Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 04:30
Static task
static1
Behavioral task
behavioral1
Sample
0e898c8c40c28140a206e4864840de47.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0e898c8c40c28140a206e4864840de47.exe
Resource
win10v2004-20231215-en
General
-
Target
0e898c8c40c28140a206e4864840de47.exe
-
Size
156KB
-
MD5
0e898c8c40c28140a206e4864840de47
-
SHA1
8c1d1a821a09247f3c161adc91fb203196aa4108
-
SHA256
81753ba6374b2022a36f9a62c6b1df6fdc80f75e80dfff06dee05470714a2034
-
SHA512
9522d389e706c05bd582d3729f614bafea21202ac0b674aef2e336a60b06abab89962706b543862c7595586bf96a5c9c49c4249324d48e25af6c57e37d85efef
-
SSDEEP
3072:jGgb/llkYABH5Gb2cBl6JW+WvmZ4KzLDdHPFuDa9ZV1F8ZqEJzmZt:jDboYABkbZoJW+W+6KnDdH9u2d1F8Mo0
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Irmon\Parameters\ServiceDll = "%SystemRoot%\\system32\\0e898c8c40c28140a206e4864840de47.dll" rundll32.exe -
Deletes itself 1 IoCs
pid Process 2764 cmd.exe -
Loads dropped DLL 5 IoCs
pid Process 2708 rundll32.exe 2708 rundll32.exe 2708 rundll32.exe 2708 rundll32.exe 2584 svchost.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\xinstall.log rundll32.exe File opened for modification C:\Windows\SysWOW64\xinstall.log svchost.exe File opened for modification C:\Windows\SysWOW64\0e898c8c40c28140a206e4864840de47.dll 0e898c8c40c28140a206e4864840de47.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\win.ini rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2708 rundll32.exe 2584 svchost.exe 2584 svchost.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1800 wrote to memory of 3044 1800 0e898c8c40c28140a206e4864840de47.exe 28 PID 1800 wrote to memory of 3044 1800 0e898c8c40c28140a206e4864840de47.exe 28 PID 1800 wrote to memory of 3044 1800 0e898c8c40c28140a206e4864840de47.exe 28 PID 1800 wrote to memory of 3044 1800 0e898c8c40c28140a206e4864840de47.exe 28 PID 1800 wrote to memory of 3044 1800 0e898c8c40c28140a206e4864840de47.exe 28 PID 1800 wrote to memory of 3044 1800 0e898c8c40c28140a206e4864840de47.exe 28 PID 1800 wrote to memory of 3044 1800 0e898c8c40c28140a206e4864840de47.exe 28 PID 1800 wrote to memory of 2764 1800 0e898c8c40c28140a206e4864840de47.exe 30 PID 1800 wrote to memory of 2764 1800 0e898c8c40c28140a206e4864840de47.exe 30 PID 1800 wrote to memory of 2764 1800 0e898c8c40c28140a206e4864840de47.exe 30 PID 1800 wrote to memory of 2764 1800 0e898c8c40c28140a206e4864840de47.exe 30 PID 2764 wrote to memory of 2676 2764 cmd.exe 33 PID 2764 wrote to memory of 2676 2764 cmd.exe 33 PID 2764 wrote to memory of 2676 2764 cmd.exe 33 PID 2764 wrote to memory of 2676 2764 cmd.exe 33 PID 3044 wrote to memory of 2708 3044 cmd.exe 32 PID 3044 wrote to memory of 2708 3044 cmd.exe 32 PID 3044 wrote to memory of 2708 3044 cmd.exe 32 PID 3044 wrote to memory of 2708 3044 cmd.exe 32 PID 3044 wrote to memory of 2708 3044 cmd.exe 32 PID 3044 wrote to memory of 2708 3044 cmd.exe 32 PID 3044 wrote to memory of 2708 3044 cmd.exe 32 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2676 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e898c8c40c28140a206e4864840de47.exe"C:\Users\Admin\AppData\Local\Temp\0e898c8c40c28140a206e4864840de47.