Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 06:49
Static task
static1
Behavioral task
behavioral1
Sample
4894998a92beaa8ca1a10cac3d3b41a4188056bfff1a5d0f8e431fbdd0bd9e4d.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
4894998a92beaa8ca1a10cac3d3b41a4188056bfff1a5d0f8e431fbdd0bd9e4d.exe
Resource
win10v2004-20230915-en
General
-
Target
4894998a92beaa8ca1a10cac3d3b41a4188056bfff1a5d0f8e431fbdd0bd9e4d.exe
-
Size
1.0MB
-
MD5
55ef1e5fe8a3967f3e63185b55755b6d
-
SHA1
1371600fa4621f25003d0b4bc57519849d6dea2f
-
SHA256
4894998a92beaa8ca1a10cac3d3b41a4188056bfff1a5d0f8e431fbdd0bd9e4d
-
SHA512
fb34a2f44332d6cac21e6c905bb13e6372fcced8f382f0ddd52cf89a720b837a630e9190bb1df0b35b2a64f28ef805acd125ad1e369f69f378df22796a13350f
-
SSDEEP
24576:yyv3i+VoE7b6Zo61kUvOu6U2SzX7BzKBtntR6ms4u:Z/Db6v2u6UDzX7BzKBd6mv
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2240 x1898414.exe 3032 x0956643.exe 2684 x7021876.exe 2648 g9535831.exe -
Loads dropped DLL 13 IoCs
pid Process 2576 4894998a92beaa8ca1a10cac3d3b41a4188056bfff1a5d0f8e431fbdd0bd9e4d.exe 2240 x1898414.exe 2240 x1898414.exe 3032 x0956643.exe 3032 x0956643.exe 2684 x7021876.exe 2684 x7021876.exe 2684 x7021876.exe 2648 g9535831.exe 2580 WerFault.exe 2580 WerFault.exe 2580 WerFault.exe 2580 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x7021876.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4894998a92beaa8ca1a10cac3d3b41a4188056bfff1a5d0f8e431fbdd0bd9e4d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x1898414.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x0956643.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2648 set thread context of 1840 2648 g9535831.exe 33 -
Program crash 2 IoCs
pid pid_target Process procid_target 2580 2648 WerFault.exe 32 848 1840 WerFault.exe 33 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2576 wrote to memory of 2240 2576 4894998a92beaa8ca1a10cac3d3b41a4188056bfff1a5d0f8e431fbdd0bd9e4d.exe 28 PID 2576 wrote to memory of 2240 2576 4894998a92beaa8ca1a10cac3d3b41a4188056bfff1a5d0f8e431fbdd0bd9e4d.exe 28 PID 2576 wrote to memory of 2240 2576 4894998a92beaa8ca1a10cac3d3b41a4188056bfff1a5d0f8e431fbdd0bd9e4d.exe 28 PID 2576 wrote to memory of 2240 2576 4894998a92beaa8ca1a10cac3d3b41a4188056bfff1a5d0f8e431fbdd0bd9e4d.exe 28 PID 2576 wrote to memory of 2240 2576 4894998a92beaa8ca1a10cac3d3b41a4188056bfff1a5d0f8e431fbdd0bd9e4d.exe 28 PID 2576 wrote to memory of 2240 2576 4894998a92beaa8ca1a10cac3d3b41a4188056bfff1a5d0f8e431fbdd0bd9e4d.exe 28 PID 2576 wrote to memory of 2240 2576 4894998a92beaa8ca1a10cac3d3b41a4188056bfff1a5d0f8e431fbdd0bd9e4d.exe 28 PID 2240 wrote to memory of 3032 2240 x1898414.exe 29 PID 2240 wrote to memory of 3032 2240 x1898414.exe 29 PID 2240 wrote to memory of 3032 2240 x1898414.exe 29 PID 2240 wrote to memory of 3032 2240 x1898414.exe 29 PID 2240 wrote to memory of 3032 2240 x1898414.exe 29 PID 2240 wrote to memory of 3032 2240 x1898414.exe 29 PID 2240 wrote to memory of 3032 2240 x1898414.exe 29 PID 3032 wrote to memory of 2684 3032 x0956643.exe 30 PID 3032 wrote to memory of 2684 3032 x0956643.exe 30 PID 3032 wrote to memory of 2684 3032 x0956643.exe 30 PID 3032 wrote to memory of 2684 3032 x0956643.exe 30 PID 3032 wrote to memory of 