Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
31/10/2023, 14:14
Static task
static1
Behavioral task
behavioral1
Sample
96a4f8d661316e6557230133b41da50aac9cd73e46cb50511a56b06c6d542428.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
96a4f8d661316e6557230133b41da50aac9cd73e46cb50511a56b06c6d542428.exe
Resource
win10v2004-20231020-en
General
-
Target
96a4f8d661316e6557230133b41da50aac9cd73e46cb50511a56b06c6d542428.exe
-
Size
1.7MB
-
MD5
7dd26a1f30a5d11db9c13dbaa914b65c
-
SHA1
abb870e0d6dadf1f8bb4c301db8c8a4db15ea4aa
-
SHA256
96a4f8d661316e6557230133b41da50aac9cd73e46cb50511a56b06c6d542428
-
SHA512
7fb8b418c0014b9fca8fec7b5f4aa01582f05981ea4d7ad5f56e916552429725f859f9090d7845cf374f36d151a7f97f0e29fa3e9eeeda7e4487a40b835358b8
-
SSDEEP
49152:71wRZWos0ahxr/rqs6gFW8umWWbYaJp5Jsk4YC0PYDU:7WRZWo8/rq5L8oWs4+k4YPP1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2156 install.exe -
Loads dropped DLL 5 IoCs
pid Process 2464 96a4f8d661316e6557230133b41da50aac9cd73e46cb50511a56b06c6d542428.exe 2156 install.exe 2156 install.exe 2156 install.exe 2156 install.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 96a4f8d661316e6557230133b41da50aac9cd73e46cb50511a56b06c6d542428.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2156 install.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2464 wrote to memory of 2156 2464 96a4f8d661316e6557230133b41da50aac9cd73e46cb50511a56b06c6d542428.exe 28 PID 2464 wrote to memory of 2156 2464 96a4f8d661316e6557230133b41da50aac9cd73e46cb50511a56b06c6d542428.exe 28 PID 2464 wrote to memory of 2156 2464 96a4f8d661316e6557230133b41da50aac9cd73e46cb50511a56b06c6d542428.exe 28 PID 2464 wrote to memory of 2156 2464 96a4f8d661316e6557230133b41da50aac9cd73e46cb50511a56b06c6d542428.exe 28 PID 2464 wrote to memory of 2156 2464 96a4f8d661316e6557230133b41da50aac9cd73e46cb50511a56b06c6d542428.exe 28 PID 2464 wrote to memory of 2156 2464 96a4f8d661316e6557230133b41da50aac9cd73e46cb50511a56b06c6d542428.exe 28 PID 2464 wrote to memory of 2156 2464 96a4f8d661316e6557230133b41da50aac9cd73e46cb50511a56b06c6d542428.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\96a4f8d661316e6557230133b41da50aac9cd73e46cb50511a56b06c6d542428.exe"C:\Users\Admin\AppData\Local\Temp\96a4f8d661316e6557230133b41da50aac9cd73e46cb50511a56b06c6d542428.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\install.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\install.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:2156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD58bc18194e2cc2590e115e6b65e1c72ca
SHA1b55a3684ce3899fbd89fea8ed12d2115c6962991
SHA25685911233010a3891820ad9821908893bb1711f31dc874ee749a10ad75031edcd
SHA512fd042dc7793c177c30a91dc116b7513982fdb2ea8a4434831396b06c09c14c56750338aaac174af5ee4fa8d8474484c0c65084682714d6d2202a139951d75ce9
-
Filesize
595KB
MD5ff977f9cde2cdb16fa62a7d4d250f8cb
SHA19461780db5e5317f4c1bb30d72d4bfd823bea075
SHA256d446c9471ece9af75f91c984fc09050e1d0fd4f76c00fde087a63da717ef18d7
SHA5129fa9681d5bdc201dc6e86c66cd5f23896b842f300c4f48e66850903496e19b43268597c1090fb477fb795bc999c6816d70ab3f100b43b4a049026ddf7ddb7cdf
