Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 22:15
Static task
static1
Behavioral task
behavioral1
Sample
3f68ee50da0edb5ed82899a9702060fb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3f68ee50da0edb5ed82899a9702060fb.exe
Resource
win10v2004-20231215-en
General
-
Target
3f68ee50da0edb5ed82899a9702060fb.exe
-
Size
151KB
-
MD5
3f68ee50da0edb5ed82899a9702060fb
-
SHA1
a2d0559f22acccda76da1729153b34d4e4760378
-
SHA256
49a0a3da37167bdd598d738e5fd3b1391bbe00b803cf3fc6ab126b42e3047013
-
SHA512
8b854ab64be33cdba75a2ba32ca61519a03f4f05cb6315e9ed4fc46eaf546cd0f4c9e78e78ab665a462f74e09323bb9fd2f77b25a0baaf6f86c0a129d7ab7999
-
SSDEEP
1536:uS6dkGduQeZyeuMAkByMeXEj4Zi6QC0zBV4yh1+Q1stZe0hI6PkIM7bfyqS52M9w:UkGkwepzcw1V4a+Zw4IBNGqSdm
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 3f68ee50da0edb5ed82899a9702060fb.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 3f68ee50da0edb5ed82899a9702060fb.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: 3f68ee50da0edb5ed82899a9702060fb.exe File opened (read-only) \??\P: 3f68ee50da0edb5ed82899a9702060fb.exe File opened (read-only) \??\I: 3f68ee50da0edb5ed82899a9702060fb.exe File opened (read-only) \??\V: 3f68ee50da0edb5ed82899a9702060fb.exe File opened (read-only) \??\Q: 3f68ee50da0edb5ed82899a9702060fb.exe File opened (read-only) \??\N: 3f68ee50da0edb5ed82899a9702060fb.exe File opened (read-only) \??\M: 3f68ee50da0edb5ed82899a9702060fb.exe File opened (read-only) \??\H: 3f68ee50da0edb5ed82899a9702060fb.exe File opened (read-only) \??\Z: 3f68ee50da0edb5ed82899a9702060fb.exe File opened (read-only) \??\Y: 3f68ee50da0edb5ed82899a9702060fb.exe File opened (read-only) \??\W: 3f68ee50da0edb5ed82899a9702060fb.exe File opened (read-only) \??\G: 3f68ee50da0edb5ed82899a9702060fb.exe File opened (read-only) \??\T: 3f68ee50da0edb5ed82899a9702060fb.exe File opened (read-only) \??\E: 3f68ee50da0edb5ed82899a9702060fb.exe File opened (read-only) \??\O: 3f68ee50da0edb5ed82899a9702060fb.exe File opened (read-only) \??\L: 3f68ee50da0edb5ed82899a9702060fb.exe File opened (read-only) \??\K: 3f68ee50da0edb5ed82899a9702060fb.exe File opened (read-only) \??\J: 3f68ee50da0edb5ed82899a9702060fb.exe File opened (read-only) \??\X: 3f68ee50da0edb5ed82899a9702060fb.exe File opened (read-only) \??\U: 3f68ee50da0edb5ed82899a9702060fb.exe File opened (read-only) \??\S: 3f68ee50da0edb5ed82899a9702060fb.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\autorun.inf 3f68ee50da0edb5ed82899a9702060fb.exe File opened for modification C:\autorun.inf 3f68ee50da0edb5ed82899a9702060fb.exe File opened for modification C:\Documents and Settings\Admin\Local Settings\Application Data\Microsoft\CD Burning\autorun.inf 3f68ee50da0edb5ed82899a9702060fb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2696 3048 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3048 3f68ee50da0edb5ed82899a9702060fb.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2696 3048 3f68ee50da0edb5ed82899a9702060fb.exe 29 PID 3048 wrote to memory of 2696 3048 3f68ee50da0edb5ed82899a9702060fb.exe 29 PID 3048 wrote to memory of 2696 3048 3f68ee50da0edb5ed82899a9702060fb.exe 29 PID 3048 wrote to memory of 2696 3048 3f68ee50da0edb5ed82899a9702060fb.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f68ee50da0edb5ed82899a9702060fb.exe"C:\Users\Admin\AppData\Local\Temp\3f68ee50da0edb5ed82899a9702060fb.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Enumerates connected drives
- Drops autorun.inf file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 3122⤵
- Program crash
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126B
MD5163e20cbccefcdd42f46e43a94173c46
SHA14c7b5048e8608e2a75799e00ecf1bbb4773279ae
SHA2567780bee9df142a17e0457f3dcb2788b50fc2792370089335597d33719126fb7e
SHA512e5ac0ff6b087857799ab70f68067c9dc73eeb93ccfcad87047052380b95ade3e6eb2a7d01a0f850d548a39f4b1ebb60e299d603dbe25c31b9a3585b34a0c65a8
-
Filesize
152KB
MD5321c9c92901c2892772e4c08dbbc7dbf
SHA1eb0a7f88f7085de61433326f5606595d90c2c44a
SHA256b6bd1cb2c442122d19fe9e2d0604c1030296496fe15aecc42c49e96a36bd9efc
SHA512c2ee1ebd97d33ec12a77944966b08d51710d6cddbe857d3223a258c43c2cf7f6d409fd9aff6f9d483308c8e0bf512c038aaeb0ada31cbf60a84840ef21845771
-
Filesize
152KB
MD5dfe5d2e042226af576fcd911a66dd46c
SHA1c2b6652871bb5af0989ac64ee8843eb57f70409d
SHA256b7f3d33dfd613cb48a72603d56658b23aaf09133e066bd8d808735fe6bc6713d
SHA5121e727aaebf07dbff13ab16001f26b6f4460b58a7cf4d9337e3b32eefef4a85371cd653fbe2fd63429d40119567830bc3a869afea8477c94dd6767ab003127ee9