Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 13:51
Static task
static1
Behavioral task
behavioral1
Sample
b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe
Resource
win10v2004-20230915-en
General
-
Target
b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe
-
Size
80KB
-
MD5
af751f552eb2bdc941fa1c9c6da9b12f
-
SHA1
241823daabcd3be14acd1e5989b8c51d0dee418c
-
SHA256
b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c
-
SHA512
ae373083385af78988973bb8deb18e0a4e60176d54797c989f293f837e1ff2ed03810079e34f37cec6d81b46964f6f894ba2167c419173713f747b7be5e88cf8
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOr0p9:GhfxHNIreQm+Hi40p9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3008 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 2108 b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe 2108 b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\¢«.exe b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe File created C:\Windows\SysWOW64\¢«.exe b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe File created C:\Windows\SysWOW64\notepad¢¬.exe b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe File created C:\Windows\system\rundll32.exe b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\MSipv b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1697438288" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1697438288" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2108 b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe 2108 b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe 2108 b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe 2108 b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe 2108 b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe 2108 b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe 2108 b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe 2108 b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe 2108 b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe 2108 b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe 2108 b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe 2108 b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe 2108 b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe 2108 b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3008 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2108 b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe 3008 rundll32.exe 3008 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2108 wrote to memory of 3008 2108 b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe 28 PID 2108 wrote to memory of 3008 2108 b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe 28 PID 2108 wrote to memory of 3008 2108 b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe 28 PID 2108 wrote to memory of 3008 2108 b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe 28 PID 2108 wrote to memory of 3008 2108 b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe 28 PID 2108 wrote to memory of 3008 2108 b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe 28 PID 2108 wrote to memory of 3008 2108 b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe"C:\Users\Admin\AppData\Local\Temp\b7da9b80d0cbe72dca79b2e5eec26d8c7329fcf47394bffb6d13fda39c95ff8c.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3008
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5dd97d7b198d35227d592330cf360139c
SHA1be3cbf53bfcc54de0d2f78e85709460c5f05191d
SHA256639e1a36f6ba632f1538d820eb389b5793a1411288f39fe90ebe17c1d85cdf72
SHA512d4f09d77c5b77fc7a79491d794047dcfb90411d0004e212a3640ca6e311f9e79f8f218b8a25b158192e0ace0e164231d4261d0275186d318044901a18994e67a
-
Filesize
75KB
MD5b5ff3f01e95b5a070ca93f57c1278cc1
SHA1b2f0a5a810d185324cc7a5ef193d0143c0ed8fe7
SHA2566b5949f1cf2abafa1a332a37115dc34ee5c5c95d831cd8cbd739a22c8fe29240
SHA512153dd340b2ef8e1c4cface584fdbae8bcc041784e2836ee56e8bd1d9b868df541c20c668150878f4c91a38179b176e17bb0a0174fbba410ac8ac2cbd9223687b
-
Filesize
75KB
MD5b5ff3f01e95b5a070ca93f57c1278cc1
SHA1b2f0a5a810d185324cc7a5ef193d0143c0ed8fe7
SHA2566b5949f1cf2abafa1a332a37115dc34ee5c5c95d831cd8cbd739a22c8fe29240
SHA512153dd340b2ef8e1c4cface584fdbae8bcc041784e2836ee56e8bd1d9b868df541c20c668150878f4c91a38179b176e17bb0a0174fbba410ac8ac2cbd9223687b
-
Filesize
75KB
MD5b5ff3f01e95b5a070ca93f57c1278cc1
SHA1b2f0a5a810d185324cc7a5ef193d0143c0ed8fe7
SHA2566b5949f1cf2abafa1a332a37115dc34ee5c5c95d831cd8cbd739a22c8fe29240
SHA512153dd340b2ef8e1c4cface584fdbae8bcc041784e2836ee56e8bd1d9b868df541c20c668150878f4c91a38179b176e17bb0a0174fbba410ac8ac2cbd9223687b
-
Filesize
75KB
MD5b5ff3f01e95b5a070ca93f57c1278cc1
SHA1b2f0a5a810d185324cc7a5ef193d0143c0ed8fe7
SHA2566b5949f1cf2abafa1a332a37115dc34ee5c5c95d831cd8cbd739a22c8fe29240
SHA512153dd340b2ef8e1c4cface584fdbae8bcc041784e2836ee56e8bd1d9b868df541c20c668150878f4c91a38179b176e17bb0a0174fbba410ac8ac2cbd9223687b