Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 06:47
Static task
static1
Behavioral task
behavioral1
Sample
cbc704addac3560a5962afa8a84f9ff44b335c98384415fcb031aeb849e8ea79.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
cbc704addac3560a5962afa8a84f9ff44b335c98384415fcb031aeb849e8ea79.exe
Resource
win10v2004-20230915-en
General
-
Target
cbc704addac3560a5962afa8a84f9ff44b335c98384415fcb031aeb849e8ea79.exe
-
Size
1.0MB
-
MD5
2a6e11cfe25c5b88147a176f45c95c75
-
SHA1
2713b7c35daac11e8a3361dd055efe41e9e1ecfe
-
SHA256
cbc704addac3560a5962afa8a84f9ff44b335c98384415fcb031aeb849e8ea79
-
SHA512
9b0a1f886504b2d23eebc438198c732a428bf7182a71a4f1c9c15cda343deb129ec03d84c0f9e32e5c26e1cd4814ae5f8fc7e7e341cf5f8ee5461afd23444dca
-
SSDEEP
24576:ByAtcnpvkxwE99FkMcU9aD+Lfv49ch5yFniyad:0A0ZfE94U9r89eanU
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2716 x0534055.exe 2756 x0021083.exe 2412 x7905287.exe 2688 g7829731.exe -
Loads dropped DLL 13 IoCs
pid Process 2712 cbc704addac3560a5962afa8a84f9ff44b335c98384415fcb031aeb849e8ea79.exe 2716 x0534055.exe 2716 x0534055.exe 2756 x0021083.exe 2756 x0021083.exe 2412 x7905287.exe 2412 x7905287.exe 2412 x7905287.exe 2688 g7829731.exe 2372 WerFault.exe 2372 WerFault.exe 2372 WerFault.exe 2372 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x0534055.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x0021083.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x7905287.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cbc704addac3560a5962afa8a84f9ff44b335c98384415fcb031aeb849e8ea79.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2688 set thread context of 2568 2688 g7829731.exe 34 -
Program crash 2 IoCs
pid pid_target Process procid_target 2372 2688 WerFault.exe 32 2456 2568 WerFault.exe 34 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2716 2712 cbc704addac3560a5962afa8a84f9ff44b335c98384415fcb031aeb849e8ea79.exe 29 PID 2712 wrote to memory of 2716 2712 cbc704addac3560a5962afa8a84f9ff44b335c98384415fcb031aeb849e8ea79.exe 29 PID 2712 wrote to memory of 2716 2712 cbc704addac3560a5962afa8a84f9ff44b335c98384415fcb031aeb849e8ea79.exe 29 PID 2712 wrote to memory of 2716 2712 cbc704addac3560a5962afa8a84f9ff44b335c98384415fcb031aeb849e8ea79.exe 29 PID 2712 wrote to memory of 2716 2712 cbc704addac3560a5962afa8a84f9ff44b335c98384415fcb031aeb849e8ea79.exe 29 PID 2712 wrote to memory of 2716 2712 cbc704addac3560a5962afa8a84f9ff44b335c98384415fcb031aeb849e8ea79.exe 29 PID 2712 wrote to memory of 2716 2712 cbc704addac3560a5962afa8a84f9ff44b335c98384415fcb031aeb849e8ea79.exe 29 PID 2716 wrote to memory of 2756 2716 x0534055.exe 30 PID 2716 wrote to memory of 2756 2716 x0534055.exe 30 PID 2716 wrote to memory of 2756 2716 x0534055.exe 30 PID 2716 wrote to memory of 2756 2716 x0534055.exe 30 PID 2716 wrote to memory of 2756 2716 x0534055.exe 30 PID 2716 wrote to memory of 2756 2716 x0534055.exe 30 PID 2716 wrote to memory of 2756 2716 x0534055.exe 30 PID 2756 wrote to memory of 2412 2756 x0021083.exe 31 PID 2756 wrote to memory of 2412 2756 x0021083.exe 31 PID 2756 wrote to memory of 2412 2756 x0021083.exe 31 PID 2756 wrote to memory of 2412 2756 x0021083.exe 31 PID 2756 wrote to memory of 2412 2756 x0021083.exe 31 