Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 07:06
Static task
static1
Behavioral task
behavioral1
Sample
5b7876a89a0b0992b831d703c779b128.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5b7876a89a0b0992b831d703c779b128.exe
Resource
win10v2004-20231222-en
General
-
Target
5b7876a89a0b0992b831d703c779b128.exe
-
Size
312KB
-
MD5
5b7876a89a0b0992b831d703c779b128
-
SHA1
ba4f633f961310f07af663e7ec39822710ac9960
-
SHA256
3a1844959cecbc1ea873ba533cadffe609c44fd5d573a3b342204cfdaf7eb664
-
SHA512
96d63c0c977e94d0078c4a02ae2d02eacd62425fb6e741931463e89ec258dc3dbe4148f6ab12f4c77fd48e233356fc6680f24b7c70848cbf4b69d49eba9688de
-
SSDEEP
6144:dC7tRvTlIpr1f+XqO5aOmSGFDbeOjLPmUPgn:+thTlIB1f+55SpNPmU4n
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 5b7876a89a0b0992b831d703c779b128.exe Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" realool.exe -
Executes dropped EXE 1 IoCs
pid Process 2996 realool.exe -
Loads dropped DLL 2 IoCs
pid Process 2392 5b7876a89a0b0992b831d703c779b128.exe 2392 5b7876a89a0b0992b831d703c779b128.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\realool = "C:\\Users\\Admin\\realool.exe /g" realool.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\realool = "C:\\Users\\Admin\\realool.exe /i" realool.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\realool = "C:\\Users\\Admin\\realool.exe /t" realool.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\realool = "C:\\Users\\Admin\\realool.exe /e" realool.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\realool = "C:\\Users\\Admin\\realool.exe /s" realool.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\realool = "C:\\Users\\Admin\\realool.exe /u" realool.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\realool = "C:\\Users\\Admin\\realool.exe /k" realool.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\realool = "C:\\Users\\Admin\\realool.exe /d" realool.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\realool = "C:\\Users\\Admin\\realool.exe /z" realool.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\realool = "C:\\Users\\Admin\\realool.exe /y" realool.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\realool = "C:\\Users\\Admin\\realool.exe /p" realool.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\realool = "C:\\Users\\Admin\\realool.exe /r" realool.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\realool = "C:\\Users\\Admin\\realool.exe /j" realool.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\realool = "C:\\Users\\Admin\\realool.exe /v" realool.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\realool = "C:\\Users\\Admin\\realool.exe /n" realool.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\realool = "C:\\Users\\Admin\\realool.exe /c" realool.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\realool = "C:\\Users\\Admin\\realool.exe /x" realool.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\realool = "C:\\Users\\Admin\\realool.exe /a" realool.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\realool = "C:\\Users\\Admin\\realool.exe /l" realool.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\realool = "C:\\Users\\Admin\\realool.exe /b" realool.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\realool = "C:\\Users\\Admin\\realool.exe /o" realool.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\realool = "C:\\Users\\Admin\\realool.exe /m" realool.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\realool = "C:\\Users\\Admin\\realool.exe /h" realool.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\realool = "C:\\Users\\Admin\\realool.exe /l" 5b7876a89a0b0992b831d703c779b128.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\realool = "C:\\Users\\Admin\\realool.exe /w" realool.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\realool = "C:\\Users\\Admin\\realool.exe /q" realool.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\realool = "C:\\Users\\Admin\\realool.exe /f" realool.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2392 5b7876a89a0b0992b831d703c779b128.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe 2996 realool.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2392 5b7876a89a0b0992b831d703c779b128.exe 2996 realool.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2996 2392 5b7876a89a0b0992b831d703c779b128.exe 28 PID 2392 wrote to memory of 2996 2392 5b7876a89a0b0992b831d703c779b128.exe 28 PID 2392 wrote to memory of 2996 2392 5b7876a89a0b0992b831d703c779b128.exe 28 PID 2392 wrote to memory of 2996 2392 5b7876a89a0b0992b831d703c779b128.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b7876a89a0b0992b831d703c779b128.exe"C:\Users\Admin\AppData\Local\Temp\5b7876a89a0b0992b831d703c779b128.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\realool.exe"C:\Users\Admin\realool.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD5d3bd8d582237927e5ae794e35923ccd0
SHA1655504173a6bcbb002ec4b5b9515d1d7d4a244db
SHA2569d88a99cdc6189f8f0f873f07cd00f53e9e53256f29fc4a6bc8692f5614277af
SHA51269edfdc27127e5abbd10612557eb7a729945fc6b100e372ebc7c77de72fd7efbef7c7f37f49c25b88f3571c6881dd8997cbf64f97b8dc971063b0b5e1f20129a
-
Filesize
92KB
MD59ae01457315669453ec070ae031051c8
SHA178a6b4305ed8130b00346c7220effea90dc20d97
SHA25609d40d959f88badfdfcbc815331decf283520ba8cecbe63e0d78e467bdac6d90
SHA512a0f1cd9bee7b4dfdd1d2863556e874a9adc41c43350fdcd61f10bd03f68c636714d7733d7fd586fda1e38bd0da6462abdd8df8d9260cd0150ea7cfdf3af7f1a5
-
Filesize
312KB
MD53553a7455d3911d86a8a25b297f1e08c
SHA12b245ee6455a2b5b3ca860edc4a8d6132853a987
SHA2563a2526b02310d1befb049376c4343414b03627200b79587edbb65dacf7500c38
SHA5122ade5bddc8f4548d8fe0fdb01abb8193307ddf8d3156d39eb3f4611e89c1907112451ec9fe498cd314950cdd806e0ef281444bdadb31fa4c0431d51d5922e6bd