Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 13:22
Static task
static1
Behavioral task
behavioral1
Sample
720ceb08fa14a227b5194069a5255f15.exe
Resource
win7-20231215-en
General
-
Target
720ceb08fa14a227b5194069a5255f15.exe
-
Size
876KB
-
MD5
720ceb08fa14a227b5194069a5255f15
-
SHA1
50644f2c22328f4b44e0467369ee38f338f8c995
-
SHA256
05f8de50093280c4160daebb573cf0f79bd94cf7a721d1571a1352841213b46f
-
SHA512
fe7fae9ca660ab568c52b608fc303f2854354b89f7c235492a64527eb6e0f524f5af9c3201a916c665b3974d331a967c88bb3ee35fccce3542c0abe2ac7a827f
-
SSDEEP
24576:ePMLKmtvPyHu7btwMy9pNg4W7HM0G3bOAHCHd5:2iKmHyO3tHp7srW
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 2028 720ceb08fa14a227b5194069a5255f15.exe 2028 720ceb08fa14a227b5194069a5255f15.exe 2028 720ceb08fa14a227b5194069a5255f15.exe 2028 720ceb08fa14a227b5194069a5255f15.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 720ceb08fa14a227b5194069a5255f15.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2932 2052 720ceb08fa14a227b5194069a5255f15.exe 28 PID 2052 wrote to memory of 2932 2052 720ceb08fa14a227b5194069a5255f15.exe 28 PID 2052 wrote to memory of 2932 2052 720ceb08fa14a227b5194069a5255f15.exe 28 PID 2052 wrote to memory of 2932 2052 720ceb08fa14a227b5194069a5255f15.exe 28 PID 2052 wrote to memory of 2932 2052 720ceb08fa14a227b5194069a5255f15.exe 28 PID 2052 wrote to memory of 2932 2052 720ceb08fa14a227b5194069a5255f15.exe 28 PID 2052 wrote to memory of 2932 2052 720ceb08fa14a227b5194069a5255f15.exe 28 PID 2932 wrote to memory of 2028 2932 720ceb08fa14a227b5194069a5255f15.exe 29 PID 2932 wrote to memory of 2028 2932 720ceb08fa14a227b5194069a5255f15.exe 29 PID 2932 wrote to memory of 2028 2932 720ceb08fa14a227b5194069a5255f15.exe 29 PID 2932 wrote to memory of 2028 2932 720ceb08fa14a227b5194069a5255f15.exe 29 PID 2932 wrote to memory of 2028 2932 720ceb08fa14a227b5194069a5255f15.exe 29 PID 2932 wrote to memory of 2028 2932 720ceb08fa14a227b5194069a5255f15.exe 29 PID 2932 wrote to memory of 2028 2932 720ceb08fa14a227b5194069a5255f15.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\720ceb08fa14a227b5194069a5255f15.exe"C:\Users\Admin\AppData\Local\Temp\720ceb08fa14a227b5194069a5255f15.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\720ceb08fa14a227b5194069a5255f15.exe"C:\Users\Admin\AppData\Local\Temp\720ceb08fa14a227b5194069a5255f15.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\720ceb08fa14a227b5194069a5255f15.exe"C:\Users\Admin\AppData\Local\Temp\720ceb08fa14a227b5194069a5255f15.exe"3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2028
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD52f427a229b5f025bfbeb7a5465bd14c1
SHA18722a1bb86a7bbb870d5993f353fcba4300d68a8
SHA256b80e0c85913c1af5418d5cf0679e8912b64649f6b19c768775cbd9a850161a48
SHA512d81354c33fe00baef66ad910823a19f68e02b981168e5551e34023d07eb6b3d3504f86e947d99c54e50dd9de2ce67bb52a752246ba09d0ab7342777f8269d113
-
Filesize
5KB
MD544dac7f87bdf94d553f8d2cf073d605d
SHA121bf5d714b9fcab32ba40ff7d36e48c378b67a06
SHA2560e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66
SHA51292c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774
-
Filesize
494KB
MD5f0c59526f8186eadaf2171b8fd2967c1
SHA18ffbe3e03d8139b50b41931c7b3360a0eebdb5cb
SHA2566e35d85fe4365e508adc7faffc4517c29177380c2ba420f02c2b9ee03103d3f6
SHA512dccd287c5f25cac346836e1140b743756178d01cd58539cf8fac12f7ae54d338bfb4364c650edb4d6018ef1f4065f7e9835d32fd608f8ae66c67a0ffd05e9854
-
Filesize
200KB
MD5c22c31c3beaa5d1acd28be22f4ee6cb0
SHA1bdcc3d48170bb17797645d0867fb9f3c431997de
SHA2561d752198bfd87981b9261db291dab32f668d5827fea4e863967fc7bdb00d2c81
SHA512992940106731c0cad1ef41e2f9d8c702608addb6575a151804cc1760bc7762ce79faf93176711e4b8e1b22d3e76d39101184059dfb463508f8585a21da01f8fd