PID 2756 wrote to memory of 2412 2756 x0021083.exe 31 PID 2756 wrote to memory of 2412 2756 x0021083.exe 31 PID 2412 wrote to memory of 2688 2412 x7905287.exe 32 PID 2412 wrote to memory of 2688 2412 x7905287.exe 32 PID 2412 wrote to memory of 2688 2412 x7905287.exe 32 PID 2412 wrote to memory of 2688 2412 x7905287.exe 32 PID 2412 wrote to memory of 2688 2412 x7905287.exe 32 PID 2412 wrote to memory of 2688 2412 x7905287.exe 32 PID 2412 wrote to memory of 2688 2412 x7905287.exe 32 PID 2688 wrote to memory of 2568 2688 g7829731.exe 34 PID 2688 wrote to memory of 2568 2688 g7829731.exe 34 PID 2688 wrote to memory of 2568 2688 g7829731.exe 34 PID 2688 wrote to memory of 2568 2688 g7829731.exe 34 PID 2688 wrote to memory of 2568 2688 g7829731.exe 34 PID 2688 wrote to memory of 2568 2688 g7829731.exe 34 PID 2688 wrote to memory of 2568 2688 g7829731.exe 34 PID 2688 wrote to memory of 2568 2688 g7829731.exe 34 PID 2688 wrote to memory of 2568 2688 g7829731.exe 34 PID 2688 wrote to memory of 2568 2688 g7829731.exe 34 PID 2688 wrote to memory of 2568 2688 g7829731.exe 34 PID 2688 wrote to memory of 2568 2688 g7829731.exe 34 PID 2688 wrote to memory of 2568 2688 g7829731.exe 34 PID 2688 wrote to memory of 2568 2688 g7829731.exe 34 PID 2568 wrote to memory of 2456 2568 AppLaunch.exe 36 PID 2568 wrote to memory of 2456 2568 AppLaunch.exe 36 PID 2568 wrote to memory of 2456 2568 AppLaunch.exe 36 PID 2568 wrote to memory of 2456 2568 AppLaunch.exe 36 PID 2568 wrote to memory of 2456 2568 AppLaunch.exe 36 PID 2568 wrote to memory of 2456 2568 AppLaunch.exe 36 PID 2568 wrote to memory of 2456 2568 AppLaunch.exe 36 PID 2688 wrote to memory of 2372 2688 g7829731.exe 35 PID 2688 wrote to memory of 2372 2688 g7829731.exe 35 PID 2688 wrote to memory of 2372 2688 g7829731.exe 35 PID 2688 wrote to memory of 2372 2688 g7829731.exe 35 PID 2688 wrote to memory of 2372 2688 g7829731.exe 35 PID 2688 wrote to memory of 2372 2688 g7829731.exe 35 PID 2688 wrote to memory of 2372 2688 g7829731.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbc704addac3560a5962afa8a84f9ff44b335c98384415fcb031aeb849e8ea79.exe"C:\Users\Admin\AppData\Local\Temp\cbc704addac3560a5962afa8a84f9ff44b335c98384415fcb031aeb849e8ea79.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0534055.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0534055.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0021083.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0021083.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7905287.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7905287.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7829731.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7829731.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2568 -s 2687⤵
- Program crash
PID:2456
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 2686⤵
- Loads dropped DLL
- Program crash
PID:2372
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
931KB
MD57416bf38f70fffb516ae7c29b8cad15f
SHA1ef9a4a6efac05487b4c71dfc841c49c25b772900
SHA256820bdb3f164f2fe6d503472821e9046574012966880e20e4fb6d7ac3d65f90c8
SHA512636743b9b5681c15f0e40152982d0e558fc641e440c8b839a1d250e3f8aa0447817198508cd27a62ca0b7932c3f38e6fcb14b30c431fd6908c9634cbed8b90e2
