Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 23:21
Static task
static1
Behavioral task
behavioral1
Sample
1fd8180ec205daa3b04d0c717317e09d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1fd8180ec205daa3b04d0c717317e09d.exe
Resource
win10v2004-20231215-en
General
-
Target
1fd8180ec205daa3b04d0c717317e09d.exe
-
Size
40KB
-
MD5
1fd8180ec205daa3b04d0c717317e09d
-
SHA1
0c53f50044424c337cd6ea506824c33fbc88bc56
-
SHA256
af580ef64c6119dbf780556ed6ccfbad172797243e93025166f9b7cb1d4c02b9
-
SHA512
063321b025cae58382dfb67cb60f58576666e872538a33ca370d33ad12f60629f1f14e3242149a3638ca5ba2b4ae1ae29e6b5329aa0c7dae72a622b409e79c20
-
SSDEEP
768:aq9m/ZsybSg2ts4L3RLc/qjhsKmHbk1+qJ0UtHeFJS:aqk/Zdic/qjh8w19JDHiS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2376 services.exe -
resource yara_rule behavioral1/files/0x0009000000012270-7.dat upx behavioral1/memory/2088-4-0x0000000000220000-0x0000000000228000-memory.dmp upx behavioral1/memory/2376-11-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2376-17-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2376-23-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2376-27-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2376-28-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2376-32-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2376-36-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2376-37-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2376-50-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2376-58-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2376-59-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2376-63-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2376-67-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2376-68-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2376-72-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 1fd8180ec205daa3b04d0c717317e09d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe 1fd8180ec205daa3b04d0c717317e09d.exe File opened for modification C:\Windows\java.exe 1fd8180ec205daa3b04d0c717317e09d.exe File created C:\Windows\java.exe 1fd8180ec205daa3b04d0c717317e09d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2376 2088 1fd8180ec205daa3b04d0c717317e09d.exe 28 PID 2088 wrote to memory of 2376 2088 1fd8180ec205daa3b04d0c717317e09d.exe 28 PID 2088 wrote to memory of 2376 2088 1fd8180ec205daa3b04d0c717317e09d.exe 28 PID 2088 wrote to memory of 2376 2088 1fd8180ec205daa3b04d0c717317e09d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fd8180ec205daa3b04d0c717317e09d.exe"C:\Users\Admin\AppData\Local\Temp\1fd8180ec205daa3b04d0c717317e09d.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2376
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD5ffed7b035deffb18071ea9ee4eba1e5f
SHA19391b99cc0daa5ed60395d2b3f5e6a5a50fbd95e
SHA2561813373ac2ecbd457de29316e172942288194e0a20d2937b24bcedfbdea189f6
SHA5122ea26f04690b10678791906be0278e90ae83c346504f197c0285267eb76e03375fea29f6b75e8d2504c6c12c5bc02fb910d6dd5374c383fb47953bf672d130e8
-
Filesize
1KB
MD5d3412cb9205371483438151f96ffe00d
SHA152d8d0382d1185fd4dfdefb6862ced01f70ce51c
SHA256b91acbef416a566a6cdfcb67f90279747f72bf5c03df8a805b4b6232d1558e2d
SHA512fc1fb85423a666dbc4002ac872b09549b965ba17f43397c497662514b5b888b86d3b87ca1a1b63a12508f85dc1755cc8b1941ec9736fdab7f8c76747eece6c18
-
Filesize
1KB
MD5d634e12d43a9e359208ac53a568e3028
SHA1e41b40921644e452af213a4a74090a00c8bfebcc
SHA2562101b06953f72bd961b072f09d602774bf990ae2cb7a752b3e0950faae34603e
SHA512ceea8e1eb8833ce48eb93175d81110ceb443e1103a26f692d44c565a050133d5b1d8ba904556b7249f686c425a15fceeaefb55e82fa869e3746cf2a3364822c2
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2