Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19/12/2023, 11:19
Static task
static1
Behavioral task
behavioral1
Sample
128f75228870ce98ca8731fe1a229402.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
128f75228870ce98ca8731fe1a229402.exe
Resource
win10v2004-20231215-en
General
-
Target
128f75228870ce98ca8731fe1a229402.exe
-
Size
95KB
-
MD5
128f75228870ce98ca8731fe1a229402
-
SHA1
397c042c0acfb68ab016af92515b9c99f1688914
-
SHA256
ee7c310b8d7203f9d6b5a8250bd069c0c0c4405c36262d8e720d2eeb2755c6b4
-
SHA512
81a59885465225dde350342c79910f1fd615997838ddc47ddd5cdbe0def2ea32db8acd888cf5877b885995e8010a3ed08078188f64c33f6a7d4919da44e5bb8d
-
SSDEEP
1536:qXI2qslHJlSrL1vGekLhVfBznOYro5+JKKKKKKKKKKKKKKKK6:qYelHJ1eykYro5+JKKKKKKKKKKKKKKKF
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2980 rundll32.exe 2880 DMe.exe -
Loads dropped DLL 4 IoCs
pid Process 2852 128f75228870ce98ca8731fe1a229402.exe 2852 128f75228870ce98ca8731fe1a229402.exe 2852 128f75228870ce98ca8731fe1a229402.exe 2852 128f75228870ce98ca8731fe1a229402.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 128f75228870ce98ca8731fe1a229402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 128f75228870ce98ca8731fe1a229402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 128f75228870ce98ca8731fe1a229402.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe 128f75228870ce98ca8731fe1a229402.exe File created C:\Windows\SysWOW64\notepad¢¬.exe 128f75228870ce98ca8731fe1a229402.exe File created C:\Windows\SysWOW64\DMe.exe 128f75228870ce98ca8731fe1a229402.exe File opened for modification C:\Windows\SysWOW64\DMe.exe 128f75228870ce98ca8731fe1a229402.exe File opened for modification C:\Windows\SysWOW64\¢«.exe 128f75228870ce98ca8731fe1a229402.exe File created C:\Windows\SysWOW64\¢«.exe 128f75228870ce98ca8731fe1a229402.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe 128f75228870ce98ca8731fe1a229402.exe File created C:\Windows\system\rundll32.exe 128f75228870ce98ca8731fe1a229402.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "510" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 128f75228870ce98ca8731fe1a229402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" 128f75228870ce98ca8731fe1a229402.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1703000333" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 128f75228870ce98ca8731fe1a229402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" 128f75228870ce98ca8731fe1a229402.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv 128f75228870ce98ca8731fe1a229402.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command 128f75228870ce98ca8731fe1a229402.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1703000333" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 128f75228870ce98ca8731fe1a229402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 0f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e rundll32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 rundll32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 rundll32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2852 128f75228870ce98ca8731fe1a229402.exe 2852 128f75228870ce98ca8731fe1a229402.exe 2852 128f75228870ce98ca8731fe1a229402.exe 2852 128f75228870ce98ca8731fe1a229402.exe 2852 128f75228870ce98ca8731fe1a229402.exe 2852 128f75228870ce98ca8731fe1a229402.exe 2852 128f75228870ce98ca8731fe1a229402.exe 2852 128f75228870ce98ca8731fe1a229402.exe 2852 128f75228870ce98ca8731fe1a229402.exe 2852 128f75228870ce98ca8731fe1a229402.exe 2852 128f75228870ce98ca8731fe1a229402.exe 2852 128f75228870ce98ca8731fe1a229402.exe 2852 128f75228870ce98ca8731fe1a229402.exe 2852 128f75228870ce98ca8731fe1a229402.exe 2852 128f75228870ce98ca8731fe1a229402.exe 2880 DMe.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe 2980 rundll32.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2852 128f75228870ce98ca8731fe1a229402.exe 2980 rundll32.exe 2880 DMe.exe 2980 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2980 2852 128f75228870ce98ca8731fe1a229402.exe 28 PID 2852 wrote to memory of 2980 2852 128f75228870ce98ca8731fe1a229402.exe 28 PID 2852 wrote to memory of 2980 2852 128f75228870ce98ca8731fe1a229402.exe 28 PID 2852 wrote to memory of 2980 2852 128f75228870ce98ca8731fe1a229402.exe 28 PID 2852 wrote to memory of 2980 2852 128f75228870ce98ca8731fe1a229402.exe 28 PID 2852 wrote to memory of 2980 2852 128f75228870ce98ca8731fe1a229402.exe 28 PID 2852 wrote to memory of 2980 2852 128f75228870ce98ca8731fe1a229402.exe 28 PID 2852 wrote to memory of 2880 2852 128f75228870ce98ca8731fe1a229402.exe 30 PID 2852 wrote to memory of 2880 2852 128f75228870ce98ca8731fe1a229402.exe 30 PID 2852 wrote to memory of 2880 2852 128f75228870ce98ca8731fe1a229402.exe 30 PID 2852 wrote to memory of 2880 2852 128f75228870ce98ca8731fe1a229402.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\128f75228870ce98ca8731fe1a229402.exe"C:\Users\Admin\AppData\Local\Temp\128f75228870ce98ca8731fe1a229402.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2980
-
-
C:\Windows\SysWOW64\DMe.exe"C:\Windows\system32\DMe.exe" C:\Users\Admin\AppData\Local\Temp\128f75228870ce98ca8731fe1a229402.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
92KB
MD55c51da79d63df36fc7545facc789a846
SHA12c22c368ced9e1943e0900161646f45ae605cc4b
SHA2569b3f61c9870c35662ac72d01351378140f5313512136582d2e8633d8ec01c460
SHA512ce97918dfa543d9350f65b4561529767a8dfc83bf48847a12a5b2feacc9f4b88559d91e0bc272b92062a5683986361545f22a41d2cd3c8fdd9ad05701840a5f7
-
Filesize
95KB
MD5128f75228870ce98ca8731fe1a229402
SHA1397c042c0acfb68ab016af92515b9c99f1688914
SHA256ee7c310b8d7203f9d6b5a8250bd069c0c0c4405c36262d8e720d2eeb2755c6b4
SHA51281a59885465225dde350342c79910f1fd615997838ddc47ddd5cdbe0def2ea32db8acd888cf5877b885995e8010a3ed08078188f64c33f6a7d4919da44e5bb8d