Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
16/11/2023, 02:38
Behavioral task
behavioral1
Sample
Windows超级管理器9.45_Single/Windows超级管理器9.45_Single.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
Windows超级管理器9.45_Single/Windows超级管理器9.45_Single.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
Windows超级管理器9.45_Single/果核剥壳 - 全网更新最快.url
Resource
win7-20231020-en
Behavioral task
behavioral4
Sample
Windows超级管理器9.45_Single/果核剥壳 - 全网更新最快.url
Resource
win10v2004-20231023-en
General
-
Target
Windows超级管理器9.45_Single/Windows超级管理器9.45_Single.exe
-
Size
5.3MB
-
MD5
66b0e25dc9247bd9dfa67f75823bc1b3
-
SHA1
6c8cace7d2975504eb413ceeec0cd3716d438f00
-
SHA256
b7a2a74a22824a7a15e57db31d46fcd65481431cbf1e5b6b0eb5ea857d5eead8
-
SHA512
996a22bef191c16604db3d51a1039b0ba56a34c77b7bf45a4cc0b6ac45d84086b9ee2e8fd62a8918fe7311dff3a78a7c9a11a23f038cbe8cef9a5327b1e33bca
-
SSDEEP
98304:qco5cWjW5r9268QGbmOygcc/TvsUa0gWuujnBJW5t8ijeAuTihkOEx2T:qfcWjc9L8QGbdjLvsUaXW3VgFlk/2T
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2980-0-0x0000000000400000-0x0000000001884000-memory.dmp upx behavioral1/memory/2980-3-0x0000000000400000-0x0000000001884000-memory.dmp upx behavioral1/memory/2980-4-0x0000000000400000-0x0000000001884000-memory.dmp upx behavioral1/memory/2980-5-0x0000000000400000-0x0000000001884000-memory.dmp upx behavioral1/memory/2980-6-0x0000000000400000-0x0000000001884000-memory.dmp upx behavioral1/memory/2980-7-0x0000000000400000-0x0000000001884000-memory.dmp upx behavioral1/memory/2980-8-0x0000000000400000-0x0000000001884000-memory.dmp upx behavioral1/memory/2980-9-0x0000000000400000-0x0000000001884000-memory.dmp upx behavioral1/memory/2980-10-0x0000000000400000-0x0000000001884000-memory.dmp upx behavioral1/memory/2980-11-0x0000000000400000-0x0000000001884000-memory.dmp upx behavioral1/memory/2980-12-0x0000000000400000-0x0000000001884000-memory.dmp upx behavioral1/memory/2980-13-0x0000000000400000-0x0000000001884000-memory.dmp upx behavioral1/memory/2980-14-0x0000000000400000-0x0000000001884000-memory.dmp upx behavioral1/memory/2980-15-0x0000000000400000-0x0000000001884000-memory.dmp upx behavioral1/memory/2980-16-0x0000000000400000-0x0000000001884000-memory.dmp upx behavioral1/memory/2980-17-0x0000000000400000-0x0000000001884000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Supermanager\systeminfo.txt cmd.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 2696 systeminfo.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2980 Windows超级管理器9.45_Single.exe 2980 Windows超级管理器9.45_Single.exe 2980 Windows超级管理器9.45_Single.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2980 wrote to memory of 2604 2980 Windows超级管理器9.45_Single.exe 29 PID 2980 wrote to memory of 2604 2980 Windows超级管理器9.45_Single.exe 29 PID 2980 wrote to memory of 2604 2980 Windows超级管理器9.45_Single.exe 29 PID 2980 wrote to memory of 2604 2980 Windows超级管理器9.45_Single.exe 29 PID 2604 wrote to memory of 2696 2604 cmd.exe 31 PID 2604 wrote to memory of 2696 2604 cmd.exe 31 PID 2604 wrote to memory of 2696 2604 cmd.exe 31 PID 2604 wrote to memory of 2696 2604 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Windows超级管理器9.45_Single\Windows超级管理器9.45_Single.exe"C:\Users\Admin\AppData\Local\Temp\Windows超级管理器9.45_Single\Windows超级管理器9.45_Single.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\cmd.execmd /c systeminfo > "C:\Program Files (x86)\Supermanager\systeminfo.txt"2⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo3⤵
- Gathers system information
PID:2696
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e27d9cd9eb8d7fd9ee2349a58eb3c9e1
SHA17c47baf14084c355e1fdce5d258c0d3dab71cf32
SHA25653025988124d9aecdb7d2392913c9df7670fc28804f6ce3ab70c2474cc291e3e
SHA51298aac7fbd7c5f413a8796e7eb57991e5b00e982b39df7eff553e2687921fc133c6a9cf4fb9892bc4dd9579c9f645b0d741ccc25167a9fe3c957e4984fd3605fe