Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 01:16
Behavioral task
behavioral1
Sample
1fd17abb1a0e8eff6031a5140870c155.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1fd17abb1a0e8eff6031a5140870c155.exe
Resource
win10v2004-20231215-en
General
-
Target
1fd17abb1a0e8eff6031a5140870c155.exe
-
Size
928KB
-
MD5
1fd17abb1a0e8eff6031a5140870c155
-
SHA1
1e4dce9c3d6db3616e0a757524387ec5d7d6b608
-
SHA256
a217823069ebb747fd86e5e4d4a2d41b27ffc6d48fdfbd04dd3ba550f26fb7d6
-
SHA512
5370244df83c3865d371cf5bfbc455c32c27fd3735068650e11969ec71b6f992d2a4c179a025200976bf815e57c4fbcef6e882711e4b835d628738e82772e2c0
-
SSDEEP
24576:ih63DSP3ZP/jXRKT3h3pcWE4fq5iq/cPGvH36mxFL73sxwmQLNozu0MkWtoYfR:J65jXRKT3PctRPX36mjL7cCtyN/bY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2176 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2888 963079270.exe -
Loads dropped DLL 3 IoCs
pid Process 2176 cmd.exe 2888 963079270.exe 2888 963079270.exe -
resource yara_rule behavioral1/memory/1640-1-0x0000000001000000-0x0000000001575000-memory.dmp upx behavioral1/files/0x0008000000012254-21.dat upx behavioral1/files/0x0008000000012254-20.dat upx behavioral1/memory/2888-24-0x0000000001000000-0x0000000001575000-memory.dmp upx behavioral1/files/0x0008000000012254-19.dat upx behavioral1/files/0x0008000000012254-27.dat upx behavioral1/files/0x0008000000012254-32.dat upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\963079270 = "\"C:\\Users\\Admin\\AppData\\Local\\963079270.exe\" 0 29 " 963079270.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\1fd17abb1a0e8eff6031a5140870c155 = "\"C:\\Users\\Admin\\AppData\\Local\\963079270.exe\" 0 33 " 1fd17abb1a0e8eff6031a5140870c155.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 2852 reg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2888 963079270.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 2888 963079270.exe 2888 963079270.exe 2888 963079270.exe 2888 963079270.exe 2888 963079270.exe 2888 963079270.exe 2888 963079270.exe 2888 963079270.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 2888 963079270.exe 2888 963079270.exe 2888 963079270.exe 2888 963079270.exe 2888 963079270.exe 2888 963079270.exe 2888 963079270.exe 2888 963079270.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2176 1640 1fd17abb1a0e8eff6031a5140870c155.exe 29 PID 1640 wrote to memory of 2176 1640 1fd17abb1a0e8eff6031a5140870c155.exe 29 PID 1640 wrote to memory of 2176 1640 1fd17abb1a0e8eff6031a5140870c155.exe 29 PID 1640 wrote to memory of 2176 1640 1fd17abb1a0e8eff6031a5140870c155.exe 29 PID 2176 wrote to memory of 2852 2176 cmd.exe 30 PID 2176 wrote to memory of 2852 2176 cmd.exe 30 PID 2176 wrote to memory of 2852 2176 cmd.exe 30 PID 2176 wrote to memory of 2852 2176 cmd.exe 30 PID 2176 wrote to memory of 2888 2176 cmd.exe 31 PID 2176 wrote to memory of 2888 2176 cmd.exe 31 PID 2176 wrote to memory of 2888 2176 cmd.exe 31 PID 2176 wrote to memory of 2888 2176 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fd17abb1a0e8eff6031a5140870c155.exe"C:\Users\Admin\AppData\Local\Temp\1fd17abb1a0e8eff6031a5140870c155.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\3021676.bat" "2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\reg.exereg delete HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce /v 1fd17abb1a0e8eff6031a5140870c155 /f3⤵
- Modifies registry key
PID:2852
-
-
C:\Users\Admin\AppData\Local\963079270.exeC:\Users\Admin\AppData\Local\963079~1.EXE -i3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2888
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD5b6bae5f5f786d218a7e6ce7b3e3607a8
SHA1614e356c0db2631a1f071c129a5850533c1337e3
SHA256daf773809c10fd475a17d8386a340cfc1c46b219bf9dd2aba97169aeaa4188cf
SHA51273030c2bdf33eeda1fed76a5270d1f65e78ca98a501d32753f209c89cc477d113bf0eeb77d937c1de5170ce2f484d4f977a12f8073eb9f68c775e5ecc851ef80
-
Filesize
271KB
MD5ea92248cc5ed5c39ae763e24c54695d2
SHA174bee7a653c5b4d23a55a862dc1a96ab47f15024
SHA2564962252a1220eb6eaee1b2ecb5d1da95483b745145a64a89ee2b3b3616d899db
SHA5128a50118f1155acfb86379acb149e34a87ec3f8a77bcc386c0e88bd1d842fb928ba0d76678f42568213aec72bcac2966b298aa9b488292f04f5f0bbf9848cf0b5
-
Filesize
425B
MD521286e99891dc8613dbed963a33e6889
SHA154baf0571f15d1359318c4b9266c58b0bfac06d7
SHA2561b0a4640e5c030cd4c335370253bbb41d6b717e0de63e143e474285db28e10b4
SHA512cfcda33a87fc35c95d53ce8bd110c40b9141a8e3da4bf5c7d430447481378fa2221d664f6e88d9dd198227fa6cb9dbda06765bb2ed6728deea5049ecb926411f
-
Filesize
94KB
MD54c148eb9efee1a2e423d5b39dba1d075
SHA146bb568de10ee09b6fdd75e99dfa1927eb5461ad
SHA256030cbd66749dd8139fc26c77e32d153764663a5a759dc65e647d9d463867d038
SHA51284a92a3157ad824b4df59c9939fd3021ab863f753e83347b940e9142c40d2be5ba554626a531d058e56388460f928bf4c9e084fc66aa6d06053337d93488965f
-
Filesize
431KB
MD5f475d40bdda9e5ad3de956b2090287f3
SHA1c84f624be0cf1dd95de4e9a036b109466cf35567
SHA2563d45c8da5ea572ebd1258442f6ca8376bafe1c00c204d519ee83231ff045697b
SHA51260c4eacb692dc3eb3a4cfed99008166643ad9e64caccb5e47846a16590ee94be4644f674e1ff127dd22d14889e2f1ce47c36bafddf8947a853e891cc959d1244
-
Filesize
928KB
MD51fd17abb1a0e8eff6031a5140870c155
SHA11e4dce9c3d6db3616e0a757524387ec5d7d6b608
SHA256a217823069ebb747fd86e5e4d4a2d41b27ffc6d48fdfbd04dd3ba550f26fb7d6
SHA5125370244df83c3865d371cf5bfbc455c32c27fd3735068650e11969ec71b6f992d2a4c179a025200976bf815e57c4fbcef6e882711e4b835d628738e82772e2c0