Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 19:17
Static task
static1
Behavioral task
behavioral1
Sample
c1ef40e8ab20ce2ae541a4b2a21de4ccedd94a212d049b39ea392959cecb0106_JC.vbs
Resource
win7-20230831-en
General
-
Target
c1ef40e8ab20ce2ae541a4b2a21de4ccedd94a212d049b39ea392959cecb0106_JC.vbs
-
Size
1012KB
-
MD5
76461b5f5b53971ee56faeb25cdcd9af
-
SHA1
cde5434ed5f46e711c9c2a30ce195e3c8cc7d590
-
SHA256
c1ef40e8ab20ce2ae541a4b2a21de4ccedd94a212d049b39ea392959cecb0106
-
SHA512
ac45584da5b4fdc326d642e10ed2328bc804291999ebe7a23bd6ae378389abb42676f6a90f863ae3fef17f783e347dfe74a2eef12ef6e24e002559fb43bdd10f
-
SSDEEP
6144:HoyDeQWPJ80bynilzMLwDaHhyvHr82Vqx+DBtBukOTWa1s/zGup+9n0Ixpfj3tla:jxTMW74c2BtUhm0ZL9O/jTLb/cXo/
Malware Config
Extracted
icedid
361893872
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 8 2616 rundll32.exe 10 2616 rundll32.exe -
Loads dropped DLL 5 IoCs
pid Process 2720 regsvr32.exe 2616 rundll32.exe 2616 rundll32.exe 2616 rundll32.exe 2616 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000_CLASSES\CLSID\{CD1A6948-1029-6F7B-A9B0-B5B689432798} rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000_CLASSES\CLSID\{CD1A6948-1029-6F7B-A9B0-B5B689432798}\ = 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 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2720 regsvr32.exe 2720 regsvr32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2720 1724 WScript.exe 28 PID 1724 wrote to memory of 2720 1724 WScript.exe 28 PID 1724 wrote to memory of 2720 1724 WScript.exe 28 PID 1724 wrote to memory of 2720 1724 WScript.exe 28 PID 1724 wrote to memory of 2720 1724 WScript.exe 28 PID 2720 wrote to memory of 2668 2720 regsvr32.exe 29 PID 2720 wrote to memory of 2668 2720 regsvr32.exe 29 PID 2720 wrote to memory of 2668 2720 regsvr32.exe 29 PID 2668 wrote to memory of 2616 2668 cmd.exe 31 PID 2668 wrote to memory of 2616 2668 cmd.exe 31 PID 2668 wrote to memory of 2616 2668 cmd.exe 31 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\c1ef40e8ab20ce2ae541a4b2a21de4ccedd94a212d049b39ea392959cecb0106_JC.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" C://windows/Temp/0247-1.dll2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C rundll32.exe C:\Users\Admin\AppData\Local\{60F389CA-756D-2FF5-1B44-E048BD22311E}\Alesmc1\Qajuacdu.dll,#13⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\{60F389CA-756D-2FF5-1B44-E048BD22311E}\Alesmc1\Qajuacdu.dll,#14⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Modifies registry class
PID:2616
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55065af3dae09e89b5123539714dd74ae
SHA13c28696695f186b22d72bc114cb62a54cbf275f9
SHA256d5b6f22b02b79756694a67d735da5e1399c41a9a42193c3be1fa0b116fe3b651
SHA5124c51348cae2ce8ec8e742fcdcef42e0dbce6c1f70d9c40e3f0fb9e1178eccd145437ffec9671a711588955b5fb0b17faf58e511469615976eae10f7435cc31e3
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
556KB
MD5002c64d47bf8c0878ac8ec2b4740f682
SHA1acc44c89420270083de7d67b025748a4b98071ed
SHA256b4f17e438636e166a94b2cd7c83e1c2b3cf1184122b6204521c1024e293ba8b1
SHA51280f44373c7dc7a08d94b65e1f830e6d922ae9b8fefca5beadaf6a1a8c33622219da404bed11daeb7de03f1b3432782a11cd019ff814b981b9e6885066666affd
-
Filesize
328KB
MD50f2b420baa4b27a7393f25ca264c177f
SHA15760aeeb262b180bf0cae07f51f4203441576a51
SHA2562e0ae1ad86ecde68ab4a312e083ef2076e12e321f62fb0eb802ff8a183800036
SHA5128d73400f23749e80fa055ac5e7dfc8926de5795e5b7c9a6d7c2b37da5d9e6e5225854f98cd0711d8fa225b4d41159b4db168b5d6b52a2e2352c4e3fc900205d0
-
Filesize
556KB
MD5002c64d47bf8c0878ac8ec2b4740f682
SHA1acc44c89420270083de7d67b025748a4b98071ed
SHA256b4f17e438636e166a94b2cd7c83e1c2b3cf1184122b6204521c1024e293ba8b1
SHA51280f44373c7dc7a08d94b65e1f830e6d922ae9b8fefca5beadaf6a1a8c33622219da404bed11daeb7de03f1b3432782a11cd019ff814b981b9e6885066666affd
-
Filesize
556KB
MD5002c64d47bf8c0878ac8ec2b4740f682
SHA1acc44c89420270083de7d67b025748a4b98071ed
SHA256b4f17e438636e166a94b2cd7c83e1c2b3cf1184122b6204521c1024e293ba8b1
SHA51280f44373c7dc7a08d94b65e1f830e6d922ae9b8fefca5beadaf6a1a8c33622219da404bed11daeb7de03f1b3432782a11cd019ff814b981b9e6885066666affd
-
Filesize
556KB
MD5002c64d47bf8c0878ac8ec2b4740f682
SHA1acc44c89420270083de7d67b025748a4b98071ed
SHA256b4f17e438636e166a94b2cd7c83e1c2b3cf1184122b6204521c1024e293ba8b1
SHA51280f44373c7dc7a08d94b65e1f830e6d922ae9b8fefca5beadaf6a1a8c33622219da404bed11daeb7de03f1b3432782a11cd019ff814b981b9e6885066666affd
-
Filesize
556KB
MD5002c64d47bf8c0878ac8ec2b4740f682
SHA1acc44c89420270083de7d67b025748a4b98071ed
SHA256b4f17e438636e166a94b2cd7c83e1c2b3cf1184122b6204521c1024e293ba8b1
SHA51280f44373c7dc7a08d94b65e1f830e6d922ae9b8fefca5beadaf6a1a8c33622219da404bed11daeb7de03f1b3432782a11cd019ff814b981b9e6885066666affd
-
Filesize
328KB
MD50f2b420baa4b27a7393f25ca264c177f
SHA15760aeeb262b180bf0cae07f51f4203441576a51
SHA2562e0ae1ad86ecde68ab4a312e083ef2076e12e321f62fb0eb802ff8a183800036
SHA5128d73400f23749e80fa055ac5e7dfc8926de5795e5b7c9a6d7c2b37da5d9e6e5225854f98cd0711d8fa225b4d41159b4db168b5d6b52a2e2352c4e3fc900205d0