Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 04:40
Static task
static1
Behavioral task
behavioral1
Sample
e10c1b1865a2f9235ef8b71f145452c61dbd8f4e05837039766f7bf4a6d01529.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
e10c1b1865a2f9235ef8b71f145452c61dbd8f4e05837039766f7bf4a6d01529.exe
Resource
win10v2004-20230915-en
General
-
Target
e10c1b1865a2f9235ef8b71f145452c61dbd8f4e05837039766f7bf4a6d01529.exe
-
Size
1.0MB
-
MD5
5c09a739b2065cde125823aadb03cb9b
-
SHA1
dd1fcba25cd515d955836e67248e71a9b6566595
-
SHA256
e10c1b1865a2f9235ef8b71f145452c61dbd8f4e05837039766f7bf4a6d01529
-
SHA512
16467c5a3146fad73b0e7c983fd71466bc3b59f12400d4c6f5d5753a2bbce5428a397cbf31e2411c47ba96f999fb1e2a8be6f9336857375ed79a819079415a4e
-
SSDEEP
24576:fyt1pThJxx6Df54n9/Lsl+FJmyKmwJVe:qDpdJ4faxFdKD
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2200 x8862545.exe 1752 x3540695.exe 2160 x9622654.exe 2808 g0400332.exe -
Loads dropped DLL 13 IoCs
pid Process 840 e10c1b1865a2f9235ef8b71f145452c61dbd8f4e05837039766f7bf4a6d01529.exe 2200 x8862545.exe 2200 x8862545.exe 1752 x3540695.exe 1752 x3540695.exe 2160 x9622654.exe 2160 x9622654.exe 2160 x9622654.exe 2808 g0400332.exe 2912 WerFault.exe 2912 WerFault.exe 2912 WerFault.exe 2912 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e10c1b1865a2f9235ef8b71f145452c61dbd8f4e05837039766f7bf4a6d01529.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x8862545.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x3540695.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x9622654.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2808 set thread context of 2656 2808 g0400332.exe 33 -
Program crash 2 IoCs
pid pid_target Process procid_target 2912 2808 WerFault.exe 31 2696 2656 WerFault.exe 33 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 840 wrote to memory of 2200 840 e10c1b1865a2f9235ef8b71f145452c61dbd8f4e05837039766f7bf4a6d01529.exe 28 PID 840 wrote to memory of 2200 840 e10c1b1865a2f9235ef8b71f145452c61dbd8f4e05837039766f7bf4a6d01529.exe 28 PID 840 wrote to memory of 2200 840 e10c1b1865a2f9235ef8b71f145452c61dbd8f4e05837039766f7bf4a6d01529.exe 28 PID 840 wrote to memory of 2200 840 e10c1b1865a2f9235ef8b71f145452c61dbd8f4e05837039766f7bf4a6d01529.exe 28 PID 840 wrote to memory of 2200 840 e10c1b1865a2f9235ef8b71f145452c61dbd8f4e05837039766f7bf4a6d01529.exe 28 PID 840 wrote to memory of 2200 840 e10c1b1865a2f9235ef8b71f145452c61dbd8f4e05837039766f7bf4a6d01529.exe 28 PID 840 wrote to memory of 2200 840 e10c1b1865a2f9235ef8b71f145452c61dbd8f4e05837039766f7bf4a6d01529.exe 28 PID 2200 wrote to memory of 1752 2200 x8862545.exe 29 PID 2200 wrote to memory of 1752 2200 x8862545.exe 29 PID 2200 wrote to memory of 1752 2200 x8862545.exe 29 PID 2200 wrote to memory of 1752 2200 x8862545.exe 29 PID 2200 wrote to memory of 1752 2200 x8862545.exe 29 PID 2200 wrote to memory of 1752 2200 x8862545.exe 29 PID 2200 wrote to memory of 1752 2200 x8862545.exe 29 PID 1752 wrote to memory of 2160 1752 x3540695.exe 30 PID 1752 wrote to memory of 2160 1752 x3540695.exe 30 PID 1752 wrote to memory of 2160 1752 x3540695.exe 30 PID 1752 wrote to memory of 2160 1752 x3540695.exe 30 PID 1752 wrote to memory of 2160 1752 x3540695.exe 