Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 15:34
Static task
static1
Behavioral task
behavioral1
Sample
794c2cd8e88015f067e827dfee27151e.exe
Resource
win7-20231129-en
General
-
Target
794c2cd8e88015f067e827dfee27151e.exe
-
Size
874KB
-
MD5
794c2cd8e88015f067e827dfee27151e
-
SHA1
2d8bf5eada2ec2866db0a081ba55eb269d2d59b8
-
SHA256
132bf5cbdd39d79e130edacfef3b7526af223eb3f9978c25fcf9dc9cd80e1c46
-
SHA512
2d253b436787da01b5d754d30f55320f04a0f7a3eb7c874926c335335db9dcc759778b47370ce408da32f1dc3af7db1ea7c3441efa48e1988e56db678574bbe4
-
SSDEEP
24576:gqMLKmtvPyHu7c8v5XsK4y9pNg4W7HMRGlbOAHC6l:RiKmHyOgoHip7sId
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 2928 794c2cd8e88015f067e827dfee27151e.exe 2928 794c2cd8e88015f067e827dfee27151e.exe 2928 794c2cd8e88015f067e827dfee27151e.exe 2928 794c2cd8e88015f067e827dfee27151e.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 794c2cd8e88015f067e827dfee27151e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2896 wrote to memory of 2232 2896 794c2cd8e88015f067e827dfee27151e.exe 28 PID 2896 wrote to memory of 2232 2896 794c2cd8e88015f067e827dfee27151e.exe 28 PID 2896 wrote to memory of 2232 2896 794c2cd8e88015f067e827dfee27151e.exe 28 PID 2896 wrote to memory of 2232 2896 794c2cd8e88015f067e827dfee27151e.exe 28 PID 2896 wrote to memory of 2232 2896 794c2cd8e88015f067e827dfee27151e.exe 28 PID 2896 wrote to memory of 2232 2896 794c2cd8e88015f067e827dfee27151e.exe 28 PID 2896 wrote to memory of 2232 2896 794c2cd8e88015f067e827dfee27151e.exe 28 PID 2232 wrote to memory of 2928 2232 794c2cd8e88015f067e827dfee27151e.exe 29 PID 2232 wrote to memory of 2928 2232 794c2cd8e88015f067e827dfee27151e.exe 29 PID 2232 wrote to memory of 2928 2232 794c2cd8e88015f067e827dfee27151e.exe 29 PID 2232 wrote to memory of 2928 2232 794c2cd8e88015f067e827dfee27151e.exe 29 PID 2232 wrote to memory of 2928 2232 794c2cd8e88015f067e827dfee27151e.exe 29 PID 2232 wrote to memory of 2928 2232 794c2cd8e88015f067e827dfee27151e.exe 29 PID 2232 wrote to memory of 2928 2232 794c2cd8e88015f067e827dfee27151e.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\794c2cd8e88015f067e827dfee27151e.exe"C:\Users\Admin\AppData\Local\Temp\794c2cd8e88015f067e827dfee27151e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\794c2cd8e88015f067e827dfee27151e.exe"C:\Users\Admin\AppData\Local\Temp\794c2cd8e88015f067e827dfee27151e.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\794c2cd8e88015f067e827dfee27151e.exe"C:\Users\Admin\AppData\Local\Temp\794c2cd8e88015f067e827dfee27151e.exe"3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2928
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5e6f4f11534bfeea5f1ae9a6273838864
SHA1f47d053f6eca6bdc6892bb190f0d02ac2dc95eb1
SHA256896cac771311a2edd372ef2555faaaaf93cf2ab5560b2f4a1c38c7308c715659
SHA512d78084db0a336bcb449f2b3d10f57ce98acff68824edb766d622a42764176d27040e7a8dbf5fa7792ccef44abfbe3061dc1120098eb0fb8d42aaa4a81eb8a0b5
-
Filesize
5KB
MD544dac7f87bdf94d553f8d2cf073d605d
SHA121bf5d714b9fcab32ba40ff7d36e48c378b67a06
SHA2560e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66
SHA51292c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774
-
Filesize
494KB
MD5f0c59526f8186eadaf2171b8fd2967c1
SHA18ffbe3e03d8139b50b41931c7b3360a0eebdb5cb
SHA2566e35d85fe4365e508adc7faffc4517c29177380c2ba420f02c2b9ee03103d3f6
SHA512dccd287c5f25cac346836e1140b743756178d01cd58539cf8fac12f7ae54d338bfb4364c650edb4d6018ef1f4065f7e9835d32fd608f8ae66c67a0ffd05e9854
-
Filesize
200KB
MD562884a5609eb622118bc5fad1bb25016
SHA1ef071c600328fe522163b23770a01f51a8cf16ef
SHA256b53a76862c4faf29fc744cac5d7febd316cd00ea0f57db9a0397f26013b8bafe
SHA5125826a95e16765d1aba77c99546f18330cf8a1f9f82f273fcd9d79735331978060872c4bfdcf42280caed201bf21c4d6b855db94d4e8418cc41ec2051f6f6f90c