Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 11:22
Static task
static1
Behavioral task
behavioral1
Sample
1a7bd3bb85833f8ed51f478e024af1b7.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1a7bd3bb85833f8ed51f478e024af1b7.exe
Resource
win10v2004-20231215-en
General
-
Target
1a7bd3bb85833f8ed51f478e024af1b7.exe
-
Size
322KB
-
MD5
1a7bd3bb85833f8ed51f478e024af1b7
-
SHA1
a3003e285ce0f7c04ea142351d581235e75e52aa
-
SHA256
5851bf0214f12c68579c9b333ee5ed37b6ec5a9afebd519bd37aac0c3a25ea40
-
SHA512
994117914190c32a71af59be095ab24569c1896b6dd7768f8247af4831ceb42dacc62e0ee90b09da2412c455f05973ef9d9efcc01cd631596e728d17ef7d583c
-
SSDEEP
6144:Z/FjEVIUAbAoeKqv5ScGaBD00Daf6E36SfVFZDedW7J/h8O7o1r:ZREVI7bk/FVlDaf336SnZDj7php0
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2620 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2672 1a7bd3bb85833f8ed51f478e024af1b7.exe -
Loads dropped DLL 1 IoCs
pid Process 2024 1a7bd3bb85833f8ed51f478e024af1b7.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Users\\Admin\\AppData\\Roaming\\System\\System.exe" 1a7bd3bb85833f8ed51f478e024af1b7.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\System = "\\System\\System.exe" 1a7bd3bb85833f8ed51f478e024af1b7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2740 PING.EXE -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2024 1a7bd3bb85833f8ed51f478e024af1b7.exe 2024 1a7bd3bb85833f8ed51f478e024af1b7.exe 2024 1a7bd3bb85833f8ed51f478e024af1b7.exe 2672 1a7bd3bb85833f8ed51f478e024af1b7.exe 2672 1a7bd3bb85833f8ed51f478e024af1b7.exe 2672 1a7bd3bb85833f8ed51f478e024af1b7.exe 2672 1a7bd3bb85833f8ed51f478e024af1b7.exe 2672 1a7bd3bb85833f8ed51f478e024af1b7.exe 2672 1a7bd3bb85833f8ed51f478e024af1b7.exe 2672 1a7bd3bb85833f8ed51f478e024af1b7.exe 2672 1a7bd3bb85833f8ed51f478e024af1b7.exe 2672 1a7bd3bb85833f8ed51f478e024af1b7.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2672 1a7bd3bb85833f8ed51f478e024af1b7.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2024 1a7bd3bb85833f8ed51f478e024af1b7.exe Token: SeDebugPrivilege 2672 1a7bd3bb85833f8ed51f478e024af1b7.exe Token: 33 2672 1a7bd3bb85833f8ed51f478e024af1b7.exe Token: SeIncBasePriorityPrivilege 2672 1a7bd3bb85833f8ed51f478e024af1b7.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2672 1a7bd3bb85833f8ed51f478e024af1b7.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2672 2024 1a7bd3bb85833f8ed51f478e024af1b7.exe 32 PID 2024 wrote to memory of 2672 2024 1a7bd3bb85833f8ed51f478e024af1b7.exe 32 PID 2024 wrote to memory of 2672 2024 1a7bd3bb85833f8ed51f478e024af1b7.exe 32 PID 2024 wrote to memory of 2672 2024 1a7bd3bb85833f8ed51f478e024af1b7.exe 32 PID 2024 wrote to memory of 2620 2024 1a7bd3bb85833f8ed51f478e024af1b7.exe 31 PID 2024 wrote to memory of 2620 2024 1a7bd3bb85833f8ed51f478e024af1b7.exe 31 PID 2024 wrote to memory of 2620 2024 1a7bd3bb85833f8ed51f478e024af1b7.exe 31 PID 2024 wrote to memory of 2620 2024 1a7bd3bb85833f8ed51f478e024af1b7.exe 31 PID 2620 wrote to memory of 2740 2620 cmd.exe 30 PID 2620 wrote to memory of 2740 2620 cmd.exe 30 PID 2620 wrote to memory of 2740 2620 cmd.exe 30 PID 2620 wrote to memory of 2740 2620 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a7bd3bb85833f8ed51f478e024af1b7.exe"C:\Users\Admin\AppData\Local\Temp\1a7bd3bb85833f8ed51f478e024af1b7.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\1a7bd3bb85833f8ed51f478e024af1b7.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2620
-
-
C:\Users\Admin\AppData\Local\Temp\1a7bd3bb85833f8ed51f478e024af1b7\1a7bd3bb85833f8ed51f478e024af1b7.exe"C:\Users\Admin\AppData\Local\Temp\1a7bd3bb85833f8ed51f478e024af1b7\1a7bd3bb85833f8ed51f478e024af1b7.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2672
-
-
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10001⤵
- Runs ping.exe
PID:2740
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\1a7bd3bb85833f8ed51f478e024af1b7\1a7bd3bb85833f8ed51f478e024af1b7.exe
Filesize92KB
MD5bb2aae9f26fffd5ee593883e3b996ff0
SHA187dd8602a4f092e8e15fd906b475d316c5d90060
SHA25632d937c7191518ed3d7bafb35697d4dbd598e797991e96c8288e74aa626e5271
SHA5124226c0d456ce01d82090c9484bfdd4c9f16bd87318358cd0543462ce08501c2bb00b1daed0cb3b6e911484fc5bf7e9e98dd566b443c21071fff5af15d48bd57f
-
\Users\Admin\AppData\Local\Temp\1a7bd3bb85833f8ed51f478e024af1b7\1a7bd3bb85833f8ed51f478e024af1b7.exe
Filesize86KB
MD5699accbe8cbf2b2142112d00f8277dcf
SHA177c5a1aa54ccad0a981dc28d10f33ec0bd83a08b
SHA256e62a253c87cee51da89216d416c3f593cf5e55b896b8b7c98cce9d38520e3c29
SHA51271d7efe9a748ab35634898540e9fd586a27af63a37c88bb62161584e92422fdc629180287445c567fcaa5f0d5635be8a63aca18fc340087f5c337bb0ce7115fd