Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 23:01
Static task
static1
Behavioral task
behavioral1
Sample
065efcc8172fbdc6916d65d77b101ec6.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
065efcc8172fbdc6916d65d77b101ec6.exe
Resource
win10v2004-20231222-en
General
-
Target
065efcc8172fbdc6916d65d77b101ec6.exe
-
Size
71KB
-
MD5
065efcc8172fbdc6916d65d77b101ec6
-
SHA1
41c7a0880e231c04c7ee3e0e0244f95b721ce395
-
SHA256
24db0cfa7e369fc21ea6237fdd2a3f484c6674d6a91af7e34e7da77a2b64f332
-
SHA512
fbcf98d643d456b990d055e0150477c7f2d2b7743d98ecbcf2f8371fb9e39c543dbc6c56914ab31067b013751ee0fe36183f04d4dcf72486071dc9fe5bcf2e28
-
SSDEEP
1536:jXPc908oY7rpn3SEbu2zBBls7qCMOt+WYjdy4As3EM:jX/YfOWCMqYxys3b
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 2408 wxperyt32.exe 2756 wxperyt32.exe 2172 wxperyt32.exe 2732 wxperyt32.exe 2876 wxperyt32.exe 2072 wxperyt32.exe -
Loads dropped DLL 12 IoCs
pid Process 780 065efcc8172fbdc6916d65d77b101ec6.exe 780 065efcc8172fbdc6916d65d77b101ec6.exe 2408 wxperyt32.exe 2408 wxperyt32.exe 2756 wxperyt32.exe 2756 wxperyt32.exe 2172 wxperyt32.exe 2172 wxperyt32.exe 2732 wxperyt32.exe 2732 wxperyt32.exe 2876 wxperyt32.exe 2876 wxperyt32.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\wxperyt32.exe wxperyt32.exe File created C:\Windows\SysWOW64\wxperyt32.exe wxperyt32.exe File created C:\Windows\SysWOW64\wxperyt32.exe wxperyt32.exe File created C:\Windows\SysWOW64\wxperyt32.exe wxperyt32.exe File created C:\Windows\SysWOW64\wxperyt32.exe wxperyt32.exe File created C:\Windows\SysWOW64\wxperyt32.exe 065efcc8172fbdc6916d65d77b101ec6.exe File opened for modification C:\Windows\SysWOW64\wxperyt32.exe 065efcc8172fbdc6916d65d77b101ec6.exe -
Suspicious behavior: EnumeratesProcesses 45 IoCs
pid Process 780 065efcc8172fbdc6916d65d77b101ec6.exe 780 065efcc8172fbdc6916d65d77b101ec6.exe 780 065efcc8172fbdc6916d65d77b101ec6.exe 780 065efcc8172fbdc6916d65d77b101ec6.exe 780 065efcc8172fbdc6916d65d77b101ec6.exe 780 065efcc8172fbdc6916d65d77b101ec6.exe 780 065efcc8172fbdc6916d65d77b101ec6.exe 2408 wxperyt32.exe 2408 wxperyt32.exe 2408 wxperyt32.exe 2408 wxperyt32.exe 2408 wxperyt32.exe 2408 wxperyt32.exe 2408 wxperyt32.exe 2756 wxperyt32.exe 2756 wxperyt32.exe 2756 wxperyt32.exe 2756 wxperyt32.exe 2756 wxperyt32.exe 2756 wxperyt32.exe 2756 wxperyt32.exe 2756 wxperyt32.exe 2172 wxperyt32.exe 2172 wxperyt32.exe 2172 wxperyt32.exe 2172 wxperyt32.exe 2172 wxperyt32.exe 2172 wxperyt32.exe 2172 wxperyt32.exe 2732 wxperyt32.exe 2732 wxperyt32.exe 2732 wxperyt32.exe 2732 wxperyt32.exe 2732 wxperyt32.exe 2732 wxperyt32.exe 2732 wxperyt32.exe 2732 wxperyt32.exe 2876 wxperyt32.exe 2876 wxperyt32.exe 2876 wxperyt32.exe 2876 wxperyt32.exe 2876 wxperyt32.exe 2876 wxperyt32.exe 2876 wxperyt32.exe 2876 wxperyt32.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 780 wrote to memory of 2408 780 065efcc8172fbdc6916d65d77b101ec6.exe 28 PID 780 wrote to memory of 2408 780 065efcc8172fbdc6916d65d77b101ec6.exe 28 PID 780 wrote to memory of 2408 780 065efcc8172fbdc6916d65d77b101ec6.exe 28 PID 780 wrote to memory of 2408 780 065efcc8172fbdc6916d65d77b101ec6.exe 28 PID 2408 wrote to memory of 2756 2408 wxperyt32.exe 29 PID 2408 wrote to memory of 2756 2408 wxperyt32.exe 29 PID 2408 wrote to memory of 2756 2408 wxperyt32.exe 29 PID 2408 wrote to memory of 2756 2408 wxperyt32.exe 29 PID 2756 wrote to memory of 2172 2756 wxperyt32.exe 32 PID 2756 wrote to memory of 2172 2756 wxperyt32.exe 32 PID 2756 wrote to memory of 2172 2756 wxperyt32.exe 32 PID 2756 wrote to memory of 2172 2756 wxperyt32.exe 32 PID 2172 wrote to memory of 2732 2172 wxperyt32.exe 33 PID 2172 wrote to memory of 2732 2172 wxperyt32.exe 33 PID 2172 wrote to memory of 2732 2172 wxperyt32.exe 33 PID 2172 wrote to memory of 2732 2172 wxperyt32.exe 33 PID 2732 wrote to memory of 2876 2732 wxperyt32.exe 34 PID 2732 wrote to memory of 2876 2732 wxperyt32.exe 34 PID 2732 wrote to memory of 2876 2732 wxperyt32.exe 34 PID 2732 wrote to memory of 2876 2732 wxperyt32.exe 34 PID 2876 wrote to memory of 2072 2876 wxperyt32.exe 35 PID 2876 wrote to memory of 2072 2876 wxperyt32.exe 35 PID 2876 wrote to memory of 2072 2876 wxperyt32.exe 35 PID 2876 wrote to memory of 2072 2876 wxperyt32.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\065efcc8172fbdc6916d65d77b101ec6.exe"C:\Users\Admin\AppData\Local\Temp\065efcc8172fbdc6916d65d77b101ec6.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SysWOW64\wxperyt32.exeC:\Windows\system32\wxperyt32.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\wxperyt32.exeC:\Windows\system32\wxperyt32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\wxperyt32.exeC:\Windows\system32\wxperyt32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\wxperyt32.exeC:\Windows\system32\wxperyt32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\wxperyt32.exeC:\Windows\system32\wxperyt32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\wxperyt32.exeC:\Windows\system32\wxperyt32.exe7⤵
- Executes dropped EXE
PID:2072
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD5065efcc8172fbdc6916d65d77b101ec6
SHA141c7a0880e231c04c7ee3e0e0244f95b721ce395
SHA25624db0cfa7e369fc21ea6237fdd2a3f484c6674d6a91af7e34e7da77a2b64f332
SHA512fbcf98d643d456b990d055e0150477c7f2d2b7743d98ecbcf2f8371fb9e39c543dbc6c56914ab31067b013751ee0fe36183f04d4dcf72486071dc9fe5bcf2e28