe 30 PID 2360 wrote to memory of 2764 2360 x8938523.exe 30 PID 2360 wrote to memory of 2764 2360 x8938523.exe 30 PID 2360 wrote to memory of 2764 2360 x8938523.exe 30 PID 2360 wrote to memory of 2764 2360 x8938523.exe 30 PID 2360 wrote to memory of 2764 2360 x8938523.exe 30 PID 2764 wrote to memory of 2836 2764 x0376444.exe 31 PID 2764 wrote to memory of 2836 2764 x0376444.exe 31 PID 2764 wrote to memory of 2836 2764 x0376444.exe 31 PID 2764 wrote to memory of 2836 2764 x0376444.exe 31 PID 2764 wrote to memory of 2836 2764 x0376444.exe 31 PID 2764 wrote to memory of 2836 2764 x0376444.exe 31 PID 2764 wrote to memory of 2836 2764 x0376444.exe 31 PID 2836 wrote to memory of 2612 2836 g3939047.exe 32 PID 2836 wrote to memory of 2612 2836 g3939047.exe 32 PID 2836 wrote to memory of 2612 2836 g3939047.exe 32 PID 2836 wrote to memory of 2612 2836 g3939047.exe 32 PID 2836 wrote to memory of 2612 2836 g3939047.exe 32 PID 2836 wrote to memory of 2612 2836 g3939047.exe 32 PID 2836 wrote to memory of 2612 2836 g3939047.exe 32 PID 2836 wrote to memory of 2612 2836 g3939047.exe 32 PID 2836 wrote to memory of 2612 2836 g3939047.exe 32 PID 2836 wrote to memory of 2612 2836 g3939047.exe 32 PID 2836 wrote to memory of 2612 2836 g3939047.exe 32 PID 2836 wrote to memory of 2612 2836 g3939047.exe 32 PID 2836 wrote to memory of 2612 2836 g3939047.exe 32 PID 2836 wrote to memory of 2612 2836 g3939047.exe 32 PID 2836 wrote to memory of 2716 2836 g3939047.exe 33 PID 2836 wrote to memory of 2716 2836 g3939047.exe 33 PID 2836 wrote to memory of 2716 2836 g3939047.exe 33 PID 2836 wrote to memory of 2716 2836 g3939047.exe 33 PID 2836 wrote to memory of 2716 2836 g3939047.exe 33 PID 2836 wrote to memory of 2716 2836 g3939047.exe 33 PID 2836 wrote to memory of 2716 2836 g3939047.exe 33 PID 2612 wrote to memory of 2664 2612 AppLaunch.exe 34 PID 2612 wrote to memory of 2664 2612 AppLaunch.exe 34 PID 2612 wrote to memory of 2664 2612 AppLaunch.exe 34 PID 2612 wrote to memory of 2664 2612 AppLaunch.exe 34 PID 2612 wrote to memory of 2664 2612 AppLaunch.exe 34 PID 2612 wrote to memory of 2664 2612 AppLaunch.exe 34 PID 2612 wrote to memory of 2664 2612 AppLaunch.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\deb582549cc18ca902c0a76e000e8614774a55728c3d59a347a81f53fcf7afc1.exe"C:\Users\Admin\AppData\Local\Temp\deb582549cc18ca902c0a76e000e8614774a55728c3d59a347a81f53fcf7afc1.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0219631.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0219631.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8938523.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8938523.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0376444.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x0376444.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3939047.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3939047.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2612 -s 2687⤵
- Program crash
PID:2664
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2716
