Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 21:20
Static task
static1
Behavioral task
behavioral1
Sample
3d34cc9393bfa2f4c58ce0ae349d1c8b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3d34cc9393bfa2f4c58ce0ae349d1c8b.exe
Resource
win10v2004-20231215-en
General
-
Target
3d34cc9393bfa2f4c58ce0ae349d1c8b.exe
-
Size
860KB
-
MD5
3d34cc9393bfa2f4c58ce0ae349d1c8b
-
SHA1
d314798fa8c8a6bea3e4ef03fd04fcbeec51dc94
-
SHA256
cd00de3bdb7fc3e3c7c2d384bc63c5c5138032e7a803fcb92ccaa606d6500efc
-
SHA512
80b168efa7c47ac0a8dcb3b0a9c5b1672a845e745bfbbd7d667c738248c743ee21bf65bd70bae272608e3f52649fb1e4430e499d147a9b04080ecf323ff7ab7d
-
SSDEEP
24576:1rX9KZJuzVfT43WtwUwhGQp0l4nTyYOAxpamZQ72:1rXUzuzVLSWeUEGR6TyYDamOK
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2724 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2780 52364525.exe -
Loads dropped DLL 5 IoCs
pid Process 2840 cmd.exe 2840 cmd.exe 2780 52364525.exe 2780 52364525.exe 2780 52364525.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\52364525 = "C:\\ProgramData\\52364525\\52364525.exe" 3d34cc9393bfa2f4c58ce0ae349d1c8b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\52364525 = "C:\\PROGRA~3\\52364525\\52364525.exe" 52364525.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2780 52364525.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 2780 52364525.exe 2780 52364525.exe 2780 52364525.exe 2780 52364525.exe 2780 52364525.exe 2780 52364525.exe 2780 52364525.exe 2780 52364525.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 2780 52364525.exe 2780 52364525.exe 2780 52364525.exe 2780 52364525.exe 2780 52364525.exe 2780 52364525.exe 2780 52364525.exe 2780 52364525.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2724 3000 3d34cc9393bfa2f4c58ce0ae349d1c8b.exe 28 PID 3000 wrote to memory of 2724 3000 3d34cc9393bfa2f4c58ce0ae349d1c8b.exe 28 PID 3000 wrote to memory of 2724 3000 3d34cc9393bfa2f4c58ce0ae349d1c8b.exe 28 PID 3000 wrote to memory of 2724 3000 3d34cc9393bfa2f4c58ce0ae349d1c8b.exe 28 PID 2724 wrote to memory of 2840 2724 cmd.exe 30 PID 2724 wrote to memory of 2840 2724 cmd.exe 30 PID 2724 wrote to memory of 2840 2724 cmd.exe 30 PID 2724 wrote to memory of 2840 2724 cmd.exe 30 PID 2840 wrote to memory of 2780 2840 cmd.exe 31 PID 2840 wrote to memory of 2780 2840 cmd.exe 31 PID 2840 wrote to memory of 2780 2840 cmd.exe 31 PID 2840 wrote to memory of 2780 2840 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d34cc9393bfa2f4c58ce0ae349d1c8b.exe"C:\Users\Admin\AppData\Local\Temp\3d34cc9393bfa2f4c58ce0ae349d1c8b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\ProgramData\52364525\52364525.bat" "2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\cmd.execmd.exe /c start C:\PROGRA~3\52364525\52364525.exe /i3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\PROGRA~3\52364525\52364525.exeC:\PROGRA~3\52364525\52364525.exe /i4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2780
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
230B
MD52262e18b10a7f223f753a1b7839d53a7
SHA1773a0f2a5a0f95fb096c37b9bbcd8ee7cf2ca81b
SHA256d63886903c16c961642e0fe861e4c175f047650e0a17354f1e26ba545d8e6170
SHA5124b04e6aeea04b20015122911117ee66af9704584bc67ed5c2fdc4b663d525c20a0bb9412c361503be9ed8c7ac9cbdbbf1e1d484958690351898a92d765e80af1
-
Filesize
860KB
MD53d34cc9393bfa2f4c58ce0ae349d1c8b
SHA1d314798fa8c8a6bea3e4ef03fd04fcbeec51dc94
SHA256cd00de3bdb7fc3e3c7c2d384bc63c5c5138032e7a803fcb92ccaa606d6500efc
SHA51280b168efa7c47ac0a8dcb3b0a9c5b1672a845e745bfbbd7d667c738248c743ee21bf65bd70bae272608e3f52649fb1e4430e499d147a9b04080ecf323ff7ab7d