Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 01:09
Static task
static1
Behavioral task
behavioral1
Sample
099bad411315767c17e41e04a71f12aa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
099bad411315767c17e41e04a71f12aa.exe
Resource
win10v2004-20231215-en
General
-
Target
099bad411315767c17e41e04a71f12aa.exe
-
Size
129KB
-
MD5
099bad411315767c17e41e04a71f12aa
-
SHA1
464a0a5caa34caba25dbc1c12ebae3f4bfe89b31
-
SHA256
0ecbc8f62fd4ea30522f23f8fdb1f9710a7d9cf4540fda0b63a0a916d8a6ff82
-
SHA512
bdc7707c2ef2e7b289c4d1c91bd7d08e7b014dafe8b330c2bb9040a8ee4fd0d909e89c2caa6ecef11081649ee9ad3a228562766561c2fa30d7e84f75bb9b1242
-
SSDEEP
3072:CGZhLLuMKCRKUlez9ChzkxM74uUz3JTH7ZT9CxGJmcNMpw:POFCRblezMhzz7NUz57ZT9zJN
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2228 cmd.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\sysutils.exe 099bad411315767c17e41e04a71f12aa.exe File opened for modification C:\Windows\SysWOW64\sysutils.exe 099bad411315767c17e41e04a71f12aa.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Debug\sysutils32.dll 099bad411315767c17e41e04a71f12aa.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{14C0A9F9-5512-43BA-87FA-ED4860306453} regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{14C0A9F9-5512-43BA-87FA-ED4860306453}\ = "url" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{14C0A9F9-5512-43BA-87FA-ED4860306453}\InProcServer32 regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{14C0A9F9-5512-43BA-87FA-ED4860306453}\InProcServer32\ = "C:\\Windows\\Debug\\sysutils32.dll" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{14C0A9F9-5512-43BA-87FA-ED4860306453}\InProcServer32\ThreadingModel = "Apartment" regedit.exe -
Runs .reg file with regedit 1 IoCs
pid Process 2688 regedit.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2980 3040 099bad411315767c17e41e04a71f12aa.exe 28 PID 3040 wrote to memory of 2980 3040 099bad411315767c17e41e04a71f12aa.exe 28 PID 3040 wrote to memory of 2980 3040 099bad411315767c17e41e04a71f12aa.exe 28 PID 3040 wrote to memory of 2980 3040 099bad411315767c17e41e04a71f12aa.exe 28 PID 3040 wrote to memory of 2228 3040 099bad411315767c17e41e04a71f12aa.exe 30 PID 3040 wrote to memory of 2228 3040 099bad411315767c17e41e04a71f12aa.exe 30 PID 3040 wrote to memory of 2228 3040 099bad411315767c17e41e04a71f12aa.exe 30 PID 3040 wrote to memory of 2228 3040 099bad411315767c17e41e04a71f12aa.exe 30 PID 2980 wrote to memory of 2688 2980 cmd.exe 31 PID 2980 wrote to memory of 2688 2980 cmd.exe 31 PID 2980 wrote to memory of 2688 2980 cmd.exe 31 PID 2980 wrote to memory of 2688 2980 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\099bad411315767c17e41e04a71f12aa.exe"C:\Users\Admin\AppData\Local\Temp\099bad411315767c17e41e04a71f12aa.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\run1.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\regedit.exeregedit /s C:\Users\Admin\AppData\Local\Temp\s1.reg3⤵
- Modifies registry class
- Runs .reg file with regedit
PID:2688
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c erase /F "C:\Users\Admin\AppData\Local\Temp\099bad411315767c17e41e04a71f12aa.exe"2⤵
- Deletes itself
PID:2228
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
118B
MD5c9ca0afd6c6d4ba684394ab5ee38482c
SHA1218342e5aa6ad25831f0f4991dd45cc822940206
SHA256fb1820a50d3feaa20d5c43c92ce107c025d80549a0337b272df8c9f5ce89c25c
SHA5123c8228a0cada2ef3a4c8fba626afd0bb5f518413243f0473842ae16a96a72e8b96229026413721c9472908945a6198ee6aa260f6c7516b984b3f7de6889a0495
-
Filesize
406B
MD503cf2b5aee584c8870f889a87e2b1f23
SHA1b46dc1fd84b8c309769aadb39eb1a49e1e983546
SHA256593f487b4e37f5bb71612a1bd43f8278211164624bce9e03b6ee54239c161d17
SHA512c4076dc941bbfa55d1825736a50186b1058fd9d3a5ea1faf2909027b2870e4ee92ed72aee0352d8ad9d895cb06586c14ad62a69fc9ea5f7683872649a7f9db06