Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
196s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 01:01
Static task
static1
Behavioral task
behavioral1
Sample
09614e70ccc217403b852420ff7c9a94.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
09614e70ccc217403b852420ff7c9a94.exe
Resource
win10v2004-20231215-en
General
-
Target
09614e70ccc217403b852420ff7c9a94.exe
-
Size
402KB
-
MD5
09614e70ccc217403b852420ff7c9a94
-
SHA1
e8a5691810a49873d4bdccf6776510a2db6c17d4
-
SHA256
a8e2a996c913eb390bd0074d461a97156ad7395ae5ca856c2a6e6c14be534e2d
-
SHA512
d51c22dd923b2733c60d8e185f64e45a34158119852e721bfdae80e893e8c1d779063bc2a84c2cb593bd05dcc64f1bf47da32bdd903eb8b5976c058d1995afc7
-
SSDEEP
6144:lw/1POelIqtW+YPjXbs0CsgEn4yr2BdjRbv2ixvD3OR6DF7DSeFr7knGyHM:lw/1PmPLssgETrA5Rl66VS+I
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2612 33A2E4F0.exe -
Loads dropped DLL 2 IoCs
pid Process 1788 09614e70ccc217403b852420ff7c9a94.exe 1788 09614e70ccc217403b852420ff7c9a94.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\{7C046CF8-759C-4301-A95C-2D5FD8AD23DE} = "C:\\ProgramData\\{1D7BD5EC-1EA9-44E8-9114-08DDFBD26AB9}\\33A2E4F0.exe" 09614e70ccc217403b852420ff7c9a94.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\{7C046CF8-759C-4301-A95C-2D5FD8AD23DE} = "C:\\ProgramData\\{1D7BD5EC-1EA9-44E8-9114-08DDFBD26AB9}\\33A2E4F0.exe" 09614e70ccc217403b852420ff7c9a94.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1788 wrote to memory of 2612 1788 09614e70ccc217403b852420ff7c9a94.exe 29 PID 1788 wrote to memory of 2612 1788 09614e70ccc217403b852420ff7c9a94.exe 29 PID 1788 wrote to memory of 2612 1788 09614e70ccc217403b852420ff7c9a94.exe 29 PID 1788 wrote to memory of 2612 1788 09614e70ccc217403b852420ff7c9a94.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\09614e70ccc217403b852420ff7c9a94.exe"C:\Users\Admin\AppData\Local\Temp\09614e70ccc217403b852420ff7c9a94.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\ProgramData\{1D7BD5EC-1EA9-44E8-9114-08DDFBD26AB9}\33A2E4F0.exe"C:\ProgramData\{1D7BD5EC-1EA9-44E8-9114-08DDFBD26AB9}\33A2E4F0.exe"2⤵
- Executes dropped EXE
PID:2612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
281KB
MD5fcb66e9debc048e6a16505d1599c553d
SHA104fa2fac2e3b4ee3bc5cd5eab5c25f0c203d1d9f
SHA2561e8d0a2d65713ca9b667cbebeefdf517f1ea8b25185c647c2d879652ec489739
SHA51218d040616b7810661cbce1b5d675764922f775b693e10df894e41bdeadddcee35cff341c092665925f27c727be5ff67e22013f620dcbe3f6c74eaac8e3753395
-
Filesize
273KB
MD5854b5d027a671b429463d178d469b068
SHA190cc9c0221602a54c972130031101af33e8a93ab
SHA256f2600361a683197e1dd0a616b4a0056eb6c2739ba08e382dd86b0b6336884f74
SHA5127f2cb321966e2e2d17a069f8ef2a89315bc291087ecf0365ffbc7bb19848fe39da0bdd6199dcdeef66d5cd762f6b0d8cea2e923e202a04fbac6865f33c0a4b0a
-
Filesize
140B
MD57a6cbef7be65263118e3d87e1156df64
SHA143088af10901409b2d8f2235a1f3f0d900ac7046
SHA2560f63a150adc323fa90ed1a312250edb34def2e9b29ba7103de7e77c54c12f683
SHA512be22c7fd78c7dd4976cfac4515f127bf4eb8ff4e23a8fa8e3db89a76309646064578542d73a249420f1c11d69f394420525d1a0d4b209bf19cadb6283dd9d754
-
Filesize
402KB
MD509614e70ccc217403b852420ff7c9a94
SHA1e8a5691810a49873d4bdccf6776510a2db6c17d4
SHA256a8e2a996c913eb390bd0074d461a97156ad7395ae5ca856c2a6e6c14be534e2d
SHA512d51c22dd923b2733c60d8e185f64e45a34158119852e721bfdae80e893e8c1d779063bc2a84c2cb593bd05dcc64f1bf47da32bdd903eb8b5976c058d1995afc7
-
Filesize
297KB
MD52fbb1b60b77af4dc29930e9afb89497d
SHA16c06eb01c1fb26a0c1abc3a50beec14b1ce6c7df
SHA2561e3cdaa007e0c392f95e81506dbd7904d8d90538a1057824bb2c76e1fff763af
SHA512cbbe5bc2d230437cb84d3f64d16e56f16ff6c76654903cc80e36ab02689cd95d733180f3b03a6d63390c79ba327ce9fd41b8324fb96ce303e0abfd3d74428bb9