Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
25/10/2023, 10:50
Static task
static1
Behavioral task
behavioral1
Sample
38e48171841e732efe6ce8b4713c315a805a6cbb347eb98b9a6e4daeb230b095.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
38e48171841e732efe6ce8b4713c315a805a6cbb347eb98b9a6e4daeb230b095.exe
Resource
win10v2004-20231020-en
General
-
Target
38e48171841e732efe6ce8b4713c315a805a6cbb347eb98b9a6e4daeb230b095.exe
-
Size
24KB
-
MD5
1974b3efe52893678a024e9fe8ff07a0
-
SHA1
4d5b9d7b81cf7e38e65d402bf30a3b90f7271022
-
SHA256
38e48171841e732efe6ce8b4713c315a805a6cbb347eb98b9a6e4daeb230b095
-
SHA512
7c98e10b7978bd873fb7aafd10aae3ab1cff58bff152f9c3d7ef83d89d0fbe14e3a6ca715f89d904400fd1b9390f2c4cd243b4151b05e931ec8aede3c6be12de
-
SSDEEP
384:fLX3Wg+PHCBRWL8yER7HJ7v3Ir4zYV4IysmRJqn:jXGg+PHCBRWLtExHuuGejP0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1872 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Run\Readme = "C:\\Users\\Admin\\AppData\\Local\\rundll32.exe" rundll32.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Nq0592SfD.jpg" rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe 1872 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1776 38e48171841e732efe6ce8b4713c315a805a6cbb347eb98b9a6e4daeb230b095.exe Token: SeDebugPrivilege 1872 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1776 wrote to memory of 1872 1776 38e48171841e732efe6ce8b4713c315a805a6cbb347eb98b9a6e4daeb230b095.exe 28 PID 1776 wrote to memory of 1872 1776 38e48171841e732efe6ce8b4713c315a805a6cbb347eb98b9a6e4daeb230b095.exe 28 PID 1776 wrote to memory of 1872 1776 38e48171841e732efe6ce8b4713c315a805a6cbb347eb98b9a6e4daeb230b095.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\38e48171841e732efe6ce8b4713c315a805a6cbb347eb98b9a6e4daeb230b095.exe"C:\Users\Admin\AppData\Local\Temp\38e48171841e732efe6ce8b4713c315a805a6cbb347eb98b9a6e4daeb230b095.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\rundll32.exe"C:\Users\Admin\AppData\Local\rundll32.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD51974b3efe52893678a024e9fe8ff07a0
SHA14d5b9d7b81cf7e38e65d402bf30a3b90f7271022
SHA25638e48171841e732efe6ce8b4713c315a805a6cbb347eb98b9a6e4daeb230b095
SHA5127c98e10b7978bd873fb7aafd10aae3ab1cff58bff152f9c3d7ef83d89d0fbe14e3a6ca715f89d904400fd1b9390f2c4cd243b4151b05e931ec8aede3c6be12de
-
Filesize
24KB
MD51974b3efe52893678a024e9fe8ff07a0
SHA14d5b9d7b81cf7e38e65d402bf30a3b90f7271022
SHA25638e48171841e732efe6ce8b4713c315a805a6cbb347eb98b9a6e4daeb230b095
SHA5127c98e10b7978bd873fb7aafd10aae3ab1cff58bff152f9c3d7ef83d89d0fbe14e3a6ca715f89d904400fd1b9390f2c4cd243b4151b05e931ec8aede3c6be12de
-
Filesize
416B
MD5ed1c40917f1c39d4f6525a3f0650396b
SHA1decbe0e54e3eb3dfb7dc162e2a00a58fc577cf71
SHA256467c933d9e855bfaf8fd8d10abaae1541bd6693eb3da471f3ef99e5cefe3a7a3
SHA5129f22e24c70c2806af5c18354d82934973b544a2938081d230e96ff5457c741d28ae9722f2499e71902c8f1c65a2f1c769fceb4ab86b036e9ead2bef88871b87b