Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
25/11/2023, 09:06
Static task
static1
Behavioral task
behavioral1
Sample
fewvc.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
fewvc.exe
Resource
win10v2004-20231023-en
General
-
Target
fewvc.exe
-
Size
2.4MB
-
MD5
7f133f61ef64cf914cbe0996ee79f85a
-
SHA1
4320f2f9f0aac2051746d9ddbae1ce22500c8af7
-
SHA256
20c157bf9063d14ab2f9fad5145f0c3b2be477244f8e41b9000aa6c7a3d35325
-
SHA512
0c0fab19ae73338dd7d30e153c71640ec274dc2d3de1c98aacc49e5f7ded1bca4e73befb17aeb5b24827647cc13bbe0357fa9b00c8279e0a14b164fd4cfd81a3
-
SSDEEP
49152:WA+x6nPIDKFLlhIzMHBd0CFwk84djYfyZ8ZUIphw5vsJJ:W5x6ng+0CCk84808l8sJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2256 u37.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\u37.exe fewvc.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2256 u37.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2256 u37.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2916 fewvc.exe 2916 fewvc.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2256 2916 fewvc.exe 29 PID 2916 wrote to memory of 2256 2916 fewvc.exe 29 PID 2916 wrote to memory of 2256 2916 fewvc.exe 29 PID 2916 wrote to memory of 2256 2916 fewvc.exe 29 PID 2256 wrote to memory of 2628 2256 u37.exe 30 PID 2256 wrote to memory of 2628 2256 u37.exe 30 PID 2256 wrote to memory of 2628 2256 u37.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\fewvc.exe"C:\Users\Admin\AppData\Local\Temp\fewvc.exe"1⤵
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\u37.exeC:\Windows\u37.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2256 -s 12123⤵PID:2628
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD52e6a09a6d8e8c20e288a30d4538bf82d
SHA1e00e7e628c3ac85d87e80e40bc1f15eed561adca
SHA2568e9464fd79e0eb65e7c5e228362695f7e2d97f7f42d0b112f91ba68350cc46fa
SHA5122c64cf78825b3090980abce679aada84835d24aaebb10c125af550d215881f0d6b23832fa2f0e27d46cad4bb9aa840384c31a8c2e224458793b6458407924579
-
Filesize
1.7MB
MD52e6a09a6d8e8c20e288a30d4538bf82d
SHA1e00e7e628c3ac85d87e80e40bc1f15eed561adca
SHA2568e9464fd79e0eb65e7c5e228362695f7e2d97f7f42d0b112f91ba68350cc46fa
SHA5122c64cf78825b3090980abce679aada84835d24aaebb10c125af550d215881f0d6b23832fa2f0e27d46cad4bb9aa840384c31a8c2e224458793b6458407924579