Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 03:02
Static task
static1
Behavioral task
behavioral1
Sample
019d0da37d4464cfd839f0742453a21a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
019d0da37d4464cfd839f0742453a21a.exe
Resource
win10v2004-20231215-en
General
-
Target
019d0da37d4464cfd839f0742453a21a.exe
-
Size
12KB
-
MD5
019d0da37d4464cfd839f0742453a21a
-
SHA1
9f23d1a1f6512fd51798bafb93b50471743cdfda
-
SHA256
f001b71ff2656216fdb4736d230c560089d10e50c677f59f9d66c18277c27ba1
-
SHA512
2c432dd6dc95a06d856b9673adc88c35e0e0fe588fbc3885a0f78ff465df412665953762b508738754f2d45d9caeec693f0120362d16cee6f617a23bdd1e1333
-
SSDEEP
384:mRW/WzV8GOu2Wo+UdeDSSnAz/FXne4hb/:CiTptr
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\9460552E\ImagePath = "C:\\Windows\\system32\\2F25D190.EXE -k" 019d0da37d4464cfd839f0742453a21a.exe -
Deletes itself 1 IoCs
pid Process 2752 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1748 2F25D190.EXE -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\2F25D190.EXE 019d0da37d4464cfd839f0742453a21a.exe File created C:\Windows\SysWOW64\2F25D190.EXE 2F25D190.EXE File created C:\Windows\SysWOW64\AC08E6D2.DLL 2F25D190.EXE File created C:\Windows\SysWOW64\del.bat 019d0da37d4464cfd839f0742453a21a.exe File created C:\Windows\SysWOW64\2F25D190.EXE 019d0da37d4464cfd839f0742453a21a.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1672 019d0da37d4464cfd839f0742453a21a.exe 1748 2F25D190.EXE 1748 2F25D190.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1672 wrote to memory of 2752 1672 019d0da37d4464cfd839f0742453a21a.exe 30 PID 1672 wrote to memory of 2752 1672 019d0da37d4464cfd839f0742453a21a.exe 30 PID 1672 wrote to memory of 2752 1672 019d0da37d4464cfd839f0742453a21a.exe 30 PID 1672 wrote to memory of 2752 1672 019d0da37d4464cfd839f0742453a21a.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\019d0da37d4464cfd839f0742453a21a.exe"C:\Users\Admin\AppData\Local\Temp\019d0da37d4464cfd839f0742453a21a.exe"1⤵
- Sets service image path in registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\del.bat2⤵
- Deletes itself
PID:2752
-
-
C:\Windows\SysWOW64\2F25D190.EXEC:\Windows\SysWOW64\2F25D190.EXE -k1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5019d0da37d4464cfd839f0742453a21a
SHA19f23d1a1f6512fd51798bafb93b50471743cdfda
SHA256f001b71ff2656216fdb4736d230c560089d10e50c677f59f9d66c18277c27ba1
SHA5122c432dd6dc95a06d856b9673adc88c35e0e0fe588fbc3885a0f78ff465df412665953762b508738754f2d45d9caeec693f0120362d16cee6f617a23bdd1e1333