Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 22:35
Static task
static1
Behavioral task
behavioral1
Sample
05c3072c5af72f61686f0a9d8bd9661b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
05c3072c5af72f61686f0a9d8bd9661b.exe
Resource
win10v2004-20231215-en
General
-
Target
05c3072c5af72f61686f0a9d8bd9661b.exe
-
Size
446KB
-
MD5
05c3072c5af72f61686f0a9d8bd9661b
-
SHA1
8766bb71a8c01fc54e5993db89f8bb10559eb3aa
-
SHA256
8e09b38ae36b323e544691cad85e3b633d05606183b8668936204ca36d44b125
-
SHA512
bf8938a548c76766a48c97d39ac213647991ce8910aae9edbd9f55519eb25edb62a595304b43f09de7d623abf1003334ec7b17628f0480f763780e967506ea2c
-
SSDEEP
6144:5ZunObR8sVImcyYC5Jfz3jzB8kOQIq+3mxkyJIrC+J/pbKvCB23xqy7uXhY7pOKv:WK+mzH/6Y+4hupHQYyqXh6ZyDlaLsiTH
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2276 loadwg.exe 2752 xyqjwg.exe -
Loads dropped DLL 7 IoCs
pid Process 2448 05c3072c5af72f61686f0a9d8bd9661b.exe 2448 05c3072c5af72f61686f0a9d8bd9661b.exe 2276 loadwg.exe 2276 loadwg.exe 2296 WerFault.exe 2296 WerFault.exe 2296 WerFault.exe -
resource yara_rule behavioral1/files/0x000e0000000122e0-7.dat upx behavioral1/files/0x000e0000000122e0-17.dat upx behavioral1/memory/2276-16-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral1/memory/2276-26-0x0000000000400000-0x00000000004AC000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2276-26-0x0000000000400000-0x00000000004AC000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2296 2752 WerFault.exe 30 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2276 loadwg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2276 loadwg.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2448 wrote to memory of 2276 2448 05c3072c5af72f61686f0a9d8bd9661b.exe 28 PID 2448 wrote to memory of 2276 2448 05c3072c5af72f61686f0a9d8bd9661b.exe 28 PID 2448 wrote to memory of 2276 2448 05c3072c5af72f61686f0a9d8bd9661b.exe 28 PID 2448 wrote to memory of 2276 2448 05c3072c5af72f61686f0a9d8bd9661b.exe 28 PID 2276 wrote to memory of 2752 2276 loadwg.exe 30 PID 2276 wrote to memory of 2752 2276 loadwg.exe 30 PID 2276 wrote to memory of 2752 2276 loadwg.exe 30 PID 2276 wrote to memory of 2752 2276 loadwg.exe 30 PID 2752 wrote to memory of 2296 2752 xyqjwg.exe 31 PID 2752 wrote to memory of 2296 2752 xyqjwg.exe 31 PID 2752 wrote to memory of 2296 2752 xyqjwg.exe 31 PID 2752 wrote to memory of 2296 2752 xyqjwg.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\05c3072c5af72f61686f0a9d8bd9661b.exe"C:\Users\Admin\AppData\Local\Temp\05c3072c5af72f61686f0a9d8bd9661b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\loadwg.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\loadwg.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\xyqjwg.exexyqjwg.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 364⤵
- Loads dropped DLL
- Program crash
PID:2296
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD53c9e4e6f50dd23f58d4f02bc9721e4c7
SHA19cd1e2f22a9ceca27c00157e4577b5a1d03f4119
SHA2562ef4c3f2a93369d3812d20db2c002405e0eb1df5a6c649bd69e6a3cb2a100305
SHA512906da2819da1a2df33524471e647192a019044a327b2e5f692917c4c89559011aed5f1c836fc5c222a3aa36d07e98c4061350033cc8fcabfc1e992aae77c63ff
-
Filesize
334KB
MD5bae3eb4767317ba6eb0805347f32c66c
SHA1644ae6e107658e478f15dfce652fcb0e4e493af6
SHA256a982cdae025294cc536d2d429205151e6934dd54b2850af220bed6f58f4c1dfb
SHA51201ce521798e583be251839f53397b104b35aec8800e282496196824163138efc866f553805c330bdf5653b16c215eafb07a0ea08a0fb122a28f0d4d72298160e