30 PID 1752 wrote to memory of 2160 1752 x3540695.exe 30 PID 1752 wrote to memory of 2160 1752 x3540695.exe 30 PID 2160 wrote to memory of 2808 2160 x9622654.exe 31 PID 2160 wrote to memory of 2808 2160 x9622654.exe 31 PID 2160 wrote to memory of 2808 2160 x9622654.exe 31 PID 2160 wrote to memory of 2808 2160 x9622654.exe 31 PID 2160 wrote to memory of 2808 2160 x9622654.exe 31 PID 2160 wrote to memory of 2808 2160 x9622654.exe 31 PID 2160 wrote to memory of 2808 2160 x9622654.exe 31 PID 2808 wrote to memory of 2656 2808 g0400332.exe 33 PID 2808 wrote to memory of 2656 2808 g0400332.exe 33 PID 2808 wrote to memory of 2656 2808 g0400332.exe 33 PID 2808 wrote to memory of 2656 2808 g0400332.exe 33 PID 2808 wrote to memory of 2656 2808 g0400332.exe 33 PID 2808 wrote to memory of 2656 2808 g0400332.exe 33 PID 2808 wrote to memory of 2656 2808 g0400332.exe 33 PID 2808 wrote to memory of 2656 2808 g0400332.exe 33 PID 2808 wrote to memory of 2656 2808 g0400332.exe 33 PID 2808 wrote to memory of 2656 2808 g0400332.exe 33 PID 2808 wrote to memory of 2656 2808 g0400332.exe 33 PID 2808 wrote to memory of 2656 2808 g0400332.exe 33 PID 2808 wrote to memory of 2656 2808 g0400332.exe 33 PID 2808 wrote to memory of 2656 2808 g0400332.exe 33 PID 2808 wrote to memory of 2912 2808 g0400332.exe 34 PID 2808 wrote to memory of 2912 2808 g0400332.exe 34 PID 2808 wrote to memory of 2912 2808 g0400332.exe 34 PID 2808 wrote to memory of 2912 2808 g0400332.exe 34 PID 2808 wrote to memory of 2912 2808 g0400332.exe 34 PID 2808 wrote to memory of 2912 2808 g0400332.exe 34 PID 2808 wrote to memory of 2912 2808 g0400332.exe 34 PID 2656 wrote to memory of 2696 2656 AppLaunch.exe 35 PID 2656 wrote to memory of 2696 2656 AppLaunch.exe 35 PID 2656 wrote to memory of 2696 2656 AppLaunch.exe 35 PID 2656 wrote to memory of 2696 2656 AppLaunch.exe 35 PID 2656 wrote to memory of 2696 2656 AppLaunch.exe 35 PID 2656 wrote to memory of 2696 2656 AppLaunch.exe 35 PID 2656 wrote to memory of 2696 2656 AppLaunch.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\e10c1b1865a2f9235ef8b71f145452c61dbd8f4e05837039766f7bf4a6d01529.exe"C:\Users\Admin\AppData\Local\Temp\e10c1b1865a2f9235ef8b71f145452c61dbd8f4e05837039766f7bf4a6d01529.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8862545.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8862545.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3540695.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3540695.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9622654.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9622654.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0400332.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0400332.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 2687⤵
- Program crash
PID:2696
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 2686⤵
- Loads dropped DLL
- Program crash
PID:2912
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
933KB
MD504dbe4c79e00592b395bae2664c05548
SHA1e25c1deca27997435fe201aab311011732fea89b
SHA256484b44c5b02d3ae0b1eff4187bc882e6c11b1f879f38fcfcbc046134cb390792
SHA5124f549b6c1fbbfa5e740268e0adf90ac177b4477e5c74bec31c753a095fe26663cc78078d1769d5fc758a209cfe9e6931daf39c6cd3aaaa76fd91fcbd9c4d9014
