Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 03:47
Static task
static1
Behavioral task
behavioral1
Sample
5197fea6dd68898e6eb71dbd514bd944.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5197fea6dd68898e6eb71dbd514bd944.exe
Resource
win10v2004-20231215-en
General
-
Target
5197fea6dd68898e6eb71dbd514bd944.exe
-
Size
25KB
-
MD5
5197fea6dd68898e6eb71dbd514bd944
-
SHA1
442031bdf156a69468e87b33cf79851408868d23
-
SHA256
eb0e55768697855cf00a2c66e3dbae4b5dbffe5d0fc90a26f93648e68ccb28b5
-
SHA512
a885adf7fd05bb9a20b892df35c2110427776e4e51c882279101772b3cfbb510d5b599bd99ae11dea6331367b9411332f79d22d87de969085848f2059dbde7ae
-
SSDEEP
384:x/0rrQwc35G9rGWTTw33yqP5i2F5WvVFZksAi2q8:Src9sGKcHlNCz2q
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3032 irun4.exe -
Loads dropped DLL 2 IoCs
pid Process 2688 5197fea6dd68898e6eb71dbd514bd944.exe 2688 5197fea6dd68898e6eb71dbd514bd944.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\irun4.exe 5197fea6dd68898e6eb71dbd514bd944.exe File opened for modification C:\Windows\SysWOW64\irun4.exe 5197fea6dd68898e6eb71dbd514bd944.exe File created C:\Windows\SysWOW64\irun4.exe irun4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2688 5197fea6dd68898e6eb71dbd514bd944.exe 3032 irun4.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2688 wrote to memory of 3032 2688 5197fea6dd68898e6eb71dbd514bd944.exe 29 PID 2688 wrote to memory of 3032 2688 5197fea6dd68898e6eb71dbd514bd944.exe 29 PID 2688 wrote to memory of 3032 2688 5197fea6dd68898e6eb71dbd514bd944.exe 29 PID 2688 wrote to memory of 3032 2688 5197fea6dd68898e6eb71dbd514bd944.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\5197fea6dd68898e6eb71dbd514bd944.exe"C:\Users\Admin\AppData\Local\Temp\5197fea6dd68898e6eb71dbd514bd944.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\irun4.exe"C:\Windows\system32\irun4.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
PID:3032
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD55197fea6dd68898e6eb71dbd514bd944
SHA1442031bdf156a69468e87b33cf79851408868d23
SHA256eb0e55768697855cf00a2c66e3dbae4b5dbffe5d0fc90a26f93648e68ccb28b5
SHA512a885adf7fd05bb9a20b892df35c2110427776e4e51c882279101772b3cfbb510d5b599bd99ae11dea6331367b9411332f79d22d87de969085848f2059dbde7ae