Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 13:42
Static task
static1
Behavioral task
behavioral1
Sample
2296c8c70ca5cfcf6d5e0da9ae697762.exe
Resource
win7-20231215-en
General
-
Target
2296c8c70ca5cfcf6d5e0da9ae697762.exe
-
Size
876KB
-
MD5
2296c8c70ca5cfcf6d5e0da9ae697762
-
SHA1
fb1cdf5c87923cb496cee3ce72242ea17d433c05
-
SHA256
135652f6df4bab082b94fd5721d218e47d0de69e13188ee7276cf8befd921917
-
SHA512
246364ba7632c1ba39eb4337659e88ca2d900af145d3e82dc5bf43f87943aa0be7b0fd54d509b4216cf755c456be9f5dc7c2c88561728d6567b919831b0f786f
-
SSDEEP
24576:zdMLKmtvPyHu7dgoA4S3y9pNg4W7HMcYcN+2QHCXR2:ZiKmHyOx7Sp7sclQR
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 2520 2296c8c70ca5cfcf6d5e0da9ae697762.exe 2520 2296c8c70ca5cfcf6d5e0da9ae697762.exe 2520 2296c8c70ca5cfcf6d5e0da9ae697762.exe 2520 2296c8c70ca5cfcf6d5e0da9ae697762.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2296c8c70ca5cfcf6d5e0da9ae697762.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2224 1716 2296c8c70ca5cfcf6d5e0da9ae697762.exe 15 PID 1716 wrote to memory of 2224 1716 2296c8c70ca5cfcf6d5e0da9ae697762.exe 15 PID 1716 wrote to memory of 2224 1716 2296c8c70ca5cfcf6d5e0da9ae697762.exe 15 PID 1716 wrote to memory of 2224 1716 2296c8c70ca5cfcf6d5e0da9ae697762.exe 15 PID 1716 wrote to memory of 2224 1716 2296c8c70ca5cfcf6d5e0da9ae697762.exe 15 PID 1716 wrote to memory of 2224 1716 2296c8c70ca5cfcf6d5e0da9ae697762.exe 15 PID 1716 wrote to memory of 2224 1716 2296c8c70ca5cfcf6d5e0da9ae697762.exe 15 PID 2224 wrote to memory of 2520 2224 2296c8c70ca5cfcf6d5e0da9ae697762.exe 14 PID 2224 wrote to memory of 2520 2224 2296c8c70ca5cfcf6d5e0da9ae697762.exe 14 PID 2224 wrote to memory of 2520 2224 2296c8c70ca5cfcf6d5e0da9ae697762.exe 14 PID 2224 wrote to memory of 2520 2224 2296c8c70ca5cfcf6d5e0da9ae697762.exe 14 PID 2224 wrote to memory of 2520 2224 2296c8c70ca5cfcf6d5e0da9ae697762.exe 14 PID 2224 wrote to memory of 2520 2224 2296c8c70ca5cfcf6d5e0da9ae697762.exe 14 PID 2224 wrote to memory of 2520 2224 2296c8c70ca5cfcf6d5e0da9ae697762.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\2296c8c70ca5cfcf6d5e0da9ae697762.exe"C:\Users\Admin\AppData\Local\Temp\2296c8c70ca5cfcf6d5e0da9ae697762.exe"1⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2520
-
C:\Users\Admin\AppData\Local\Temp\2296c8c70ca5cfcf6d5e0da9ae697762.exe"C:\Users\Admin\AppData\Local\Temp\2296c8c70ca5cfcf6d5e0da9ae697762.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2224
-
C:\Users\Admin\AppData\Local\Temp\2296c8c70ca5cfcf6d5e0da9ae697762.exe"C:\Users\Admin\AppData\Local\Temp\2296c8c70ca5cfcf6d5e0da9ae697762.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5b01d2b9a44796a3ebe1901c8e6b3b555
SHA1aa61156b30dbb381fb9acaacb046e14641a46202
SHA2564772a79a22439b608822d2d1d29f29b3d26dc272b92688e94437bfb45f88c6dd
SHA512bf5628afa126661ce1568052b8aed80bbb70ce8625e0e770dcaa3aa1101a77feaea0e506eb0f11dca4908c70ddb82c6dc626156c2279c7b068f2783316aa2e11
-
Filesize
388KB
MD50d846df635664e47aa994e8b9af2b39a
SHA1360fd89a755454e2933da5c007c7b46ff42a414b
SHA256618a7e5df70819cf0d5b553ef0e6a828af6ef34d6f5e965e7beb04ac68af76f2
SHA5124b0a3e3269436782f2d218f23ae321217cbf8eeaa510aaece65aac372c135d38d8fa59a27643ce5ec038f47cacae9319188bf4636df53672a263064d49e1b791
-
Filesize
92KB
MD5431edfb5dce723ff3a6f8a0ac3831f26
SHA1bdc59d1852b0e4baddc4d6d3784f2803c8a57a52
SHA25623cae3e0205983e2c83ad0c94073d45ef58f2785fc6a774887aad77fdc5e09b3
SHA512df51b1c586e46b8b7d433e2d1cb5f42594bc8a40815303d0ef4e39943dc0203c0749b644db4d23062b25e6e8c9c518d194319ebb941c51df24dce3b504cb5958