Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 12:55
Static task
static1
Behavioral task
behavioral1
Sample
2018dd2157d9dcdefeadf3d9d8acc853.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2018dd2157d9dcdefeadf3d9d8acc853.exe
Resource
win10v2004-20231215-en
General
-
Target
2018dd2157d9dcdefeadf3d9d8acc853.exe
-
Size
157KB
-
MD5
2018dd2157d9dcdefeadf3d9d8acc853
-
SHA1
d0551d394beb5cb762e54a8d2864fe11e3d7d4a9
-
SHA256
8fc81ee53904ca3ceadc40f2dbb7b2d0cfc926b0408d06effcd53b30a3711aba
-
SHA512
2c9ec5ca045b2886126286e28f5d0bf1cf725f3e5e440830b44056de68248cfdb79eb70aa6bfdc20a0a65946355fe583039cb0c3a73fdaddb433a0272e4f77ae
-
SSDEEP
1536:+atKGMfWqzs7hWvNljt7XdzchJzpVzNsysqwhqYKGQuObviT+DkNBvd7ZqrKC8ti:+ewfWqA7kvN5phKDBKyugwfNv1bfMiu
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 2018dd2157d9dcdefeadf3d9d8acc853.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 2018dd2157d9dcdefeadf3d9d8acc853.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: 2018dd2157d9dcdefeadf3d9d8acc853.exe File opened (read-only) \??\R: 2018dd2157d9dcdefeadf3d9d8acc853.exe File opened (read-only) \??\P: 2018dd2157d9dcdefeadf3d9d8acc853.exe File opened (read-only) \??\M: 2018dd2157d9dcdefeadf3d9d8acc853.exe File opened (read-only) \??\H: 2018dd2157d9dcdefeadf3d9d8acc853.exe File opened (read-only) \??\G: 2018dd2157d9dcdefeadf3d9d8acc853.exe File opened (read-only) \??\Z: 2018dd2157d9dcdefeadf3d9d8acc853.exe File opened (read-only) \??\X: 2018dd2157d9dcdefeadf3d9d8acc853.exe File opened (read-only) \??\U: 2018dd2157d9dcdefeadf3d9d8acc853.exe File opened (read-only) \??\T: 2018dd2157d9dcdefeadf3d9d8acc853.exe File opened (read-only) \??\O: 2018dd2157d9dcdefeadf3d9d8acc853.exe File opened (read-only) \??\L: 2018dd2157d9dcdefeadf3d9d8acc853.exe File opened (read-only) \??\Y: 2018dd2157d9dcdefeadf3d9d8acc853.exe File opened (read-only) \??\V: 2018dd2157d9dcdefeadf3d9d8acc853.exe File opened (read-only) \??\S: 2018dd2157d9dcdefeadf3d9d8acc853.exe File opened (read-only) \??\Q: 2018dd2157d9dcdefeadf3d9d8acc853.exe File opened (read-only) \??\N: 2018dd2157d9dcdefeadf3d9d8acc853.exe File opened (read-only) \??\E: 2018dd2157d9dcdefeadf3d9d8acc853.exe File opened (read-only) \??\K: 2018dd2157d9dcdefeadf3d9d8acc853.exe File opened (read-only) \??\J: 2018dd2157d9dcdefeadf3d9d8acc853.exe File opened (read-only) \??\I: 2018dd2157d9dcdefeadf3d9d8acc853.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\autorun.inf 2018dd2157d9dcdefeadf3d9d8acc853.exe File opened for modification C:\autorun.inf 2018dd2157d9dcdefeadf3d9d8acc853.exe File opened for modification C:\Documents and Settings\Admin\Local Settings\Application Data\Microsoft\CD Burning\autorun.inf 2018dd2157d9dcdefeadf3d9d8acc853.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MICROS~1\OFFICE14\MSACCESS.EXE 2018dd2157d9dcdefeadf3d9d8acc853.exe File opened for modification C:\PROGRA~2\MICROS~1\OFFICE14\MSPUB.EXE 2018dd2157d9dcdefeadf3d9d8acc853.exe File opened for modification C:\PROGRA~2\MICROS~1\OFFICE14\OIS.EXE 2018dd2157d9dcdefeadf3d9d8acc853.exe File opened for modification C:\PROGRA~2\MICROS~1\OFFICE14\EXCEL.EXE 2018dd2157d9dcdefeadf3d9d8acc853.exe File opened for modification C:\PROGRA~2\MICROS~1\OFFICE14\GROOVE.EXE 2018dd2157d9dcdefeadf3d9d8acc853.exe File opened for modification C:\PROGRA~2\MICROS~1\OFFICE14\INFOPATH.EXE 2018dd2157d9dcdefeadf3d9d8acc853.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1640 2472 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2472 2018dd2157d9dcdefeadf3d9d8acc853.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2472 wrote to memory of 1640 2472 2018dd2157d9dcdefeadf3d9d8acc853.exe 28 PID 2472 wrote to memory of 1640 2472 2018dd2157d9dcdefeadf3d9d8acc853.exe 28 PID 2472 wrote to memory of 1640 2472 2018dd2157d9dcdefeadf3d9d8acc853.exe 28 PID 2472 wrote to memory of 1640 2472 2018dd2157d9dcdefeadf3d9d8acc853.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2018dd2157d9dcdefeadf3d9d8acc853.exe"C:\Users\Admin\AppData\Local\Temp\2018dd2157d9dcdefeadf3d9d8acc853.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2472 -s 5442⤵
- Program crash
PID:1640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126B
MD5163e20cbccefcdd42f46e43a94173c46
SHA14c7b5048e8608e2a75799e00ecf1bbb4773279ae
SHA2567780bee9df142a17e0457f3dcb2788b50fc2792370089335597d33719126fb7e
SHA512e5ac0ff6b087857799ab70f68067c9dc73eeb93ccfcad87047052380b95ade3e6eb2a7d01a0f850d548a39f4b1ebb60e299d603dbe25c31b9a3585b34a0c65a8
-
Filesize
157KB
MD5c66b3197c2349bcf5f0b7e9eb0c18df4
SHA120b708ca5d26b53cd85cf2666a07d5a64081d318
SHA256e8d17e84d7d2fcbd86ab85d5b281f9f86a0fe36310f135b0efec6e6b4a1a5906
SHA512216ca0a4fdc0d40a1cef1871e3b3ef4fd236c10221f9d99c0c0a4eaa16a4e869a4b005dc9354dd0565fd52f962679454168dd392eb4aee045379b21a7b99b5db