Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
164s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 10:48
Static task
static1
Behavioral task
behavioral1
Sample
688f642f7036801a6295c2aa8a56289b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
688f642f7036801a6295c2aa8a56289b.exe
Resource
win10v2004-20231222-en
General
-
Target
688f642f7036801a6295c2aa8a56289b.exe
-
Size
14KB
-
MD5
688f642f7036801a6295c2aa8a56289b
-
SHA1
672896531f9b4f76cac84f0c78dc507bb5ce5827
-
SHA256
37bacc9a1ec15b4c9590031fc41def16c27c303c6b42c78b36c2ea14712a002a
-
SHA512
5c35c958fa6ae49df657002a589c01b80c50efa601d5d7b296d76ad867256d0d956895975f06e5c3a90d676a750f211159631f945efc1393f3ce17de6ed66293
-
SSDEEP
384:u04Vfdj9JT9uxRgZGz0glhPuDWWx3f1us/:kdfTIvsuC
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\21620 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\msuhxi.exe" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe -
Deletes itself 1 IoCs
pid Process 2796 svchost.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum 688f642f7036801a6295c2aa8a56289b.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 688f642f7036801a6295c2aa8a56289b.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\msuhxi.exe svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1768 688f642f7036801a6295c2aa8a56289b.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1768 688f642f7036801a6295c2aa8a56289b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1768 wrote to memory of 2796 1768 688f642f7036801a6295c2aa8a56289b.exe 19 PID 1768 wrote to memory of 2796 1768 688f642f7036801a6295c2aa8a56289b.exe 19 PID 1768 wrote to memory of 2796 1768 688f642f7036801a6295c2aa8a56289b.exe 19 PID 1768 wrote to memory of 2796 1768 688f642f7036801a6295c2aa8a56289b.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\688f642f7036801a6295c2aa8a56289b.exe"C:\Users\Admin\AppData\Local\Temp\688f642f7036801a6295c2aa8a56289b.exe"1⤵
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\syswow64\svchost.exeC:\Windows\syswow64\svchost.exe2⤵
- Adds policy Run key to start application
- Deletes itself
- Drops file in Program Files directory
PID:2796
-