Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
128s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 22:06
Behavioral task
behavioral1
Sample
1df8ecd94b5721a28f8b7635da46ad0e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1df8ecd94b5721a28f8b7635da46ad0e.exe
Resource
win10v2004-20231215-en
General
-
Target
1df8ecd94b5721a28f8b7635da46ad0e.exe
-
Size
9KB
-
MD5
1df8ecd94b5721a28f8b7635da46ad0e
-
SHA1
2710fcb134722668b90380c23847f1768fbfa4d9
-
SHA256
9de85184927cb1192999e987cb750ace31fdb79fd467a730794ca930777ed187
-
SHA512
e899447aec1e4850a7652b4a7dfa959134d649ad916437999e4f48b16afc70597869e3a93dcfe70a7578c892e9af08ee38388e09e312d5a18c0c290086d691a4
-
SSDEEP
192:L3ADaFjOr2FNsVp1kc1JdYbwpWtqdpxbTMvQFs4:LQDVy0MctdSqP18QFl
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2884 cmd.exe -
resource yara_rule behavioral1/memory/2000-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral1/memory/2000-1-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\videoPl.chl\CLSID 1df8ecd94b5721a28f8b7635da46ad0e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\videoPl.chl 1df8ecd94b5721a28f8b7635da46ad0e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\videoPl.chl\CLSID\ = "{6BF52A52-394A-11D3-B153-00C04F79FAA6}" 1df8ecd94b5721a28f8b7635da46ad0e.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2000 wrote to memory of 1052 2000 1df8ecd94b5721a28f8b7635da46ad0e.exe 28 PID 2000 wrote to memory of 1052 2000 1df8ecd94b5721a28f8b7635da46ad0e.exe 28 PID 2000 wrote to memory of 1052 2000 1df8ecd94b5721a28f8b7635da46ad0e.exe 28 PID 2000 wrote to memory of 1052 2000 1df8ecd94b5721a28f8b7635da46ad0e.exe 28 PID 2000 wrote to memory of 2884 2000 1df8ecd94b5721a28f8b7635da46ad0e.exe 32 PID 2000 wrote to memory of 2884 2000 1df8ecd94b5721a28f8b7635da46ad0e.exe 32 PID 2000 wrote to memory of 2884 2000 1df8ecd94b5721a28f8b7635da46ad0e.exe 32 PID 2000 wrote to memory of 2884 2000 1df8ecd94b5721a28f8b7635da46ad0e.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\1df8ecd94b5721a28f8b7635da46ad0e.exe"C:\Users\Admin\AppData\Local\Temp\1df8ecd94b5721a28f8b7635da46ad0e.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\ctfmon.exectfmon.exe2⤵PID:1052
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\awer0.bat" "2⤵
- Deletes itself
PID:2884
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274B
MD5f7a80b7afd523473b614f07e0db5814b
SHA197a0068efb86c66e7b5c0d3997fbc894ec11779e
SHA2565f16275d691c577e8164a8f1ccae555a150773db3cad0a600aa418fedfe08504
SHA5122ed1fbe9c329ac26363a96ed6ee5b40e2d0fcc02667dfd683322ffe95be879e4d5113cbf79ae72cba6e5be9687511f04181bb94efe449fa30d61cc458691c48e