Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
169s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 13:06
Static task
static1
Behavioral task
behavioral1
Sample
30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe
Resource
win10v2004-20230915-en
General
-
Target
30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe
-
Size
183KB
-
MD5
b5d1e2f9fa12965377148e126caea6d6
-
SHA1
7cb800b5f095842c9844d38591cf803e57c4037c
-
SHA256
30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2
-
SHA512
ca955afbeac70f1c684ed9437d74dd8d2ac0f6f112d0392a89898e97b0fe7ac742ec8b252c6fb754792332fedafb5a29d196645539d354d7b2b2e6b69a89ff39
-
SSDEEP
3072:p2IRCfVPhfXLLGEhafyoi8jqRPzcp+1ZWLjJEP+Rw5TZFDJTEjyPIOY:A5pXLCRvi8jqNc+yLdEPWSn6iV
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe File opened (read-only) \??\T: 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe File opened (read-only) \??\U: 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe File opened (read-only) \??\V: 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe File opened (read-only) \??\Y: 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe File opened (read-only) \??\X: 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe File opened (read-only) \??\Z: 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe File opened (read-only) \??\B: 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe File opened (read-only) \??\H: 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe File opened (read-only) \??\O: 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe File opened (read-only) \??\R: 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe File opened (read-only) \??\W: 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe File opened (read-only) \??\G: 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe File opened (read-only) \??\J: 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe File opened (read-only) \??\L: 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe File opened (read-only) \??\N: 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe File opened (read-only) \??\P: 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe File opened (read-only) \??\E: 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe File opened (read-only) \??\K: 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe File opened (read-only) \??\M: 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe File opened (read-only) \??\Q: 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe File opened (read-only) \??\S: 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2088 wrote to memory of 3060 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 28 PID 2088 wrote to memory of 3060 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 28 PID 2088 wrote to memory of 3060 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 28 PID 2088 wrote to memory of 3060 2088 30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe 28 PID 3060 wrote to memory of 2008 3060 cmd.exe 30 PID 3060 wrote to memory of 2008 3060 cmd.exe 30 PID 3060 wrote to memory of 2008 3060 cmd.exe 30 PID 3060 wrote to memory of 2008 3060 cmd.exe 30 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2008 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe"C:\Users\Admin\AppData\Local\Temp\30f9a26a248fcf321c6a2eb4a405b636c2e2b9993e17cfff11adebf2cf6ef8f2.exe"1⤵
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c attrib +h +s +r C:\Users\Default\AppData\MsgE.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\attrib.exeattrib +h +s +r C:\Users\Default\AppData\MsgE.exe3⤵
- Views/modifies file attributes
PID:2008
-
-