-
Filesize
931KB
MD57416bf38f70fffb516ae7c29b8cad15f
SHA1ef9a4a6efac05487b4c71dfc841c49c25b772900
SHA256820bdb3f164f2fe6d503472821e9046574012966880e20e4fb6d7ac3d65f90c8
SHA512636743b9b5681c15f0e40152982d0e558fc641e440c8b839a1d250e3f8aa0447817198508cd27a62ca0b7932c3f38e6fcb14b30c431fd6908c9634cbed8b90e2
-
Filesize
628KB
MD58eca8e10935075576cc60a3ce948f54c
SHA16a0ba6baa4c38f10b0bbca5ddaef312368220a87
SHA2561c7747510cb10283a3d43f7715791f1f5cf84fb548363589f7df7208980655bc
SHA5127c1815add40af48726f1ce055d5e2cc74781dde3b64edfb76298fa4a454a07182c301577e9bac0d9bece29d3b341635d914d14a79ebd5c8fa107aa809e27f0a5
-
Filesize
628KB
MD58eca8e10935075576cc60a3ce948f54c
SHA16a0ba6baa4c38f10b0bbca5ddaef312368220a87
SHA2561c7747510cb10283a3d43f7715791f1f5cf84fb548363589f7df7208980655bc
SHA5127c1815add40af48726f1ce055d5e2cc74781dde3b64edfb76298fa4a454a07182c301577e9bac0d9bece29d3b341635d914d14a79ebd5c8fa107aa809e27f0a5
-
Filesize
442KB
MD536d56781c7e1d81807ceed1fe6464f93
SHA141f44bf34ee84d822432268b9893f0070337f575
SHA256024638437c48977df01f314a352b22948cce0bfc4a23550bd68d2f9321796909
SHA5125c6022cb7dce9259a7f2a97e4628bb904ec79ae1e7300b677a97e546e9e3be5a8895e5d3f1340b29f56f6c695eb6b666db26d990595816abfa27cdf988525827
-
Filesize
442KB
MD536d56781c7e1d81807ceed1fe6464f93
SHA141f44bf34ee84d822432268b9893f0070337f575
SHA256024638437c48977df01f314a352b22948cce0bfc4a23550bd68d2f9321796909
SHA5125c6022cb7dce9259a7f2a97e4628bb904ec79ae1e7300b677a97e546e9e3be5a8895e5d3f1340b29f56f6c695eb6b666db26d990595816abfa27cdf988525827
-
Filesize
700KB
MD5bb0e8cfe0fb46c98520beb19b2638bc6
SHA1d934149f484871137e834f1c37053d21ffad4940
SHA25617310375c40bd781a6205d4858fcb690fbba4eb6ad18a410d9dac0cd108c6fb0
SHA512cd1fba0e56109277d44085109ae0158b4ea010441e565f5004290fbcd0abecccc09d6a44df29de4945fae31c6c517e80ba657c00a26ee9888c692522c4a42e12
-
Filesize
700KB
MD5bb0e8cfe0fb46c98520beb19b2638bc6
SHA1d934149f484871137e834f1c37053d21ffad4940
SHA25617310375c40bd781a6205d4858fcb690fbba4eb6ad18a410d9dac0cd108c6fb0
SHA512cd1fba0e56109277d44085109ae0158b4ea010441e565f5004290fbcd0abecccc09d6a44df29de4945fae31c6c517e80ba657c00a26ee9888c692522c4a42e12
-
Filesize
700KB
MD5bb0e8cfe0fb46c98520beb19b2638bc6
SHA1d934149f484871137e834f1c37053d21ffad4940
SHA25617310375c40bd781a6205d4858fcb690fbba4eb6ad18a410d9dac0cd108c6fb0
SHA512cd1fba0e56109277d44085109ae0158b4ea010441e565f5004290fbcd0abecccc09d6a44df29de4945fae31c6c517e80ba657c00a26ee9888c692522c4a42e12
-
Filesize
931KB
MD57416bf38f70fffb516ae7c29b8cad15f
SHA1ef9a4a6efac05487b4c71dfc841c49c25b772900
SHA256820bdb3f164f2fe6d503472821e9046574012966880e20e4fb6d7ac3d65f90c8
SHA512636743b9b5681c15f0e40152982d0e558fc641e440c8b839a1d250e3f8aa0447817198508cd27a62ca0b7932c3f38e6fcb14b30c431fd6908c9634cbed8b90e2
-
Filesize
931KB
MD57416bf38f70fffb516ae7c29b8cad15f
SHA1ef9a4a6efac05487b4c71dfc841c49c25b772900
SHA256820bdb3f164f2fe6d503472821e9046574012966880e20e4fb6d7ac3d65f90c8
SHA512636743b9b5681c15f0e40152982d0e558fc641e440c8b839a1d250e3f8aa0447817198508cd27a62ca0b7932c3f38e6fcb14b30c431fd6908c9634cbed8b90e2
-
Filesize
628KB
MD58eca8e10935075576cc60a3ce948f54c
SHA16a0ba6baa4c38f10b0bbca5ddaef312368220a87
