Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 13:27 UTC
Static task
static1
Behavioral task
behavioral1
Sample
a382d5629bc8d44759bc73c3166e3d46.exe
Resource
win7-20231129-en
General
-
Target
a382d5629bc8d44759bc73c3166e3d46.exe
-
Size
4.4MB
-
MD5
a382d5629bc8d44759bc73c3166e3d46
-
SHA1
2ae6dd3d8b45d340dc9065b16be1370a99bec615
-
SHA256
fe4ef7eb884fed14e5ca386bd3f6dd470309681a8c718ea3a3447139a41380f6
-
SHA512
0d2a83b3fb3fee3bfb4ae5aa2c0bda5ccff7adbc37f8bf716ece6398d235a5141f750cca877a30e68611fb8f69b6b79ba876f7584bd31f63b8371176a68ed747
-
SSDEEP
98304:HdJcUQLUGrupm8EC2+dHI02EQdeYgS5toD80r:/PGZKm8EOh2NUhDF
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x000b0000000141a2-3.dat upx behavioral1/memory/2984-20-0x0000000000ED0000-0x00000000012B8000-memory.dmp upx behavioral1/memory/2984-79-0x0000000000ED0000-0x00000000012B8000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Executes dropped EXE 2 IoCs
pid Process 2984 irsetup.exe 2568 LookPicture.exe -
Loads dropped DLL 13 IoCs
pid Process 2392 a382d5629bc8d44759bc73c3166e3d46.exe 2392 a382d5629bc8d44759bc73c3166e3d46.exe 2392 a382d5629bc8d44759bc73c3166e3d46.exe 2392 a382d5629bc8d44759bc73c3166e3d46.exe 2984 irsetup.exe 2984 irsetup.exe 2984 irsetup.exe 2984 irsetup.exe 2984 irsetup.exe 2984 irsetup.exe 2984 irsetup.exe 2984 irsetup.exe 2568 LookPicture.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x00070000000149f5-51.dat nsis_installer_1 behavioral1/files/0x00070000000149f5-51.dat nsis_installer_2 -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 2984 irsetup.exe 2984 irsetup.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe 2568 LookPicture.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2984 irsetup.exe 2984 irsetup.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2984 2392 a382d5629bc8d44759bc73c3166e3d46.exe 28 PID 2392 wrote to memory of 2984 2392 a382d5629bc8d44759bc73c3166e3d46.exe 28 PID 2392 wrote to memory of 2984 2392 a382d5629bc8d44759bc73c3166e3d46.exe 28 PID 2392 wrote to memory of 2984 2392 a382d5629bc8d44759bc73c3166e3d46.exe 28 PID 2392 wrote to memory of 2984 2392 a382d5629bc8d44759bc73c3166e3d46.exe 28 PID 2392 wrote to memory of 2984 2392 a382d5629bc8d44759bc73c3166e3d46.exe 28 PID 2392 wrote to memory of 2984 2392 a382d5629bc8d44759bc73c3166e3d46.exe 28 PID 2984 wrote to memory of 2568 2984 irsetup.exe 29 PID 2984 wrote to memory of 2568 2984 irsetup.exe 29 PID 2984 wrote to memory of 2568 2984 irsetup.exe 29 PID 2984 wrote to memory of 2568 2984 irsetup.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\a382d5629bc8d44759bc73c3166e3d46.exe"C:\Users\Admin\AppData\Local\Temp\a382d5629bc8d44759bc73c3166e3d46.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe"C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe" __IRAOFF:1847330 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\a382d5629bc8d44759bc73c3166e3d46.exe" "__IRCT:3" "__IRTSS:0" "__IRSID:S-1-5-21-3627615824-4061627003-3019543961-1000"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Roaming\LookPicture\LookPicture.exe"C:\Users\Admin\AppData\Roaming\LookPicture\LookPicture.exe" -in3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2568
-
-
Network
-
Remote address:8.8.8.8:53Requestapi.zcjczj.cnIN AResponseapi.zcjczj.cnIN A8.210.18.201
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.3MB
MD56341f4bdd2ffa5d43b37ea746a2f0831
SHA17c97207c7e3022b5a899965987d43e3b2bb7cb7c
SHA256a5cafa6449b0cc9b012c4becb5a9f28c5ea830f883339b06f9e5ae57999f1665
SHA512dc1e69a9480c2ee1f9063330f433cadde49c470cc985228e85444faf9ef4eceb58db0b6f54534b990c5925fdbe634d56af0fb9d0c4d942e96ed5bbfbf9fc1cae
-
Filesize
45B
MD5ea0e191382c342f37fed75b3d6241d24
SHA13f28dfc009194d624e282ff178e415ef1f81b13a
SHA256a7579c49522e82e47065fb94081608b115fb745faf34a099b6e77bcbdcd13b8d
SHA51271f1b4cbbf9530bc647c7046f4f0f5b263cf75be99959e74ff58774ffe38eb5ba91820f8546aee72012ec76ad559f366a8db3cd22cb3acaa2ddd780e216eef87
-
Filesize
114KB
MD54493eeb8fcfe69942b4686f4f368b43c
SHA19c086b0721b9cf099e627e91b689af202913247e
SHA256ac112aa639504a0a3ade925fc23de0c1d32c3200eec16845f6db03e06c14daf5
SHA5122e801da9ef7435790b2a7622d616a04e5f4ab4cdffdba4b59032c79cbeeb20e865fc665b03aa186b1e0e63448eac11bfe5d493c1cbd116e391864efba187860d
-
Filesize
1.3MB
MD57eb6266334c70e3ffa235d2571614734
SHA1de003214a0034ca3dbe9ed35f482f2aaa235c5d7
SHA2560249a947699c4b9678718905d93811a0abb4e1b9528c405f70102ceea68bb00f
SHA512f965de30102d1ca4f305379ce719378dc9bf23fb461318558548df9304154636123b4dea8ce19bc339d53f4c0bfc85205807250fe253d763da08105336ecac0d
-
Filesize
326KB
MD5e7a789232ef503dcb4929791673009a3
SHA18bc28bce4c9d8b4a6e360100441ba54a878de4c1
SHA25689daa79b558055f6f893abf38a0f17d3e1e0193d59dafbdf98d72d4e5961c2a1
SHA5126439a2ec5e9d486c15a37a736bc8d36d8e5f6ecb6a354d0fdd7efc9dccd3fb6bdb208a051b0d81f101669169826e07f9b4ddd79259c79c1e03856af5a9442b87
-
Filesize
3.2MB
MD515e5ed3886e54523a3781f69233d294b
SHA1bcd1af015a7fb9a49c0c60f82d126141feefb316
SHA2563de0b810fbc297eb5cbb1736342af4a3be29bbb3ddeb19ab65b596841c000ddd
SHA51218204f236687f83f488cc380e9984565c6fccd226915a7c638e718157cdd0bd7274732c8f2ddfce98c03e3af404e10b0d59053ae643c90d9fb30c8337c66087b
-
Filesize
1.8MB
MD54cdb3c220777364e88167dd3125b2cc8
SHA18f1219766b955c6e8fcb555dc718ebd0f688e6d8
SHA256a7962322db50fc381f969cd1778539bd13dd20db3b26d8944a7d768e24a6471d
SHA512d041118c7bc97ad2dc0ad21b28858d6f7f3d51713555ef7f5ebe0d783b9bfaa9abfb7e0b3930eeb7f88bb81ff88774061f1fd1a90ca1435e649074d09792c0e7