2684 3032 x0956643.exe 30 PID 3032 wrote to memory of 2684 3032 x0956643.exe 30 PID 3032 wrote to memory of 2684 3032 x0956643.exe 30 PID 2684 wrote to memory of 2648 2684 x7021876.exe 32 PID 2684 wrote to memory of 2648 2684 x7021876.exe 32 PID 2684 wrote to memory of 2648 2684 x7021876.exe 32 PID 2684 wrote to memory of 2648 2684 x7021876.exe 32 PID 2684 wrote to memory of 2648 2684 x7021876.exe 32 PID 2684 wrote to memory of 2648 2684 x7021876.exe 32 PID 2684 wrote to memory of 2648 2684 x7021876.exe 32 PID 2648 wrote to memory of 1840 2648 g9535831.exe 33 PID 2648 wrote to memory of 1840 2648 g9535831.exe 33 PID 2648 wrote to memory of 1840 2648 g9535831.exe 33 PID 2648 wrote to memory of 1840 2648 g9535831.exe 33 PID 2648 wrote to memory of 1840 2648 g9535831.exe 33 PID 2648 wrote to memory of 1840 2648 g9535831.exe 33 PID 2648 wrote to memory of 1840 2648 g9535831.exe 33 PID 2648 wrote to memory of 1840 2648 g9535831.exe 33 PID 2648 wrote to memory of 1840 2648 g9535831.exe 33 PID 2648 wrote to memory of 1840 2648 g9535831.exe 33 PID 2648 wrote to memory of 1840 2648 g9535831.exe 33 PID 2648 wrote to memory of 1840 2648 g9535831.exe 33 PID 2648 wrote to memory of 1840 2648 g9535831.exe 33 PID 2648 wrote to memory of 1840 2648 g9535831.exe 33 PID 1840 wrote to memory of 848 1840 AppLaunch.exe 35 PID 1840 wrote to memory of 848 1840 AppLaunch.exe 35 PID 1840 wrote to memory of 848 1840 AppLaunch.exe 35 PID 1840 wrote to memory of 848 1840 AppLaunch.exe 35 PID 1840 wrote to memory of 848 1840 AppLaunch.exe 35 PID 1840 wrote to memory of 848 1840 AppLaunch.exe 35 PID 1840 wrote to memory of 848 1840 AppLaunch.exe 35 PID 2648 wrote to memory of 2580 2648 g9535831.exe 34 PID 2648 wrote to memory of 2580 2648 g9535831.exe 34 PID 2648 wrote to memory of 2580 2648 g9535831.exe 34 PID 2648 wrote to memory of 2580 2648 g9535831.exe 34 PID 2648 wrote to memory of 2580 2648 g9535831.exe 34 PID 2648 wrote to memory of 2580 2648 g9535831.exe 34 PID 2648 wrote to memory of 2580 2648 g9535831.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\4894998a92beaa8ca1a10cac3d3b41a4188056bfff1a5d0f8e431fbdd0bd9e4d.exe"C:\Users\Admin\AppData\Local\Temp\4894998a92beaa8ca1a10cac3d3b41a4188056bfff1a5d0f8e431fbdd0bd9e4d.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1898414.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1898414.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0956643.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0956643.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7021876.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7021876.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9535831.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9535831.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1840 -s 2687⤵
- Program crash
PID:848
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 2686⤵
- Loads dropped DLL
- Program crash
PID:2580
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
933KB
MD579016b2a53b9ae1215a177ad6061f802
SHA188cb9717b3e1f1c4b746ff8489ba701bc05882ac
SHA25655b1dda23bf3b7e334383e2d48b7ad648d0f4288d8fdb9c0c2080ec467ec6b0b
SHA512de28bfa568c6f49aa06a781c0a8d0785097330f300d752fcd7d6a1f6a639a1c5a4b7aa69bcded8120a0e289a8d38bcb60802aa94f5bf88a32f434176f46cf8cf
