Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 20:54
Static task
static1
Behavioral task
behavioral1
Sample
121f406624b9995f3f19c5dcfeab6a66.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
121f406624b9995f3f19c5dcfeab6a66.exe
Resource
win10v2004-20231215-en
General
-
Target
121f406624b9995f3f19c5dcfeab6a66.exe
-
Size
215KB
-
MD5
121f406624b9995f3f19c5dcfeab6a66
-
SHA1
1327fa593578ed4b90743427aa839293e25166f7
-
SHA256
d00b8527779d3014b49708450eaed5cff5804f68944fad8c501f81c7ef83713e
-
SHA512
5d3686b098838b50e5d01d80b7594f54a82bf9f9f716d7a2e9cba9049adb39899e48d29592a73146248728e603aefd72acda70c4ad1985266f1008660cbbb9a4
-
SSDEEP
6144:LS/ECKgcKNc+fwb1/d8eLCWLz8/Gs+nFeHT:hvgIdKeOWXyGs+nOT
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2312 ~DP8DCE.exe 2832 ~DP8E3C.exe 2716 winlogon.exe -
Loads dropped DLL 4 IoCs
pid Process 2268 121f406624b9995f3f19c5dcfeab6a66.exe 2268 121f406624b9995f3f19c5dcfeab6a66.exe 2268 121f406624b9995f3f19c5dcfeab6a66.exe 2268 121f406624b9995f3f19c5dcfeab6a66.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winlogon = "C:\\Windows\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winlogon = "C:\\Users\\Admin\\AppData\\Local\\Temp\\~DP8DCE.exe" ~DP8DCE.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\winlogon.exe ~DP8DCE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2716 winlogon.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2312 2268 121f406624b9995f3f19c5dcfeab6a66.exe 28 PID 2268 wrote to memory of 2312 2268 121f406624b9995f3f19c5dcfeab6a66.exe 28 PID 2268 wrote to memory of 2312 2268 121f406624b9995f3f19c5dcfeab6a66.exe 28 PID 2268 wrote to memory of 2312 2268 121f406624b9995f3f19c5dcfeab6a66.exe 28 PID 2268 wrote to memory of 2832 2268 121f406624b9995f3f19c5dcfeab6a66.exe 29 PID 2268 wrote to memory of 2832 2268 121f406624b9995f3f19c5dcfeab6a66.exe 29 PID 2268 wrote to memory of 2832 2268 121f406624b9995f3f19c5dcfeab6a66.exe 29 PID 2268 wrote to memory of 2832 2268 121f406624b9995f3f19c5dcfeab6a66.exe 29 PID 2312 wrote to memory of 2716 2312 ~DP8DCE.exe 30 PID 2312 wrote to memory of 2716 2312 ~DP8DCE.exe 30 PID 2312 wrote to memory of 2716 2312 ~DP8DCE.exe 30 PID 2312 wrote to memory of 2716 2312 ~DP8DCE.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\121f406624b9995f3f19c5dcfeab6a66.exe"C:\Users\Admin\AppData\Local\Temp\121f406624b9995f3f19c5dcfeab6a66.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\~DP8DCE.exe"C:\Users\Admin\AppData\Local\Temp\~DP8DCE.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\winlogon.exeC:\Windows\winlogon.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:2716
-
-
-
C:\Users\Admin\AppData\Local\Temp\~DP8E3C.exe"C:\Users\Admin\AppData\Local\Temp\~DP8E3C.exe"2⤵
- Executes dropped EXE
PID:2832
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD5b524995de3a3a7fc987ce779cef59ff2
SHA16e6a0e733dd1fa27e98e0c077a8a0042e9bdf522
SHA25692d895fa1e0eac56231f89fabf80db4d666afbf2369ea42f5fba5d2dabd0b2c0
SHA512377dd960650514159f6e7f38007b5ed9da36e5f4bb970da64fed5bb82787877e094deeadb0fcfbbbf81be775f4a28b2078bab1e4efa35f5213598c11d32bb15e
-
Filesize
41KB
MD5e9bcc69aefb08897ee5cb81546253705
SHA18435b204b98fbe563654e65ab58a1e0447c87f1c
SHA256f1850e5c8eef81bd5080e303754f833b4a27498f6f0a9cdea730e16ed1ffcfa8
SHA5120e99c859b84ed100de4df3b0890e00cf8cd33a7b7624278faccf7c903c049b513b3495518c1ad6ec54e83be2dc6077cdf3c41637a0ceecf84762dd59d9b6cb4d