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
835KB
MD52015408f1a12a13fe8370d6db3c76d16
SHA1f833b5671e15c15fb8654e311713c40caf7a8728
SHA256f305cf4fa2135a6b13d6cb9cd8029e9deb31f2ef01386e3515279f7e2c9ee56b
SHA5124829953281024fe144e97323de2e38bea239dc18ee6a04cd526e131c08479c97c266d5d66729b81f55007864089d04c746a8824eabdeb39f536c4bbc13caa399
-
Filesize
835KB
MD52015408f1a12a13fe8370d6db3c76d16
SHA1f833b5671e15c15fb8654e311713c40caf7a8728
SHA256f305cf4fa2135a6b13d6cb9cd8029e9deb31f2ef01386e3515279f7e2c9ee56b
SHA5124829953281024fe144e97323de2e38bea239dc18ee6a04cd526e131c08479c97c266d5d66729b81f55007864089d04c746a8824eabdeb39f536c4bbc13caa399
-
Filesize
570KB
MD5f71f6c116a4663146ce360bd74c222b3
SHA1b479fffa88c01f360d5d7216c08d46dbdace4ccd
SHA25678b3c2b38c9e1044f1acc09efb285e738d08fb89b595d12b86e3af48811ea8fe
SHA512c42f6653b7c9e0d502e0e659918110dcc444b65cf08646e212840a61edb59c15ed695fd9fc356a662932eb5dfc6c2ae6e4031bbd6885a922cfd060fee78164e8
-
Filesize
570KB
MD5f71f6c116a4663146ce360bd74c222b3
SHA1b479fffa88c01f360d5d7216c08d46dbdace4ccd
SHA25678b3c2b38c9e1044f1acc09efb285e738d08fb89b595d12b86e3af48811ea8fe
SHA512c42f6653b7c9e0d502e0e659918110dcc444b65cf08646e212840a61edb59c15ed695fd9fc356a662932eb5dfc6c2ae6e4031bbd6885a922cfd060fee78164e8
-
Filesize
394KB
MD5328116f2e71dd0f8c806e0899d3d0788
SHA13b9e4378b6e3ad6fd53bb2e01f1693944fb8ac05
SHA256ad2bd67c7e40501c03bef609b17f559c42b012144bd508334dee2ee7e765ee62
SHA512fc379b839a15539f4de2bb0ff44eb38c2950f61c1e139ad11059872899cfdf2517044826dd375adfeb1e8d44db2823fb36d3bd30dc73cb974a2ba419d14b23cc
-
Filesize
394KB
MD5328116f2e71dd0f8c806e0899d3d0788
SHA13b9e4378b6e3ad6fd53bb2e01f1693944fb8ac05
SHA256ad2bd67c7e40501c03bef609b17f559c42b012144bd508334dee2ee7e765ee62
SHA512fc379b839a15539f4de2bb0ff44eb38c2950f61c1e139ad11059872899cfdf2517044826dd375adfeb1e8d44db2823fb36d3bd30dc73cb974a2ba419d14b23cc
-
Filesize
365KB
MD518e35e29782457dcdd157fc0dca47806
SHA10e85ac4e034a99e75e401acc69cbd62b8d251577
SHA25615b91419231ec5191535d160154b3c4c9170084e941b3856699f6b395fa2b2a2
SHA512bdb9c2baa6549f74380a4c789bd020534281cd42b8bd1485c57ffd1559485367e4fe487ed0ab09ddbf03eb410001047fa7265c8fcdc44f2da0c0a677ec237b38
-
Filesize
365KB
MD518e35e29782457dcdd157fc0dca47806
SHA10e85ac4e034a99e75e401acc69cbd62b8d251577
SHA25615b91419231ec5191535d160154b3c4c9170084e941b3856699f6b395fa2b2a2
SHA512bdb9c2baa6549f74380a4c789bd020534281cd42b8bd1485c57ffd1559485367e4fe487ed0ab09ddbf03eb410001047fa7265c8fcdc44f2da0c0a677ec237b38
-
Filesize
835KB
MD52015408f1a12a13fe8370d6db3c76d16
SHA1f833b5671e15c15fb8654e311713c40caf7a8728
SHA256f305cf4fa2135a6b13d6cb9cd8029e9deb31f2ef01386e3515279f7e2c9ee56b
SHA5124829953281024fe144e97323de2e38bea239dc18ee6a04cd526e131c08479c97c266d5d66729b81f55007864089d04c746a8824eabdeb39f536c4bbc13caa399
-
Filesize
835KB
MD52015408f1a12a13fe8370d6db3c76d16
SHA1f833b5671e15c15fb8654e311713c40caf7a8728
SHA256f305cf4fa2135a6b13d6cb9cd8029e9deb31f2ef01386e3515279f7e2c9ee56b
SHA5124829953281024fe144e97323de2e38bea239dc18ee6a04cd526e131c08479c97c266d5d66729b81f55007864089d04c746a8824eabdeb39f536c4bbc13caa399
