Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
240s -
max time network
288s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 02:56
Behavioral task
behavioral1
Sample
0c4544cf311ddf6f01d0d299a891a58e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0c4544cf311ddf6f01d0d299a891a58e.exe
Resource
win10v2004-20231215-en
General
-
Target
0c4544cf311ddf6f01d0d299a891a58e.exe
-
Size
32KB
-
MD5
0c4544cf311ddf6f01d0d299a891a58e
-
SHA1
dd6a0886193e7053d912c52862a3bfd1d4a0d32f
-
SHA256
df1813471aca94c82713f4bf15290f1aada4e573f6e1f4d61ec3b1791ac85dfe
-
SHA512
87f0aa12e29a7b30848f748289d72d2f615e83756d65e26816cb6f500fb92f902cf13800fd46cab23c7feb0d4945404d036caa86d6f6bfc16c510db53c9d1a1e
-
SSDEEP
768:nPRDqKPeuoLm14j5CrDM16LQOcx44dxfftn5:PRDqKPe9Lm14jQrDMwQOcxpdxf7
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} 0c4544cf311ddf6f01d0d299a891a58e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Windows\\system32\\mst32init.exe" 0c4544cf311ddf6f01d0d299a891a58e.exe -
Sets file to hidden 1 TTPs 4 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2976 attrib.exe 1776 attrib.exe 2740 attrib.exe 1556 attrib.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000b0000000131eb-7.dat acprotect -
resource yara_rule behavioral1/memory/2288-0-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/2288-3-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/2288-6-0x0000000000400000-0x000000000041B000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\netiu1.dll 0c4544cf311ddf6f01d0d299a891a58e.exe File opened for modification C:\Windows\SysWOW64\mst32init.exe 0c4544cf311ddf6f01d0d299a891a58e.exe File opened for modification C:\Windows\SysWOW64\netiu1.dll attrib.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\netiu1.dll 0c4544cf311ddf6f01d0d299a891a58e.exe File opened for modification C:\Windows\ 0c4544cf311ddf6f01d0d299a891a58e.exe File opened for modification C:\Windows\netiu1.dll attrib.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2288 0c4544cf311ddf6f01d0d299a891a58e.exe 2288 0c4544cf311ddf6f01d0d299a891a58e.exe 2288 0c4544cf311ddf6f01d0d299a891a58e.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2288 wrote to memory of 1556 2288 0c4544cf311ddf6f01d0d299a891a58e.exe 27 PID 2288 wrote to memory of 1556 2288 0c4544cf311ddf6f01d0d299a891a58e.exe 27 PID 2288 wrote to memory of 1556 2288 0c4544cf311ddf6f01d0d299a891a58e.exe 27 PID 2288 wrote to memory of 1556 2288 0c4544cf311ddf6f01d0d299a891a58e.exe 27 PID 2288 wrote to memory of 1776 2288 0c4544cf311ddf6f01d0d299a891a58e.exe 30 PID 2288 wrote to memory of 1776 2288 0c4544cf311ddf6f01d0d299a891a58e.exe 30 PID 2288 wrote to memory of 1776 2288 0c4544cf311ddf6f01d0d299a891a58e.exe 30 PID 2288 wrote to memory of 1776 2288 0c4544cf311ddf6f01d0d299a891a58e.exe 30 PID 2288 wrote to memory of 2976 2288 0c4544cf311ddf6f01d0d299a891a58e.exe 29 PID 2288 wrote to memory of 2976 2288 0c4544cf311ddf6f01d0d299a891a58e.exe 29 PID 2288 wrote to memory of 2976 2288 0c4544cf311ddf6f01d0d299a891a58e.exe 29 PID 2288 wrote to memory of 2976 2288 0c4544cf311ddf6f01d0d299a891a58e.exe 29 PID 2288 wrote to memory of 2740 2288 0c4544cf311ddf6f01d0d299a891a58e.exe 31 PID 2288 wrote to memory of 2740 2288 0c4544cf311ddf6f01d0d299a891a58e.exe 31 PID 2288 wrote to memory of 2740 2288 0c4544cf311ddf6f01d0d299a891a58e.exe 31 PID 2288 wrote to memory of 2740 2288 0c4544cf311ddf6f01d0d299a891a58e.exe 31 -
Views/modifies file attributes 1 TTPs 4 IoCs
pid Process 1556 attrib.exe 2976 attrib.exe 1776 attrib.exe 2740 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c4544cf311ddf6f01d0d299a891a58e.exe"C:\Users\Admin\AppData\Local\Temp\0c4544cf311ddf6f01d0d299a891a58e.exe"1⤵
- Modifies Installed Components in the registry
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\attrib.exeattrib.exe +s +h C:\Windows\netiu1.dll2⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:1556
-
-
C:\Windows\SysWOW64\attrib.exeattrib.exe +s +h C:\Windows\2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2976
-
-
C:\Windows\SysWOW64\attrib.exeattrib.exe +s +h C:\Windows\system32\netiu1.dll2⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
PID:1776
-
-
C:\Windows\SysWOW64\attrib.exeattrib.exe +s +h C:\Windows\system32\mst32init.exe2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5b5f25913f5be4429d499070e127035e0
SHA17551200a282d4bf3375eb35faea9c07c8329f201
SHA2560121df6f8191a9226efcf8ceffecfbf85c13df733f077483c9333b8246854f19
SHA51227b17abbcceab1d8a639192f060fe9b29e237dcb0b96e2b21449de00ed585a0a548106ccce55e27cf2b53c9f68803ef51d4cc491c4523de2b01c706f3bfbde04