Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 10:26
Behavioral task
behavioral1
Sample
1712b381f6b8719c5346b5752e3eb683.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1712b381f6b8719c5346b5752e3eb683.exe
Resource
win10v2004-20231215-en
General
-
Target
1712b381f6b8719c5346b5752e3eb683.exe
-
Size
805KB
-
MD5
1712b381f6b8719c5346b5752e3eb683
-
SHA1
ebef6459c1b1e11e2509dec841b8e4bc3dcfe61e
-
SHA256
23de66bcc7ef1a42e025033730e10101149822aec65c0132f21fb67b2eaabec9
-
SHA512
2dfee8d9345088c8e32ecc83e1bdb2fb1546952d29b7d090cdb6e7b29da2f6844e2306759f65b7ac3bd632d33f4f603a06a7a812bca7c3e2534c1720e6bed114
-
SSDEEP
24576:OZgQdNnVpyPul3hdVcN/KuJg/kmd9p2wQ:mNTWPm3tcZKuJqkkW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2436 setup.exe -
Loads dropped DLL 1 IoCs
pid Process 1288 1712b381f6b8719c5346b5752e3eb683.exe -
resource yara_rule behavioral1/memory/1288-0-0x00000000012B0000-0x000000000150C000-memory.dmp upx behavioral1/files/0x000d0000000122d2-2.dat upx behavioral1/memory/1288-4-0x0000000002910000-0x0000000002B6C000-memory.dmp upx behavioral1/memory/1288-7-0x00000000012B0000-0x000000000150C000-memory.dmp upx behavioral1/files/0x000d0000000122d2-8.dat upx behavioral1/memory/2436-9-0x0000000000390000-0x00000000005EC000-memory.dmp upx behavioral1/memory/2436-11-0x0000000000390000-0x00000000005EC000-memory.dmp upx behavioral1/memory/2436-30-0x0000000000390000-0x00000000005EC000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main setup.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" setup.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2436 setup.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2436 setup.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 1288 1712b381f6b8719c5346b5752e3eb683.exe 1288 1712b381f6b8719c5346b5752e3eb683.exe 2436 setup.exe 2436 setup.exe 2436 setup.exe 2436 setup.exe 2436 setup.exe 2436 setup.exe 2436 setup.exe 2436 setup.exe 2436 setup.exe 2436 setup.exe 2436 setup.exe 2436 setup.exe 2436 setup.exe 2436 setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1288 wrote to memory of 2436 1288 1712b381f6b8719c5346b5752e3eb683.exe 28 PID 1288 wrote to memory of 2436 1288 1712b381f6b8719c5346b5752e3eb683.exe 28 PID 1288 wrote to memory of 2436 1288 1712b381f6b8719c5346b5752e3eb683.exe 28 PID 1288 wrote to memory of 2436 1288 1712b381f6b8719c5346b5752e3eb683.exe 28 PID 1288 wrote to memory of 2436 1288 1712b381f6b8719c5346b5752e3eb683.exe 28 PID 1288 wrote to memory of 2436 1288 1712b381f6b8719c5346b5752e3eb683.exe 28 PID 1288 wrote to memory of 2436 1288 1712b381f6b8719c5346b5752e3eb683.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1712b381f6b8719c5346b5752e3eb683.exe"C:\Users\Admin\AppData\Local\Temp\1712b381f6b8719c5346b5752e3eb683.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\setup.exeC:\Users\Admin\AppData\Local\Temp\setup.exe relaunch2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD560995d04e55f8d138cf5183e95942906
SHA1d90f51dd6705b94d7d3915dad623f61a7654a410
SHA25605b3464493d500473e1370aafd8c0b8db1678bd38353237141997607caf5c132
SHA5123886ba8025d96b3ba1522def75b997aec503505c14ec3364bba93fa8a5509c792b44bc67a9afbfcc4af9047bad69ae7c9dfd61ec094079cf7ddf3838704af871
-
Filesize
368KB
MD53e5a4389a7007f33bd02e6436579fb59
SHA1468bcd97c7a0903d5ededb7f5361a013bbde3ca2
SHA2564a71dd54909875725d67a7027db2c3062a9633c095b60f0e21144808371e059c
SHA5122f905cc5a5d1ca3b6329bab7505593ed83fa27dd75353f966598e906d08b4e775b3d3042607256f9a90794d701dd9ff4edd6bfeb3d61796d54513fe8ffec33e9
-
Filesize
805KB
MD51712b381f6b8719c5346b5752e3eb683
SHA1ebef6459c1b1e11e2509dec841b8e4bc3dcfe61e
SHA25623de66bcc7ef1a42e025033730e10101149822aec65c0132f21fb67b2eaabec9
SHA5122dfee8d9345088c8e32ecc83e1bdb2fb1546952d29b7d090cdb6e7b29da2f6844e2306759f65b7ac3bd632d33f4f603a06a7a812bca7c3e2534c1720e6bed114