Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 12:43
Static task
static1
Behavioral task
behavioral1
Sample
6f6404f102c6f83554df64bc9be9f2c1.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6f6404f102c6f83554df64bc9be9f2c1.exe
Resource
win10v2004-20231222-en
General
-
Target
6f6404f102c6f83554df64bc9be9f2c1.exe
-
Size
328KB
-
MD5
6f6404f102c6f83554df64bc9be9f2c1
-
SHA1
e96f7382514392b24868d36dd04ed3a75af1475a
-
SHA256
43b0b16378daf16dfa22dc17f6ad57d02dc4018833105fbeb1332ad323c332d7
-
SHA512
4046c58bd4a03e34026f8c637b5e6a6906ba65021b1a60a076436cd71e916b37201bc9b6e9081933b403311f916a97738436b0d64e23e5da581ca7a3930b0ba5
-
SSDEEP
6144:lJ8glSHPNKuJzT1on9UW+K1DUT0Feilsv98gWNlPTGQQm6agrdnMGf:l0VKUT1on7wTvI7NtTirdnV
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 6f6404f102c6f83554df64bc9be9f2c1.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1720 set thread context of 2892 1720 6f6404f102c6f83554df64bc9be9f2c1.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2892 6f6404f102c6f83554df64bc9be9f2c1.exe 2892 6f6404f102c6f83554df64bc9be9f2c1.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2892 1720 6f6404f102c6f83554df64bc9be9f2c1.exe 28 PID 1720 wrote to memory of 2892 1720 6f6404f102c6f83554df64bc9be9f2c1.exe 28 PID 1720 wrote to memory of 2892 1720 6f6404f102c6f83554df64bc9be9f2c1.exe 28 PID 1720 wrote to memory of 2892 1720 6f6404f102c6f83554df64bc9be9f2c1.exe 28 PID 1720 wrote to memory of 2892 1720 6f6404f102c6f83554df64bc9be9f2c1.exe 28 PID 1720 wrote to memory of 2892 1720 6f6404f102c6f83554df64bc9be9f2c1.exe 28 PID 1720 wrote to memory of 2892 1720 6f6404f102c6f83554df64bc9be9f2c1.exe 28 PID 1720 wrote to memory of 2892 1720 6f6404f102c6f83554df64bc9be9f2c1.exe 28 PID 2892 wrote to memory of 1376 2892 6f6404f102c6f83554df64bc9be9f2c1.exe 7 PID 2892 wrote to memory of 1376 2892 6f6404f102c6f83554df64bc9be9f2c1.exe 7 PID 2892 wrote to memory of 1376 2892 6f6404f102c6f83554df64bc9be9f2c1.exe 7 PID 2892 wrote to memory of 1376 2892 6f6404f102c6f83554df64bc9be9f2c1.exe 7
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f6404f102c6f83554df64bc9be9f2c1.exe"C:\Users\Admin\AppData\Local\Temp\6f6404f102c6f83554df64bc9be9f2c1.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\6f6404f102c6f83554df64bc9be9f2c1.exeC:\Users\Admin\AppData\Local\Temp\6f6404f102c6f83554df64bc9be9f2c1.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2892
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1376