-
Filesize
933KB
MD579016b2a53b9ae1215a177ad6061f802
SHA188cb9717b3e1f1c4b746ff8489ba701bc05882ac
SHA25655b1dda23bf3b7e334383e2d48b7ad648d0f4288d8fdb9c0c2080ec467ec6b0b
SHA512de28bfa568c6f49aa06a781c0a8d0785097330f300d752fcd7d6a1f6a639a1c5a4b7aa69bcded8120a0e289a8d38bcb60802aa94f5bf88a32f434176f46cf8cf
-
Filesize
629KB
MD5565395f07f19df260b379e8e065cc91a
SHA1aec272568efa37036177ded8da75204bd5054a37
SHA2568c2026711969d63484d5e4e8dd461c7cf51db05f8db875cf78055f5a5a14f774
SHA51245510b3a76e741d96f4e5d859acaccdb5aa2fe4cfa1201710e172de777de3b912a1c9e38dc2b874bc3b565b957c5308a96ad464af5db302e634a5aa0adf0000b
-
Filesize
629KB
MD5565395f07f19df260b379e8e065cc91a
SHA1aec272568efa37036177ded8da75204bd5054a37
SHA2568c2026711969d63484d5e4e8dd461c7cf51db05f8db875cf78055f5a5a14f774
SHA51245510b3a76e741d96f4e5d859acaccdb5aa2fe4cfa1201710e172de777de3b912a1c9e38dc2b874bc3b565b957c5308a96ad464af5db302e634a5aa0adf0000b
-
Filesize
443KB
MD5a07eb72f1c9c79c42cfe6ea8ea1bc9b0
SHA13ba1abc92cdf56e9018547666a526fab3db68ad2
SHA2560a7380d6cb7ab6c4dcd876572aba662d80f95695abd7c7fcae9b87269cc38bbc
SHA512d36d3825b40fa80a9d79c2e36a52998805299c98b2194615f232e3506606623039a9ea84be29ec561850eeee3354d392c361a19afa7a51afffe8baf1a7120942
-
Filesize
443KB
MD5a07eb72f1c9c79c42cfe6ea8ea1bc9b0
SHA13ba1abc92cdf56e9018547666a526fab3db68ad2
SHA2560a7380d6cb7ab6c4dcd876572aba662d80f95695abd7c7fcae9b87269cc38bbc
SHA512d36d3825b40fa80a9d79c2e36a52998805299c98b2194615f232e3506606623039a9ea84be29ec561850eeee3354d392c361a19afa7a51afffe8baf1a7120942
-
Filesize
700KB
MD59b5f3d7a7907546a2bc40984cf3903bb
SHA1b17d8252ee06f619d1065cfee9de27a27b722cd9
SHA2565a5227029b36e1f9e185075727de04e8b49bdfb0b6d5164f87976eb990cafb2a
SHA512c9c983d542ff639675816fabd30dd31f797ee7f52e40fbdc0e375d52dec5a6aadab8042e13bd706febd3c3d1193e76db2d7ef57f78665bb22d6b05c09b0c5bb9
-
Filesize
700KB
MD59b5f3d7a7907546a2bc40984cf3903bb
SHA1b17d8252ee06f619d1065cfee9de27a27b722cd9
SHA2565a5227029b36e1f9e185075727de04e8b49bdfb0b6d5164f87976eb990cafb2a
SHA512c9c983d542ff639675816fabd30dd31f797ee7f52e40fbdc0e375d52dec5a6aadab8042e13bd706febd3c3d1193e76db2d7ef57f78665bb22d6b05c09b0c5bb9
-
Filesize
700KB
MD59b5f3d7a7907546a2bc40984cf3903bb
SHA1b17d8252ee06f619d1065cfee9de27a27b722cd9
SHA2565a5227029b36e1f9e185075727de04e8b49bdfb0b6d5164f87976eb990cafb2a
SHA512c9c983d542ff639675816fabd30dd31f797ee7f52e40fbdc0e375d52dec5a6aadab8042e13bd706febd3c3d1193e76db2d7ef57f78665bb22d6b05c09b0c5bb9
-
Filesize
933KB
MD579016b2a53b9ae1215a177ad6061f802
SHA188cb9717b3e1f1c4b746ff8489ba701bc05882ac
SHA25655b1dda23bf3b7e334383e2d48b7ad648d0f4288d8fdb9c0c2080ec467ec6b0b
SHA512de28bfa568c6f49aa06a781c0a8d0785097330f300d752fcd7d6a1f6a639a1c5a4b7aa69bcded8120a0e289a8d38bcb60802aa94f5bf88a32f434176f46cf8cf
-
Filesize
933KB
MD579016b2a53b9ae1215a177ad6061f802
SHA188cb9717b3e1f1c4b746ff8489ba701bc05882ac
SHA25655b1dda23bf3b7e334383e2d48b7ad648d0f4288d8fdb9c0c2080ec467ec6b0b
SHA512de28bfa568c6f49aa06a781c0a8d0785097330f300d752fcd7d6a1f6a639a1c5a4b7aa69bcded8120a0e289a8d38bcb60802aa94f5bf88a32f434176f46cf8cf
-
Filesize
629KB
MD5565395f07f19df260b379e8e065cc91a
SHA1aec272568efa37036177ded8da75204bd5054a37
