Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/12/2023, 20:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
f7924ab13c16cf99decbd9d953d9399c.exe
Resource
win7-20231215-en
4 signatures
150 seconds
General
-
Target
f7924ab13c16cf99decbd9d953d9399c.exe
-
Size
1.9MB
-
MD5
f7924ab13c16cf99decbd9d953d9399c
-
SHA1
4d60e2936f8c13cb48175613071f923d1a23bc03
-
SHA256
f4c243c8fd76d9bb68f092ca038ee9eee6ff38033a5baed6065d617c8ce4bb53
-
SHA512
051e50682b3d1592f840b749ffcb773570fa8f144f349013e7d091c948f61c49d6bc6b84cc11e59b259b4f0ca0e3607b6ad85e90d196a5d82e20b20c510b0452
-
SSDEEP
49152:+08pEKXcPTC7WHI1xoA7xU81kHR6gWakurxp9U:+08pEQce7Wo1T
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 3040 f7924ab13c16cf99decbd9d953d9399c.exe 3040 f7924ab13c16cf99decbd9d953d9399c.exe 3040 f7924ab13c16cf99decbd9d953d9399c.exe 3040 f7924ab13c16cf99decbd9d953d9399c.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA f7924ab13c16cf99decbd9d953d9399c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1520 wrote to memory of 2036 1520 f7924ab13c16cf99decbd9d953d9399c.exe 16 PID 1520 wrote to memory of 2036 1520 f7924ab13c16cf99decbd9d953d9399c.exe 16 PID 1520 wrote to memory of 2036 1520 f7924ab13c16cf99decbd9d953d9399c.exe 16 PID 1520 wrote to memory of 2036 1520 f7924ab13c16cf99decbd9d953d9399c.exe 16 PID 1520 wrote to memory of 2036 1520 f7924ab13c16cf99decbd9d953d9399c.exe 16 PID 1520 wrote to memory of 2036 1520 f7924ab13c16cf99decbd9d953d9399c.exe 16 PID 1520 wrote to memory of 2036 1520 f7924ab13c16cf99decbd9d953d9399c.exe 16 PID 2036 wrote to memory of 3040 2036 f7924ab13c16cf99decbd9d953d9399c.exe 17 PID 2036 wrote to memory of 3040 2036 f7924ab13c16cf99decbd9d953d9399c.exe 17 PID 2036 wrote to memory of 3040 2036 f7924ab13c16cf99decbd9d953d9399c.exe 17 PID 2036 wrote to memory of 3040 2036 f7924ab13c16cf99decbd9d953d9399c.exe 17 PID 2036 wrote to memory of 3040 2036 f7924ab13c16cf99decbd9d953d9399c.exe 17 PID 2036 wrote to memory of 3040 2036 f7924ab13c16cf99decbd9d953d9399c.exe 17 PID 2036 wrote to memory of 3040 2036 f7924ab13c16cf99decbd9d953d9399c.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7924ab13c16cf99decbd9d953d9399c.exe"C:\Users\Admin\AppData\Local\Temp\f7924ab13c16cf99decbd9d953d9399c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\f7924ab13c16cf99decbd9d953d9399c.exe"C:\Users\Admin\AppData\Local\Temp\f7924ab13c16cf99decbd9d953d9399c.exe"2⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3040
-
-
C:\Users\Admin\AppData\Local\Temp\f7924ab13c16cf99decbd9d953d9399c.exe"C:\Users\Admin\AppData\Local\Temp\f7924ab13c16cf99decbd9d953d9399c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1520