Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 18:29
Static task
static1
Behavioral task
behavioral1
Sample
007e15d58faf04f5c0875d202e3100e3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
007e15d58faf04f5c0875d202e3100e3.exe
Resource
win10v2004-20231222-en
General
-
Target
007e15d58faf04f5c0875d202e3100e3.exe
-
Size
472KB
-
MD5
007e15d58faf04f5c0875d202e3100e3
-
SHA1
24183532a09212fd86eef5ac6075aefd4045033a
-
SHA256
8681fa89c80160227e61442509fadfdf8e21cb71ef1f1dc652546e8fdc64f6a5
-
SHA512
b083450d5857089c98f3b5bbec343db380758b12089710fe319d67b6a402afb75fb55d7d6336ed0d5278159368bd4e382d85f9ca62e8bf3372b6b99038e72534
-
SSDEEP
12288:TNodBiTI+TpqA6EZO7KUQRZ66z24VZbdrpgrXN2LWzmidN:ZoPD+Tpq3vKU6Z66z24VZbFpgJ2LWzm+
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 007e15d58faf04f5c0875d202e3100e3.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon12.ico 007e15d58faf04f5c0875d202e3100e3.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 007e15d58faf04f5c0875d202e3100e3.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 007e15d58faf04f5c0875d202e3100e3.exe File created C:\Windows\winhash_up.exe 007e15d58faf04f5c0875d202e3100e3.exe File created C:\Windows\SHARE_TEMP\Icon13.ico 007e15d58faf04f5c0875d202e3100e3.exe File opened for modification C:\Windows\winhash_up.exez 007e15d58faf04f5c0875d202e3100e3.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 007e15d58faf04f5c0875d202e3100e3.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 007e15d58faf04f5c0875d202e3100e3.exe File created C:\Windows\bugMAKER.bat 007e15d58faf04f5c0875d202e3100e3.exe File created C:\Windows\winhash_up.exez 007e15d58faf04f5c0875d202e3100e3.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 007e15d58faf04f5c0875d202e3100e3.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 007e15d58faf04f5c0875d202e3100e3.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 007e15d58faf04f5c0875d202e3100e3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1792 wrote to memory of 2676 1792 007e15d58faf04f5c0875d202e3100e3.exe 28 PID 1792 wrote to memory of 2676 1792 007e15d58faf04f5c0875d202e3100e3.exe 28 PID 1792 wrote to memory of 2676 1792 007e15d58faf04f5c0875d202e3100e3.exe 28 PID 1792 wrote to memory of 2676 1792 007e15d58faf04f5c0875d202e3100e3.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\007e15d58faf04f5c0875d202e3100e3.exe"C:\Users\Admin\AppData\Local\Temp\007e15d58faf04f5c0875d202e3100e3.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:2676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD51b6155fa0088abd691dca34ba3fec8b5
SHA10c0ba260f08107999b6ffae04af81f3751a8b030
SHA256e4ac3777403a93f18566a1419f6d948dae9d0e6b36bb27b1eca3c87d30e7105c
SHA5126b40de22dbc800a20f165c0d040ae37a0e94504fc3a3e1051d31eb86fc758c445f1d0096ed82ee2a098ddd3ab235049c08c1187c4dc2936f98083488d13bfba2