Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 15:19 UTC
Static task
static1
Behavioral task
behavioral1
Sample
28c444698b7a9dedcb904eb57a5cea7b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
28c444698b7a9dedcb904eb57a5cea7b.exe
Resource
win10v2004-20231215-en
General
-
Target
28c444698b7a9dedcb904eb57a5cea7b.exe
-
Size
40KB
-
MD5
28c444698b7a9dedcb904eb57a5cea7b
-
SHA1
8d6bf88cae8907121a65d14b538e40afee3e4f3b
-
SHA256
d716405069c8a4fc420fb1c74d740700ed4fa4cdb62803e4bd95df02b570e2a0
-
SHA512
351bd4d17da2b25d9844d83d81b99b49dffc233eb8b8ef97a0b74c36f8de4ff7729e43518032cecdac4dec6dfee8827f4096ce2981854dd4eb7fca02e6325f8c
-
SSDEEP
768:aq9m/ZsybSg2ts4L3RLc/qjhsKmHbk1+qJ0UtHoYQSK:aqk/Zdic/qjh8w19JDHoP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2996 services.exe -
resource yara_rule behavioral1/files/0x000d000000012716-7.dat upx behavioral1/memory/2996-11-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2996-17-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2996-23-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2996-27-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2996-28-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2996-32-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2996-36-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2996-37-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2996-41-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2996-45-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2996-46-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2996-50-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2996-54-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2996-72-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2996-75-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 28c444698b7a9dedcb904eb57a5cea7b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe 28c444698b7a9dedcb904eb57a5cea7b.exe File opened for modification C:\Windows\java.exe 28c444698b7a9dedcb904eb57a5cea7b.exe File created C:\Windows\java.exe 28c444698b7a9dedcb904eb57a5cea7b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2996 3048 28c444698b7a9dedcb904eb57a5cea7b.exe 28 PID 3048 wrote to memory of 2996 3048 28c444698b7a9dedcb904eb57a5cea7b.exe 28 PID 3048 wrote to memory of 2996 3048 28c444698b7a9dedcb904eb57a5cea7b.exe 28 PID 3048 wrote to memory of 2996 3048 28c444698b7a9dedcb904eb57a5cea7b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\28c444698b7a9dedcb904eb57a5cea7b.exe"C:\Users\Admin\AppData\Local\Temp\28c444698b7a9dedcb904eb57a5cea7b.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2996
-
Network
-
Remote address:8.8.8.8:53Requestalumni.caltech.eduIN MXResponsealumni.caltech.eduIN MXalumni-caltech-edumail protectionoutlookcom
-
Remote address:8.8.8.8:53Requestalumni-caltech-edu.mail.protection.outlook.comIN AResponsealumni-caltech-edu.mail.protection.outlook.comIN A104.47.66.10alumni-caltech-edu.mail.protection.outlook.comIN A104.47.59.138
-
Remote address:8.8.8.8:53Requestgzip.orgIN MXResponsegzip.orgIN MX�
-
Remote address:8.8.8.8:53Requestgzip.orgIN AResponsegzip.orgIN A85.187.148.2
-
Remote address:8.8.8.8:53Requestalumni.caltech.eduIN AResponsealumni.caltech.eduIN A75.2.70.75alumni.caltech.eduIN A99.83.190.102
-
Remote address:8.8.8.8:53Requestalumni.caltech.eduIN A
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
104 B 2
-
104 B 2
-
52 B 1
-
64 B 126 B 1 1
DNS Request
alumni.caltech.edu
-
92 B 124 B 1 1
DNS Request
alumni-caltech-edu.mail.protection.outlook.com
DNS Response
104.47.66.10104.47.59.138
-
54 B 70 B 1 1
DNS Request
gzip.org
-
54 B 70 B 1 1
DNS Request
gzip.org
DNS Response
85.187.148.2
-
128 B 96 B 2 1
DNS Request
alumni.caltech.edu
DNS Request
alumni.caltech.edu
DNS Response
75.2.70.7599.83.190.102
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5b21a65da20068dac989dfc3f077363b3
SHA1db603b9ae7a68cd6274e480f1b3af9f66cc787f5
SHA2563a4bb0c0d519184bd407960850075426f1e2cedb22d7e13fea088402533e28fd
SHA512e06b4315732aabd495a0b19142bc0a5c7eaeb6e4ca89860bb54a4d770c4b25d457c16f5da6314a5029c54e1dd1a8b19362be1e5a8cc09b34ff214f5b886852dc
-
Filesize
1KB
MD5f3f1f8347d948060f808c73f4b9ec72c
SHA13152d77586043f8e89921127d22a5e1bc0e4ecac
SHA25666efebf2fd48dc98096e2f9471d0be74abded65b5ef44351bfde78269ad30f23
SHA512186cf0499f72783d52d2007f4479b26deeabbd1c053076568fd9c1f399406a28e47677ccdc80ba011feb60f5baf2144bb4524f623d479f59a5cf856420428230
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2