SHA2561c7747510cb10283a3d43f7715791f1f5cf84fb548363589f7df7208980655bc
SHA5127c1815add40af48726f1ce055d5e2cc74781dde3b64edfb76298fa4a454a07182c301577e9bac0d9bece29d3b341635d914d14a79ebd5c8fa107aa809e27f0a5
-
Filesize
628KB
MD58eca8e10935075576cc60a3ce948f54c
SHA16a0ba6baa4c38f10b0bbca5ddaef312368220a87
SHA2561c7747510cb10283a3d43f7715791f1f5cf84fb548363589f7df7208980655bc
SHA5127c1815add40af48726f1ce055d5e2cc74781dde3b64edfb76298fa4a454a07182c301577e9bac0d9bece29d3b341635d914d14a79ebd5c8fa107aa809e27f0a5
-
Filesize
442KB
MD536d56781c7e1d81807ceed1fe6464f93
SHA141f44bf34ee84d822432268b9893f0070337f575
SHA256024638437c48977df01f314a352b22948cce0bfc4a23550bd68d2f9321796909
SHA5125c6022cb7dce9259a7f2a97e4628bb904ec79ae1e7300b677a97e546e9e3be5a8895e5d3f1340b29f56f6c695eb6b666db26d990595816abfa27cdf988525827
-
Filesize
442KB
MD536d56781c7e1d81807ceed1fe6464f93
SHA141f44bf34ee84d822432268b9893f0070337f575
SHA256024638437c48977df01f314a352b22948cce0bfc4a23550bd68d2f9321796909
SHA5125c6022cb7dce9259a7f2a97e4628bb904ec79ae1e7300b677a97e546e9e3be5a8895e5d3f1340b29f56f6c695eb6b666db26d990595816abfa27cdf988525827
-
Filesize
700KB
MD5bb0e8cfe0fb46c98520beb19b2638bc6
SHA1d934149f484871137e834f1c37053d21ffad4940
SHA25617310375c40bd781a6205d4858fcb690fbba4eb6ad18a410d9dac0cd108c6fb0
SHA512cd1fba0e56109277d44085109ae0158b4ea010441e565f5004290fbcd0abecccc09d6a44df29de4945fae31c6c517e80ba657c00a26ee9888c692522c4a42e12
-
Filesize
700KB
MD5bb0e8cfe0fb46c98520beb19b2638bc6
SHA1d934149f484871137e834f1c37053d21ffad4940
SHA25617310375c40bd781a6205d4858fcb690fbba4eb6ad18a410d9dac0cd108c6fb0
SHA512cd1fba0e56109277d44085109ae0158b4ea010441e565f5004290fbcd0abecccc09d6a44df29de4945fae31c6c517e80ba657c00a26ee9888c692522c4a42e12
-
Filesize
700KB
MD5bb0e8cfe0fb46c98520beb19b2638bc6
SHA1d934149f484871137e834f1c37053d21ffad4940
SHA25617310375c40bd781a6205d4858fcb690fbba4eb6ad18a410d9dac0cd108c6fb0
SHA512cd1fba0e56109277d44085109ae0158b4ea010441e565f5004290fbcd0abecccc09d6a44df29de4945fae31c6c517e80ba657c00a26ee9888c692522c4a42e12
-
Filesize
700KB
MD5bb0e8cfe0fb46c98520beb19b2638bc6
SHA1d934149f484871137e834f1c37053d21ffad4940
SHA25617310375c40bd781a6205d4858fcb690fbba4eb6ad18a410d9dac0cd108c6fb0
SHA512cd1fba0e56109277d44085109ae0158b4ea010441e565f5004290fbcd0abecccc09d6a44df29de4945fae31c6c517e80ba657c00a26ee9888c692522c4a42e12
-
Filesize
700KB
MD5bb0e8cfe0fb46c98520beb19b2638bc6
SHA1d934149f484871137e834f1c37053d21ffad4940
SHA25617310375c40bd781a6205d4858fcb690fbba4eb6ad18a410d9dac0cd108c6fb0
SHA512cd1fba0e56109277d44085109ae0158b4ea010441e565f5004290fbcd0abecccc09d6a44df29de4945fae31c6c517e80ba657c00a26ee9888c692522c4a42e12
-
Filesize
700KB
MD5bb0e8cfe0fb46c98520beb19b2638bc6
SHA1d934149f484871137e834f1c37053d21ffad4940
SHA25617310375c40bd781a6205d4858fcb690fbba4eb6ad18a410d9dac0cd108c6fb0
SHA512cd1fba0e56109277d44085109ae0158b4ea010441e565f5004290fbcd0abecccc09d6a44df29de4945fae31c6c517e80ba657c00a26ee9888c692522c4a42e12
-
Filesize
700KB
MD5bb0e8cfe0fb46c98520beb19b2638bc6
SHA1d934149f484871137e834f1c37053d21ffad4940
SHA25617310375c40bd781a6205d4858fcb690fbba4eb6ad18a410d9dac0cd108c6fb0
SHA512cd1fba0e56109277d44085109ae0158b4ea010441e565f5004290fbcd0abecccc09d6a44df29de4945fae31c6c517e80ba657c00a26ee9888c692522c4a42e12