-
Filesize
933KB
MD504dbe4c79e00592b395bae2664c05548
SHA1e25c1deca27997435fe201aab311011732fea89b
SHA256484b44c5b02d3ae0b1eff4187bc882e6c11b1f879f38fcfcbc046134cb390792
SHA5124f549b6c1fbbfa5e740268e0adf90ac177b4477e5c74bec31c753a095fe26663cc78078d1769d5fc758a209cfe9e6931daf39c6cd3aaaa76fd91fcbd9c4d9014
-
Filesize
629KB
MD51aea6e562653951a5c845e6126d0a080
SHA10890c6d7c6cb131cce977bf3c3d801621168ba1c
SHA256acefd1bbce0113cea2be700a5d221c5f089044b43937b86c9cb62143c4da7c60
SHA512699cb5c9241b0b126d3dea0187af40ae801859854d12552e5ed660b0b9cd095c69fe2321ae9ca4139436f5fed77bc0a21792eb5ee7b3552628aad8b978819518
-
Filesize
629KB
MD51aea6e562653951a5c845e6126d0a080
SHA10890c6d7c6cb131cce977bf3c3d801621168ba1c
SHA256acefd1bbce0113cea2be700a5d221c5f089044b43937b86c9cb62143c4da7c60
SHA512699cb5c9241b0b126d3dea0187af40ae801859854d12552e5ed660b0b9cd095c69fe2321ae9ca4139436f5fed77bc0a21792eb5ee7b3552628aad8b978819518
-
Filesize
443KB
MD5c5499fab32c9c36f115b6e22957885ae
SHA1e499e1577fd33d82b2eb9a854e072192cde89172
SHA256abe21cb809c27c02f4bcaa05f4eaffcc2b989c3057adc1aaf6792efcfe5ba1c3
SHA512455cab9afbfdf009ca51cfe76ab30e731beb0a8edaca1b6e402a689b119a2b359f9dd19385978464bc5e8bfa0c5f0e7fb756a514418480da1679f7520332db60
-
Filesize
443KB
MD5c5499fab32c9c36f115b6e22957885ae
SHA1e499e1577fd33d82b2eb9a854e072192cde89172
SHA256abe21cb809c27c02f4bcaa05f4eaffcc2b989c3057adc1aaf6792efcfe5ba1c3
SHA512455cab9afbfdf009ca51cfe76ab30e731beb0a8edaca1b6e402a689b119a2b359f9dd19385978464bc5e8bfa0c5f0e7fb756a514418480da1679f7520332db60
-
Filesize
700KB
MD5d19784c74c0e4e6ce1f611dc25abc9e1
SHA13b134b57b21ce62e8fccc48a7f5211973e9866c3
SHA256e9cd8cf6e2edd8ac459ac0eb97713b05f193239bd5ba6dc8daded0a51d6890d3
SHA512691d8af586338fc6dc88bce1afc0876039f95f6b897f99d74b859d117bf9faaa85149946d61808ec88305e33cff72ba1fc1ae9e9bf053692ef2702a869538597
-
Filesize
700KB
MD5d19784c74c0e4e6ce1f611dc25abc9e1
SHA13b134b57b21ce62e8fccc48a7f5211973e9866c3
SHA256e9cd8cf6e2edd8ac459ac0eb97713b05f193239bd5ba6dc8daded0a51d6890d3
SHA512691d8af586338fc6dc88bce1afc0876039f95f6b897f99d74b859d117bf9faaa85149946d61808ec88305e33cff72ba1fc1ae9e9bf053692ef2702a869538597
-
Filesize
700KB
MD5d19784c74c0e4e6ce1f611dc25abc9e1
SHA13b134b57b21ce62e8fccc48a7f5211973e9866c3
SHA256e9cd8cf6e2edd8ac459ac0eb97713b05f193239bd5ba6dc8daded0a51d6890d3
SHA512691d8af586338fc6dc88bce1afc0876039f95f6b897f99d74b859d117bf9faaa85149946d61808ec88305e33cff72ba1fc1ae9e9bf053692ef2702a869538597
-
Filesize
933KB
MD504dbe4c79e00592b395bae2664c05548
SHA1e25c1deca27997435fe201aab311011732fea89b
SHA256484b44c5b02d3ae0b1eff4187bc882e6c11b1f879f38fcfcbc046134cb390792
SHA5124f549b6c1fbbfa5e740268e0adf90ac177b4477e5c74bec31c753a095fe26663cc78078d1769d5fc758a209cfe9e6931daf39c6cd3aaaa76fd91fcbd9c4d9014
-
Filesize
933KB
MD504dbe4c79e00592b395bae2664c05548
SHA1e25c1deca27997435fe201aab311011732fea89b
SHA256484b44c5b02d3ae0b1eff4187bc882e6c11b1f879f38fcfcbc046134cb390792
SHA5124f549b6c1fbbfa5e740268e0adf90ac177b4477e5c74bec31c753a095fe26663cc78078d1769d5fc758a209cfe9e6931daf39c6cd3aaaa76fd91fcbd9c4d9014
-
Filesize
629KB
MD51aea6e562653951a5c845e6126d0a080
SHA10890c6d7c6cb131cce977bf3c3d801621168ba1c
