Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 19:02
Static task
static1
Behavioral task
behavioral1
Sample
012755ccc0c4c25632653658c117cc3a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
012755ccc0c4c25632653658c117cc3a.exe
Resource
win10v2004-20231215-en
General
-
Target
012755ccc0c4c25632653658c117cc3a.exe
-
Size
1.5MB
-
MD5
012755ccc0c4c25632653658c117cc3a
-
SHA1
20632a682d1cb5e5a6af8573c46fd2de04bb7747
-
SHA256
cb784822fcaa9dd262d06813105993fcb5d2e4ff1a5c0e129c60d4ca924e0ee0
-
SHA512
feb82c70215bdb39a5d32c1a2cc11f149ee710ceedd3a29a9d154c1481a545f75bea76e5ef30472a4512c7db6df9141a09faac9d04338e48d2e082a0c0639fdf
-
SSDEEP
24576:lqet3SdZ9xauWImtIfQ0d44Et22FcNUbl8R4OvJayv8lsnrKLs+rs4ied6Mp:VkdQSmtNxt2LNH4OvoyCErD+44iU6U
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1980 obadah.exe 2716 obadah.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1980 set thread context of 2716 1980 obadah.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2732 1980 WerFault.exe 28 -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2888 vlc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2716 obadah.exe 2716 obadah.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2888 vlc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2888 vlc.exe Token: SeIncBasePriorityPrivilege 2888 vlc.exe -
Suspicious use of FindShellTrayWindow 56 IoCs
pid Process 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe 2888 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2888 vlc.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2392 wrote to memory of 1980 2392 012755ccc0c4c25632653658c117cc3a.exe 28 PID 2392 wrote to memory of 1980 2392 012755ccc0c4c25632653658c117cc3a.exe 28 PID 2392 wrote to memory of 1980 2392 012755ccc0c4c25632653658c117cc3a.exe 28 PID 2392 wrote to memory of 1980 2392 012755ccc0c4c25632653658c117cc3a.exe 28 PID 1980 wrote to memory of 2716 1980 obadah.exe 29 PID 1980 wrote to memory of 2716 1980 obadah.exe 29 PID 1980 wrote to memory of 2716 1980 obadah.exe 29 PID 1980 wrote to memory of 2716 1980 obadah.exe 29 PID 1980 wrote to memory of 2716 1980 obadah.exe 29 PID 1980 wrote to memory of 2716 1980 obadah.exe 29 PID 2392 wrote to memory of 2888 2392 012755ccc0c4c25632653658c117cc3a.exe 30 PID 2392 wrote to memory of 2888 2392 012755ccc0c4c25632653658c117cc3a.exe 30 PID 2392 wrote to memory of 2888 2392 012755ccc0c4c25632653658c117cc3a.exe 30 PID 2392 wrote to memory of 2888 2392 012755ccc0c4c25632653658c117cc3a.exe 30 PID 1980 wrote to memory of 2732 1980 obadah.exe 31 PID 1980 wrote to memory of 2732 1980 obadah.exe 31 PID 1980 wrote to memory of 2732 1980 obadah.exe 31 PID 1980 wrote to memory of 2732 1980 obadah.exe 31 PID 2716 wrote to memory of 1260 2716 obadah.exe 13 PID 2716 wrote to memory of 1260 2716 obadah.exe 13 PID 2716 wrote to memory of 1260 2716 obadah.exe 13 PID 2716 wrote to memory of 1260 2716 obadah.exe 13
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\012755ccc0c4c25632653658c117cc3a.exe"C:\Users\Admin\AppData\Local\Temp\012755ccc0c4c25632653658c117cc3a.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\obadah.exe"C:\obadah.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\obadah.exeC:\obadah.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 964⤵
- Program crash
PID:2732
-
-
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\ÊäÊÇß ØíÇÒí.wmv"3⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2888
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD5ade2d9fe0cecc4dffbaaf6fced5aeefc
SHA1345023485a17eae171d92cac174151f21530e452
SHA256fccb081986e5cf25e5f7ef9dd7bf9bb1da97f29aed3bdd7f8517f71b1d661c5f
SHA512c1d7238c9c763f8789a9e9a6526de03d73bed45fe4b59a732f92f16956ec9aef849828f59b88b6605d9f131c7d1322a613164c740435989681670568f5a15420
-
Filesize
186KB
MD5840c4aefa23b7823f083dd3892671694
SHA1a8f70f0062b409100decfa3fcfeeadb2edbfc611
SHA256b1ee2f0c786eef3d55859a40fd24c2223cfdc70548e32afb9297133f55866229
SHA51278d2d54a5521812c43ecbe6c9ead11f2ba96ad4f0c8a5a1698992ba84e3a87092d7f12681c8e5718af3663cdfc722cb8cf46bb62b07c1d49737bbd2ff6055796