-
Filesize
570KB
MD5f71f6c116a4663146ce360bd74c222b3
SHA1b479fffa88c01f360d5d7216c08d46dbdace4ccd
SHA25678b3c2b38c9e1044f1acc09efb285e738d08fb89b595d12b86e3af48811ea8fe
SHA512c42f6653b7c9e0d502e0e659918110dcc444b65cf08646e212840a61edb59c15ed695fd9fc356a662932eb5dfc6c2ae6e4031bbd6885a922cfd060fee78164e8
-
Filesize
570KB
MD5f71f6c116a4663146ce360bd74c222b3
SHA1b479fffa88c01f360d5d7216c08d46dbdace4ccd
SHA25678b3c2b38c9e1044f1acc09efb285e738d08fb89b595d12b86e3af48811ea8fe
SHA512c42f6653b7c9e0d502e0e659918110dcc444b65cf08646e212840a61edb59c15ed695fd9fc356a662932eb5dfc6c2ae6e4031bbd6885a922cfd060fee78164e8
-
Filesize
394KB
MD5328116f2e71dd0f8c806e0899d3d0788
SHA13b9e4378b6e3ad6fd53bb2e01f1693944fb8ac05
SHA256ad2bd67c7e40501c03bef609b17f559c42b012144bd508334dee2ee7e765ee62
SHA512fc379b839a15539f4de2bb0ff44eb38c2950f61c1e139ad11059872899cfdf2517044826dd375adfeb1e8d44db2823fb36d3bd30dc73cb974a2ba419d14b23cc
-
Filesize
394KB
MD5328116f2e71dd0f8c806e0899d3d0788
SHA13b9e4378b6e3ad6fd53bb2e01f1693944fb8ac05
SHA256ad2bd67c7e40501c03bef609b17f559c42b012144bd508334dee2ee7e765ee62
SHA512fc379b839a15539f4de2bb0ff44eb38c2950f61c1e139ad11059872899cfdf2517044826dd375adfeb1e8d44db2823fb36d3bd30dc73cb974a2ba419d14b23cc
-
Filesize
365KB
MD518e35e29782457dcdd157fc0dca47806
SHA10e85ac4e034a99e75e401acc69cbd62b8d251577
SHA25615b91419231ec5191535d160154b3c4c9170084e941b3856699f6b395fa2b2a2
SHA512bdb9c2baa6549f74380a4c789bd020534281cd42b8bd1485c57ffd1559485367e4fe487ed0ab09ddbf03eb410001047fa7265c8fcdc44f2da0c0a677ec237b38
-
Filesize
365KB
MD518e35e29782457dcdd157fc0dca47806
SHA10e85ac4e034a99e75e401acc69cbd62b8d251577
SHA25615b91419231ec5191535d160154b3c4c9170084e941b3856699f6b395fa2b2a2
SHA512bdb9c2baa6549f74380a4c789bd020534281cd42b8bd1485c57ffd1559485367e4fe487ed0ab09ddbf03eb410001047fa7265c8fcdc44f2da0c0a677ec237b38
-
Filesize
365KB
MD518e35e29782457dcdd157fc0dca47806
SHA10e85ac4e034a99e75e401acc69cbd62b8d251577
SHA25615b91419231ec5191535d160154b3c4c9170084e941b3856699f6b395fa2b2a2
SHA512bdb9c2baa6549f74380a4c789bd020534281cd42b8bd1485c57ffd1559485367e4fe487ed0ab09ddbf03eb410001047fa7265c8fcdc44f2da0c0a677ec237b38
-
Filesize
365KB
MD518e35e29782457dcdd157fc0dca47806
SHA10e85ac4e034a99e75e401acc69cbd62b8d251577
SHA25615b91419231ec5191535d160154b3c4c9170084e941b3856699f6b395fa2b2a2
SHA512bdb9c2baa6549f74380a4c789bd020534281cd42b8bd1485c57ffd1559485367e4fe487ed0ab09ddbf03eb410001047fa7265c8fcdc44f2da0c0a677ec237b38
-
Filesize
365KB
MD518e35e29782457dcdd157fc0dca47806
SHA10e85ac4e034a99e75e401acc69cbd62b8d251577
SHA25615b91419231ec5191535d160154b3c4c9170084e941b3856699f6b395fa2b2a2
SHA512bdb9c2baa6549f74380a4c789bd020534281cd42b8bd1485c57ffd1559485367e4fe487ed0ab09ddbf03eb410001047fa7265c8fcdc44f2da0c0a677ec237b38
-
Filesize
365KB
MD518e35e29782457dcdd157fc0dca47806
SHA10e85ac4e034a99e75e401acc69cbd62b8d251577
SHA25615b91419231ec5191535d160154b3c4c9170084e941b3856699f6b395fa2b2a2
SHA512bdb9c2baa6549f74380a4c789bd020534281cd42b8bd1485c57ffd1559485367e4fe487ed0ab09ddbf03eb410001047fa7265c8fcdc44f2da0c0a677ec237b38