SHA256acefd1bbce0113cea2be700a5d221c5f089044b43937b86c9cb62143c4da7c60
SHA512699cb5c9241b0b126d3dea0187af40ae801859854d12552e5ed660b0b9cd095c69fe2321ae9ca4139436f5fed77bc0a21792eb5ee7b3552628aad8b978819518
-
Filesize
629KB
MD51aea6e562653951a5c845e6126d0a080
SHA10890c6d7c6cb131cce977bf3c3d801621168ba1c
SHA256acefd1bbce0113cea2be700a5d221c5f089044b43937b86c9cb62143c4da7c60
SHA512699cb5c9241b0b126d3dea0187af40ae801859854d12552e5ed660b0b9cd095c69fe2321ae9ca4139436f5fed77bc0a21792eb5ee7b3552628aad8b978819518
-
Filesize
443KB
MD5c5499fab32c9c36f115b6e22957885ae
SHA1e499e1577fd33d82b2eb9a854e072192cde89172
SHA256abe21cb809c27c02f4bcaa05f4eaffcc2b989c3057adc1aaf6792efcfe5ba1c3
SHA512455cab9afbfdf009ca51cfe76ab30e731beb0a8edaca1b6e402a689b119a2b359f9dd19385978464bc5e8bfa0c5f0e7fb756a514418480da1679f7520332db60
-
Filesize
443KB
MD5c5499fab32c9c36f115b6e22957885ae
SHA1e499e1577fd33d82b2eb9a854e072192cde89172
SHA256abe21cb809c27c02f4bcaa05f4eaffcc2b989c3057adc1aaf6792efcfe5ba1c3
SHA512455cab9afbfdf009ca51cfe76ab30e731beb0a8edaca1b6e402a689b119a2b359f9dd19385978464bc5e8bfa0c5f0e7fb756a514418480da1679f7520332db60
-
Filesize
700KB
MD5d19784c74c0e4e6ce1f611dc25abc9e1
SHA13b134b57b21ce62e8fccc48a7f5211973e9866c3
SHA256e9cd8cf6e2edd8ac459ac0eb97713b05f193239bd5ba6dc8daded0a51d6890d3
SHA512691d8af586338fc6dc88bce1afc0876039f95f6b897f99d74b859d117bf9faaa85149946d61808ec88305e33cff72ba1fc1ae9e9bf053692ef2702a869538597
-
Filesize
700KB
MD5d19784c74c0e4e6ce1f611dc25abc9e1
SHA13b134b57b21ce62e8fccc48a7f5211973e9866c3
SHA256e9cd8cf6e2edd8ac459ac0eb97713b05f193239bd5ba6dc8daded0a51d6890d3
SHA512691d8af586338fc6dc88bce1afc0876039f95f6b897f99d74b859d117bf9faaa85149946d61808ec88305e33cff72ba1fc1ae9e9bf053692ef2702a869538597
-
Filesize
700KB
MD5d19784c74c0e4e6ce1f611dc25abc9e1
SHA13b134b57b21ce62e8fccc48a7f5211973e9866c3
SHA256e9cd8cf6e2edd8ac459ac0eb97713b05f193239bd5ba6dc8daded0a51d6890d3
SHA512691d8af586338fc6dc88bce1afc0876039f95f6b897f99d74b859d117bf9faaa85149946d61808ec88305e33cff72ba1fc1ae9e9bf053692ef2702a869538597
-
Filesize
700KB
MD5d19784c74c0e4e6ce1f611dc25abc9e1
SHA13b134b57b21ce62e8fccc48a7f5211973e9866c3
SHA256e9cd8cf6e2edd8ac459ac0eb97713b05f193239bd5ba6dc8daded0a51d6890d3
SHA512691d8af586338fc6dc88bce1afc0876039f95f6b897f99d74b859d117bf9faaa85149946d61808ec88305e33cff72ba1fc1ae9e9bf053692ef2702a869538597
-
Filesize
700KB
MD5d19784c74c0e4e6ce1f611dc25abc9e1
SHA13b134b57b21ce62e8fccc48a7f5211973e9866c3
SHA256e9cd8cf6e2edd8ac459ac0eb97713b05f193239bd5ba6dc8daded0a51d6890d3
SHA512691d8af586338fc6dc88bce1afc0876039f95f6b897f99d74b859d117bf9faaa85149946d61808ec88305e33cff72ba1fc1ae9e9bf053692ef2702a869538597
-
Filesize
700KB
MD5d19784c74c0e4e6ce1f611dc25abc9e1
SHA13b134b57b21ce62e8fccc48a7f5211973e9866c3
SHA256e9cd8cf6e2edd8ac459ac0eb97713b05f193239bd5ba6dc8daded0a51d6890d3
SHA512691d8af586338fc6dc88bce1afc0876039f95f6b897f99d74b859d117bf9faaa85149946d61808ec88305e33cff72ba1fc1ae9e9bf053692ef2702a869538597
-
Filesize
700KB
MD5d19784c74c0e4e6ce1f611dc25abc9e1
SHA13b134b57b21ce62e8fccc48a7f5211973e9866c3
SHA256e9cd8cf6e2edd8ac459ac0eb97713b05f193239bd5ba6dc8daded0a51d6890d3
SHA512691d8af586338fc6dc88bce1afc0876039f95f6b897f99d74b859d117bf9faaa85149946d61808ec88305e33cff72ba1fc1ae9e9bf053692ef2702a869538597