SHA2568c2026711969d63484d5e4e8dd461c7cf51db05f8db875cf78055f5a5a14f774
SHA51245510b3a76e741d96f4e5d859acaccdb5aa2fe4cfa1201710e172de777de3b912a1c9e38dc2b874bc3b565b957c5308a96ad464af5db302e634a5aa0adf0000b
-
Filesize
629KB
MD5565395f07f19df260b379e8e065cc91a
SHA1aec272568efa37036177ded8da75204bd5054a37
SHA2568c2026711969d63484d5e4e8dd461c7cf51db05f8db875cf78055f5a5a14f774
SHA51245510b3a76e741d96f4e5d859acaccdb5aa2fe4cfa1201710e172de777de3b912a1c9e38dc2b874bc3b565b957c5308a96ad464af5db302e634a5aa0adf0000b
-
Filesize
443KB
MD5a07eb72f1c9c79c42cfe6ea8ea1bc9b0
SHA13ba1abc92cdf56e9018547666a526fab3db68ad2
SHA2560a7380d6cb7ab6c4dcd876572aba662d80f95695abd7c7fcae9b87269cc38bbc
SHA512d36d3825b40fa80a9d79c2e36a52998805299c98b2194615f232e3506606623039a9ea84be29ec561850eeee3354d392c361a19afa7a51afffe8baf1a7120942
-
Filesize
443KB
MD5a07eb72f1c9c79c42cfe6ea8ea1bc9b0
SHA13ba1abc92cdf56e9018547666a526fab3db68ad2
SHA2560a7380d6cb7ab6c4dcd876572aba662d80f95695abd7c7fcae9b87269cc38bbc
SHA512d36d3825b40fa80a9d79c2e36a52998805299c98b2194615f232e3506606623039a9ea84be29ec561850eeee3354d392c361a19afa7a51afffe8baf1a7120942
-
Filesize
700KB
MD59b5f3d7a7907546a2bc40984cf3903bb
SHA1b17d8252ee06f619d1065cfee9de27a27b722cd9
SHA2565a5227029b36e1f9e185075727de04e8b49bdfb0b6d5164f87976eb990cafb2a
SHA512c9c983d542ff639675816fabd30dd31f797ee7f52e40fbdc0e375d52dec5a6aadab8042e13bd706febd3c3d1193e76db2d7ef57f78665bb22d6b05c09b0c5bb9
-
Filesize
700KB
MD59b5f3d7a7907546a2bc40984cf3903bb
SHA1b17d8252ee06f619d1065cfee9de27a27b722cd9
SHA2565a5227029b36e1f9e185075727de04e8b49bdfb0b6d5164f87976eb990cafb2a
SHA512c9c983d542ff639675816fabd30dd31f797ee7f52e40fbdc0e375d52dec5a6aadab8042e13bd706febd3c3d1193e76db2d7ef57f78665bb22d6b05c09b0c5bb9
-
Filesize
700KB
MD59b5f3d7a7907546a2bc40984cf3903bb
SHA1b17d8252ee06f619d1065cfee9de27a27b722cd9
SHA2565a5227029b36e1f9e185075727de04e8b49bdfb0b6d5164f87976eb990cafb2a
SHA512c9c983d542ff639675816fabd30dd31f797ee7f52e40fbdc0e375d52dec5a6aadab8042e13bd706febd3c3d1193e76db2d7ef57f78665bb22d6b05c09b0c5bb9
-
Filesize
700KB
MD59b5f3d7a7907546a2bc40984cf3903bb
SHA1b17d8252ee06f619d1065cfee9de27a27b722cd9
SHA2565a5227029b36e1f9e185075727de04e8b49bdfb0b6d5164f87976eb990cafb2a
SHA512c9c983d542ff639675816fabd30dd31f797ee7f52e40fbdc0e375d52dec5a6aadab8042e13bd706febd3c3d1193e76db2d7ef57f78665bb22d6b05c09b0c5bb9
-
Filesize
700KB
MD59b5f3d7a7907546a2bc40984cf3903bb
SHA1b17d8252ee06f619d1065cfee9de27a27b722cd9
SHA2565a5227029b36e1f9e185075727de04e8b49bdfb0b6d5164f87976eb990cafb2a
SHA512c9c983d542ff639675816fabd30dd31f797ee7f52e40fbdc0e375d52dec5a6aadab8042e13bd706febd3c3d1193e76db2d7ef57f78665bb22d6b05c09b0c5bb9
-
Filesize
700KB
MD59b5f3d7a7907546a2bc40984cf3903bb
SHA1b17d8252ee06f619d1065cfee9de27a27b722cd9
SHA2565a5227029b36e1f9e185075727de04e8b49bdfb0b6d5164f87976eb990cafb2a
SHA512c9c983d542ff639675816fabd30dd31f797ee7f52e40fbdc0e375d52dec5a6aadab8042e13bd706febd3c3d1193e76db2d7ef57f78665bb22d6b05c09b0c5bb9
-
Filesize
700KB
MD59b5f3d7a7907546a2bc40984cf3903bb
SHA1b17d8252ee06f619d1065cfee9de27a27b722cd9
SHA2565a5227029b36e1f9e185075727de04e8b49bdfb0b6d5164f87976eb990cafb2a
SHA512c9c983d542ff639675816fabd30dd31f797ee7f52e40fbdc0e375d52dec5a6aadab8042e13bd706febd3c3d1193e76db2d7ef57f78665bb22d6b05c09b0c5bb9