Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 01:13
Static task
static1
Behavioral task
behavioral1
Sample
09b4ea7dc4b3b2673f95343f88b03018.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
09b4ea7dc4b3b2673f95343f88b03018.exe
Resource
win10v2004-20231215-en
General
-
Target
09b4ea7dc4b3b2673f95343f88b03018.exe
-
Size
20KB
-
MD5
09b4ea7dc4b3b2673f95343f88b03018
-
SHA1
76e98ed1bd23f05b16f5e1b347af7c9d464030b9
-
SHA256
7afec4488ee587cefcfc10c3040edb80c3a94566acc4c5e32872ff7a723ad7c3
-
SHA512
fbe05e422168656d423c4d7d4cf309987a794148431135d2150eda679d6c66ba0a1e4dc992b432baf8c9b3b250a625f9b5aa03f771e6426dda7fdead551488ea
-
SSDEEP
384:m+WlGJGOuLcRcE/DyNBfpx1mLFDo+NMvAGwER4rZ0TtHV2WF05I:XJ9vyHIDoEWwt0TtHoWee
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\61FB2740\ImagePath = "C:\\Windows\\system32\\E0202620.EXE -g" 09b4ea7dc4b3b2673f95343f88b03018.exe -
Deletes itself 1 IoCs
pid Process 2848 cmd.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\E0202620.EXE 09b4ea7dc4b3b2673f95343f88b03018.exe File created C:\Windows\SysWOW64\del.bat 09b4ea7dc4b3b2673f95343f88b03018.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2060 09b4ea7dc4b3b2673f95343f88b03018.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2060 09b4ea7dc4b3b2673f95343f88b03018.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2848 2060 09b4ea7dc4b3b2673f95343f88b03018.exe 29 PID 2060 wrote to memory of 2848 2060 09b4ea7dc4b3b2673f95343f88b03018.exe 29 PID 2060 wrote to memory of 2848 2060 09b4ea7dc4b3b2673f95343f88b03018.exe 29 PID 2060 wrote to memory of 2848 2060 09b4ea7dc4b3b2673f95343f88b03018.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\09b4ea7dc4b3b2673f95343f88b03018.exe"C:\Users\Admin\AppData\Local\Temp\09b4ea7dc4b3b2673f95343f88b03018.exe"1⤵
- Sets service image path in registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\del.bat2⤵
- Deletes itself
PID:2848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211B
MD592a8cf5691456eb6c973e9259ffba473
SHA185373a5214dbf30c870288a680ac3ea649f728ea
SHA25637d817e9e64d5043deaa80706ae1bbfb1585396e5fb9d3380e7110938be24db9
SHA51227ecad831be103087f58eff901e43ca0fc74394ee7c4bfb39d5bc0ee476d35a99dc3facc4103784e0f085c2f2c64fb12e8bae1a78c85f6484569b4d3d5881d33