Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 11:06
Static task
static1
Behavioral task
behavioral1
Sample
198fe4a89ef46eabd3a57e26eba2c097.exe
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
198fe4a89ef46eabd3a57e26eba2c097.exe
Resource
win10v2004-20231215-en
1 signatures
150 seconds
General
-
Target
198fe4a89ef46eabd3a57e26eba2c097.exe
-
Size
203KB
-
MD5
198fe4a89ef46eabd3a57e26eba2c097
-
SHA1
8c4334037eba54f1f3bc293c06d3220e0b1b85a4
-
SHA256
28b594e8247ebf623a01b73c670f568a40e83b61c953c946924e078553e50e78
-
SHA512
41446893622f23781aca32ceaf5cf632d4d623867d760dbb0b33efbdc429f26fe60369b557e5ef5201a7de83ece2822895c5f61ee5d5a529db5e0a0623dd2e08
-
SSDEEP
3072:9TubNFJqxlQui0gZNMsgxXcKf/AULlkBz0WEJ+Va3chjj7D3yXKcwV:9T2kxlQ+rfgULWBz0Nea3chjj3Ci
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Runonce = "C:\\Windows\\system32\\runouce.exe" 198fe4a89ef46eabd3a57e26eba2c097.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\runouce.exe 198fe4a89ef46eabd3a57e26eba2c097.exe File opened for modification C:\Windows\SysWOW64\runouce.exe 198fe4a89ef46eabd3a57e26eba2c097.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2220 wrote to memory of 1108 2220 198fe4a89ef46eabd3a57e26eba2c097.exe 16 PID 2220 wrote to memory of 1108 2220 198fe4a89ef46eabd3a57e26eba2c097.exe 16 PID 2220 wrote to memory of 1108 2220 198fe4a89ef46eabd3a57e26eba2c097.exe 16 PID 2220 wrote to memory of 1108 2220 198fe4a89ef46eabd3a57e26eba2c097.exe 16 PID 2220 wrote to memory of 1376 2220 198fe4a89ef46eabd3a57e26eba2c097.exe 7 PID 2220 wrote to memory of 1376 2220 198fe4a89ef46eabd3a57e26eba2c097.exe 7
Processes
-
C:\Users\Admin\AppData\Local\Temp\198fe4a89ef46eabd3a57e26eba2c097.exe"C:\Users\Admin\AppData\Local\Temp\198fe4a89ef46eabd3a57e26eba2c097.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\198fe4a89ef46eabd3a57e26eba2c097.exe"C:\Users\Admin\AppData\Local\Temp\198fe4a89ef46eabd3a57e26eba2c097.exe"2⤵PID:1108
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1376