Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 23:22
Static task
static1
Behavioral task
behavioral1
Sample
1923ebecd58c0de79ac2d4e3069fc3cf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1923ebecd58c0de79ac2d4e3069fc3cf.exe
Resource
win10v2004-20231215-en
General
-
Target
1923ebecd58c0de79ac2d4e3069fc3cf.exe
-
Size
31KB
-
MD5
1923ebecd58c0de79ac2d4e3069fc3cf
-
SHA1
ecfdff944abb418edc5f2eca87a4b1e32340f9e1
-
SHA256
bb15ff2edbd4738b45cbd5cc2280f17bbb2f44022c55350f6abc822b8b64625b
-
SHA512
13d0179d9ae1783a200f58b2f58d3505c5890fd4b2730ab4a3b9ce7a11da766edad240d5b7120f6d60fb7462581ab55d120898c49609bad6885cc14f7732c762
-
SSDEEP
768:aij3dfUZ7GDVWl8zHPHXyXHCzcHHvzQBdi9vc:ai27GVWl4vUv4Wvc
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 1923ebecd58c0de79ac2d4e3069fc3cf.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Admin.exe -
Executes dropped EXE 1 IoCs
pid Process 2436 Admin.exe -
Loads dropped DLL 2 IoCs
pid Process 2852 1923ebecd58c0de79ac2d4e3069fc3cf.exe 2852 1923ebecd58c0de79ac2d4e3069fc3cf.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe" Admin.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe" 1923ebecd58c0de79ac2d4e3069fc3cf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2852 1923ebecd58c0de79ac2d4e3069fc3cf.exe 2852 1923ebecd58c0de79ac2d4e3069fc3cf.exe 2852 1923ebecd58c0de79ac2d4e3069fc3cf.exe 2852 1923ebecd58c0de79ac2d4e3069fc3cf.exe 2436 Admin.exe 2852 1923ebecd58c0de79ac2d4e3069fc3cf.exe 2436 Admin.exe 2852 1923ebecd58c0de79ac2d4e3069fc3cf.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe 2436 Admin.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2852 1923ebecd58c0de79ac2d4e3069fc3cf.exe 2436 Admin.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2852 wrote to memory of 2436 2852 1923ebecd58c0de79ac2d4e3069fc3cf.exe 28 PID 2852 wrote to memory of 2436 2852 1923ebecd58c0de79ac2d4e3069fc3cf.exe 28 PID 2852 wrote to memory of 2436 2852 1923ebecd58c0de79ac2d4e3069fc3cf.exe 28 PID 2852 wrote to memory of 2436 2852 1923ebecd58c0de79ac2d4e3069fc3cf.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1923ebecd58c0de79ac2d4e3069fc3cf.exe"C:\Users\Admin\AppData\Local\Temp\1923ebecd58c0de79ac2d4e3069fc3cf.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\Admin.exe"C:\Users\Admin\Admin.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD55238d3d4b46800b7bc50accd4bac7619
SHA122e613b809247e9ba40812f2ad7a040815baee77
SHA2565f8217b2aa733d4a1b4902173bc18f12b89144a92c51c453e2c0183c9e8a27d2
SHA5128f3159f7311647996a7fa92202bf6e1e429d436381a3c54ace3f8c754003099745092b8baf933c34edd7297d3587f2331b4f0a982469b09e03a60bcec03e3fc8