Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
166s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 01:42
Static task
static1
Behavioral task
behavioral1
Sample
4a269b285b6ba3c79a86d7dcb3ae1a05.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4a269b285b6ba3c79a86d7dcb3ae1a05.exe
Resource
win10v2004-20231215-en
General
-
Target
4a269b285b6ba3c79a86d7dcb3ae1a05.exe
-
Size
46KB
-
MD5
4a269b285b6ba3c79a86d7dcb3ae1a05
-
SHA1
054981ae343fb8a936896856862bda893eacd9f1
-
SHA256
47c5785c14b34c6bb73de886811e0d3386136cab8d98d0e300a22a66920039dc
-
SHA512
f00d292e4c8980cf24afe08d0daf37c377497f5c25992f91e844769c9b8ded6e62d52e2b628b53801320ff8b6b55fb1a5f3c4c41236550e0243ead64997d1a2d
-
SSDEEP
768:IgknZ3k0JR46pX2NNb0ERPDB0EUXSUBO6jM0WcKkF/sZDvKsfs:If7RFpXa0EB0zi6+cnWL
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 4a269b285b6ba3c79a86d7dcb3ae1a05.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Driver Setup = "C:\\Windows\\wrdrive32.exe" 4a269b285b6ba3c79a86d7dcb3ae1a05.exe -
Executes dropped EXE 1 IoCs
pid Process 2160 wrdrive32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Driver Setup = "C:\\Windows\\wrdrive32.exe" 4a269b285b6ba3c79a86d7dcb3ae1a05.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\wrdrive32.exe 4a269b285b6ba3c79a86d7dcb3ae1a05.exe File opened for modification C:\Windows\wrdrive32.exe 4a269b285b6ba3c79a86d7dcb3ae1a05.exe File created C:\Windows\%windir%\lfffile32.log wrdrive32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2188 4a269b285b6ba3c79a86d7dcb3ae1a05.exe 2188 4a269b285b6ba3c79a86d7dcb3ae1a05.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2160 2188 4a269b285b6ba3c79a86d7dcb3ae1a05.exe 28 PID 2188 wrote to memory of 2160 2188 4a269b285b6ba3c79a86d7dcb3ae1a05.exe 28 PID 2188 wrote to memory of 2160 2188 4a269b285b6ba3c79a86d7dcb3ae1a05.exe 28 PID 2188 wrote to memory of 2160 2188 4a269b285b6ba3c79a86d7dcb3ae1a05.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a269b285b6ba3c79a86d7dcb3ae1a05.exe"C:\Users\Admin\AppData\Local\Temp\4a269b285b6ba3c79a86d7dcb3ae1a05.exe"1⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\wrdrive32.exe"C:\Windows\wrdrive32.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2160
-