Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19/12/2023, 12:35
Behavioral task
behavioral1
Sample
24b74b3e9a1a8df34637cac2f7d29c0b.exe
Resource
win7-20231129-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
24b74b3e9a1a8df34637cac2f7d29c0b.exe
Resource
win10v2004-20231201-en
0 signatures
150 seconds
General
-
Target
24b74b3e9a1a8df34637cac2f7d29c0b.exe
-
Size
160KB
-
MD5
24b74b3e9a1a8df34637cac2f7d29c0b
-
SHA1
3b32c1ed7c5ed26d708f65317027f7fe12c1845d
-
SHA256
befd56c57cb06be02cf0a890cf5d25c4db57896a7efcce8b58e8c7dfe9051629
-
SHA512
841ea38ecf1d1bd060426fc062e3dd51b0a7f1be1547b327205498623e6dd4bd2773e2dc0241a31d5c7f7b57d1b1e1521447ac387ae5cc1dd6da4c25c1c8c95b
-
SSDEEP
1536:pEY+mFM2HXKZgi0Iksu+XM5/HtAQ9J6xph:iY+4MiIkLZJNAQ9J6v
Score
10/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2396-0-0x0000000000400000-0x0000000000428000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\359449D8 = "C:\\Users\\Admin\\AppData\\Roaming\\359449D8\\bin.exe" winver.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe 1872 winver.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1872 winver.exe 1352 Explorer.EXE 1352 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1352 Explorer.EXE 1352 Explorer.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2396 wrote to memory of 1872 2396 24b74b3e9a1a8df34637cac2f7d29c0b.exe 29 PID 2396 wrote to memory of 1872 2396 24b74b3e9a1a8df34637cac2f7d29c0b.exe 29 PID 2396 wrote to memory of 1872 2396 24b74b3e9a1a8df34637cac2f7d29c0b.exe 29 PID 2396 wrote to memory of 1872 2396 24b74b3e9a1a8df34637cac2f7d29c0b.exe 29 PID 2396 wrote to memory of 1872 2396 24b74b3e9a1a8df34637cac2f7d29c0b.exe 29 PID 1872 wrote to memory of 1352 1872 winver.exe 7 PID 1872 wrote to memory of 1248 1872 winver.exe 9 PID 1872 wrote to memory of 1320 1872 winver.exe 8 PID 1872 wrote to memory of 1352 1872 winver.exe 7
Processes
-
C:\Users\Admin\AppData\Local\Temp\24b74b3e9a1a8df34637cac2f7d29c0b.exe"C:\Users\Admin\AppData\Local\Temp\24b74b3e9a1a8df34637cac2f7d29c0b.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\winver.exewinver2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1872
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1352
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1320
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1248