-
Filesize
595KB
MD5ff977f9cde2cdb16fa62a7d4d250f8cb
SHA19461780db5e5317f4c1bb30d72d4bfd823bea075
SHA256d446c9471ece9af75f91c984fc09050e1d0fd4f76c00fde087a63da717ef18d7
SHA5129fa9681d5bdc201dc6e86c66cd5f23896b842f300c4f48e66850903496e19b43268597c1090fb477fb795bc999c6816d70ab3f100b43b4a049026ddf7ddb7cdf
-
Filesize
4KB
MD5e5a121e194e2425b94092f811b0b1d35
SHA1b46d28131e244766969363e9ec8a4901081a4190
SHA25650bd45989ac93229196fafc2e54b8e8830b41b7a0f51fb3c9eb601c6330e5f25
SHA5129168ea7c4cc9c102ee4a9dec5d6213f22d37b1e602a8a26b512f4b75c724ecb566bdfb9df809bfa4395346277c64475b0bf60256a13c9fcc6d8a2b45e139c6bc
-
Filesize
82KB
MD5dc40f8fc934de8c9266b62b003db3727
SHA1b4c3353eced2a60d68e966f6a406d19982f58a02
SHA256b0f5c37a95280ec66f747fb36ffc1eeb4a02b317c7db31173cfdbff8f32bee43
SHA512551421007dbc1c66cab0310a6014d447bfefea48d8cafb92e527ed805a2996ec6b3dfb2a50422256d3dbd57548c26e1cf2092c4a62f7d6ef68fb5a0454405d91
-
Filesize
1.9MB
MD5636c04e88fcae33b788f6d271be7d6d7
SHA17e443b2b7bd58ad7f9822c08e1ee2e8400820089
SHA256a288fb8b65e2c8004c61028554634607a14509269bbc13e9921a326a8e1978e3
SHA512166d32397663a0b8bbc5df700d846a579f0c00243866ffdc93024f480e3397a33305117d8064bd8bf1dd0adfdac3a3b6dcf79bda3160e48ec454f1c32922a58b
-
Filesize
5KB
MD506fba95313f26e300917c6cea4480890
SHA131beee44776f114078fc403e405eaa5936c4bc3b
SHA256594884a8006e24ad5b1578cd7c75aca21171bb079ebdc4f6518905bcf2237ba1
SHA5127dca0f1ab5d3fd1ac8755142a7ca4d085bb0c2f12a7272e56159dadfa22da79ec8261815be71b9f5e7c32f6e8121ecb2443060f7db76feaf01eb193200e67dfd
-
Filesize
595KB
MD5ff977f9cde2cdb16fa62a7d4d250f8cb
SHA19461780db5e5317f4c1bb30d72d4bfd823bea075
SHA256d446c9471ece9af75f91c984fc09050e1d0fd4f76c00fde087a63da717ef18d7
SHA5129fa9681d5bdc201dc6e86c66cd5f23896b842f300c4f48e66850903496e19b43268597c1090fb477fb795bc999c6816d70ab3f100b43b4a049026ddf7ddb7cdf
-
Filesize
595KB
MD5ff977f9cde2cdb16fa62a7d4d250f8cb
SHA19461780db5e5317f4c1bb30d72d4bfd823bea075
SHA256d446c9471ece9af75f91c984fc09050e1d0fd4f76c00fde087a63da717ef18d7
SHA5129fa9681d5bdc201dc6e86c66cd5f23896b842f300c4f48e66850903496e19b43268597c1090fb477fb795bc999c6816d70ab3f100b43b4a049026ddf7ddb7cdf
-
Filesize
595KB
MD5ff977f9cde2cdb16fa62a7d4d250f8cb
SHA19461780db5e5317f4c1bb30d72d4bfd823bea075
SHA256d446c9471ece9af75f91c984fc09050e1d0fd4f76c00fde087a63da717ef18d7
SHA5129fa9681d5bdc201dc6e86c66cd5f23896b842f300c4f48e66850903496e19b43268597c1090fb477fb795bc999c6816d70ab3f100b43b4a049026ddf7ddb7cdf
-
Filesize
595KB
MD5ff977f9cde2cdb16fa62a7d4d250f8cb
SHA19461780db5e5317f4c1bb30d72d4bfd823bea075
SHA256d446c9471ece9af75f91c984fc09050e1d0fd4f76c00fde087a63da717ef18d7
SHA5129fa9681d5bdc201dc6e86c66cd5f23896b842f300c4f48e66850903496e19b43268597c1090fb477fb795bc999c6816d70ab3f100b43b4a049026ddf7ddb7cdf
-
Filesize
82KB
MD5dc40f8fc934de8c9266b62b003db3727
SHA1b4c3353eced2a60d68e966f6a406d19982f58a02
SHA256b0f5c37a95280ec66f747fb36ffc1eeb4a02b317c7db31173cfdbff8f32bee43
SHA512551421007dbc1c66cab0310a6014d447bfefea48d8cafb92e527ed805a2996ec6b3dfb2a50422256d3dbd57548c26e1cf2092c4a62f7d6ef68fb5a0454405d91