Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
123s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 14:57
Static task
static1
Behavioral task
behavioral1
Sample
276c48503f698413f7366d9728b78ddf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
276c48503f698413f7366d9728b78ddf.exe
Resource
win10v2004-20231215-en
General
-
Target
276c48503f698413f7366d9728b78ddf.exe
-
Size
159KB
-
MD5
276c48503f698413f7366d9728b78ddf
-
SHA1
9b48ee94af79d37ce11e60069e114940bfadabc0
-
SHA256
7de519f83fe48681a7c17c868c8d9c7db533904b54b48517218de458ba15d842
-
SHA512
2a57b017abfb1d9d9d407f50c07a76524b3b1d0b1fe252faa15981416d725c107af394d4b2424c6c86cede93a55cc45f84d399e832b40472d069062121cf7077
-
SSDEEP
3072:IXbYCtTUzUxIsAQihedBZF9U+5JWu7l5Tk:4UCtTUzNsHdBZ95J/l6
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2968 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 2116 explorer.exe -
Loads dropped DLL 2 IoCs
pid Process 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Branding\explorer.exe 276c48503f698413f7366d9728b78ddf.exe File opened for modification C:\Windows\Branding\explorer.exe 276c48503f698413f7366d9728b78ddf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe 2204 276c48503f698413f7366d9728b78ddf.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2968 2204 276c48503f698413f7366d9728b78ddf.exe 30 PID 2204 wrote to memory of 2968 2204 276c48503f698413f7366d9728b78ddf.exe 30 PID 2204 wrote to memory of 2968 2204 276c48503f698413f7366d9728b78ddf.exe 30 PID 2204 wrote to memory of 2968 2204 276c48503f698413f7366d9728b78ddf.exe 30 PID 2204 wrote to memory of 2116 2204 276c48503f698413f7366d9728b78ddf.exe 32 PID 2204 wrote to memory of 2116 2204 276c48503f698413f7366d9728b78ddf.exe 32 PID 2204 wrote to memory of 2116 2204 276c48503f698413f7366d9728b78ddf.exe 32 PID 2204 wrote to memory of 2116 2204 276c48503f698413f7366d9728b78ddf.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\276c48503f698413f7366d9728b78ddf.exe"C:\Users\Admin\AppData\Local\Temp\276c48503f698413f7366d9728b78ddf.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" firewall set allowedprogram program = "C:\Windows\Branding\explorer.exe" name = "Explorer" mode = ENABLE scope = ALL profile = ALL2⤵
- Modifies Windows Firewall
PID:2968
-
-
C:\Windows\Branding\explorer.exe"C:\Windows\Branding\explorer.exe" C:\noexistfile.txt2⤵
- Executes dropped EXE
PID:2116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
159KB
MD5276c48503f698413f7366d9728b78ddf
SHA19b48ee94af79d37ce11e60069e114940bfadabc0
SHA2567de519f83fe48681a7c17c868c8d9c7db533904b54b48517218de458ba15d842
SHA5122a57b017abfb1d9d9d407f50c07a76524b3b1d0b1fe252faa15981416d725c107af394d4b2424c6c86cede93a55cc45f84d399e832b40472d069062121cf7077