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\259398056_install.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\rundll32.exerundll32 C:\Windows\system32\0e898c8c40c28140a206e4864840de47.dll,InstallSA Irmon Microsoft IR Monitor Services3⤵
- Sets DLL path for service in the registry
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2708
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\\259398197_selfdel.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\attrib.exeattrib -a -r -s -h "C:\Users\Admin\AppData\Local\Temp\0e898c8c40c28140a206e4864840de47.exe"3⤵
- Views/modifies file attributes
PID:2676
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
126B
MD50a03ee682aecaec6ae50c6e5ea332a03
SHA11c6a3c013ca4a08d595e0b5d5b84476141ede0c1
SHA2563b293a7111211ae4a34a08b7bf71ef1e7065f995726951e80dcfda7e21d610c8
SHA512d8c63f6ff687f20f3b6d5faaab5b16d14cc66d027b5bfd4b26ff825d613c981704949738a9894ab665412e891f1014eb6809240f052ddd16f1f36d666b8b2890
-
Filesize
304B
MD5dde5f2474e4deb6804e0451933f1a7fa
SHA110add5e4333270b70718dc557eb6bbcc7b85fa47
SHA256e4d3a689884f4d58fc9d20a3170f79f4cffc7609aca574d7c1bcfffa40ab46be
SHA512e177316a07e2f64d78f2e71c7acee04ffe8a6df32c91b2f0d1fe184fc5297573baf9bb67f94374853b6cde7faffe62c7536b41155e738795e5dd8566115b3272
-
Filesize
128KB
MD54fe5af91cc77138ba6fd85d1cc16764d
SHA11c342a2eeb82d9d87642bd8f1bcfc1e7fb658ecb
SHA256314180ea723588c4cd777c80d4dcf863abc9c085f695c06cbbd23998283bde41
SHA51230443683c355eba001e24703e385e778843726d29480008e14c20958d77b4de7976ae23e491b0a927e90b9607a332e1bd5e786e60f9d2e31f1bf4d9b347dc9ae
-
Filesize
210B
MD5488c7fd383f4e7a943ca4862189e7bd4
SHA1b573b070d38618e2d25c60afc36101fabffac09a
SHA2569335a464cd7415d5cad08f7a1954da23645569861d2d330f21e7d23e948b4a7f
SHA5129de3f6fd243ccaafc760ed8cd88adb100283fa657bc14f5fba4cedb7b7e9d9624ff2fc30c4cee9c3280b9bba8cce8467ceffd3fbd8b25db2d0c5732bb50bd834
-
Filesize
64KB
MD59f22ea7e644186da905894567703b808
SHA10581e5233ade4d0de2985d0c82da252839bef38f
SHA256cb1f3c7df7a68cbe58d684242be8b0ebb9473834f90e9936debbde04696cc363
SHA5120d52c34a3d02c2bcf4ff4da2c15e73d52a4b6a1fc2ca07492080402c9cd1e8e9801a7eb104f6c58fbf146a340564b08b3a64b3b60d2f1a60ba0b647e398a0b01
-
Filesize
42KB
MD58622a648226e1d0829b15830ffccaf97
SHA1a51044405eaf2b853387feaf2e2c5b5179af671a
SHA2563ea33963d7c97d3bf7ba13393953562dc2d2b65fc1ad25185fa075c7bcd262d1
SHA512a07af453877ecf3d236e93f650833024168d6773d70b849be7c33f95bce04764a5fa2c4e9d4e1c477447ce15a5f616e9bd88cd95c6a2357e0f09f4d6f1d68ab9
-
Filesize
19KB
MD5e3ae0cb0df01e7e30952339e4009ce38
SHA16c22ca099cd7cacb0bf3572be06e6e6fdce18276
SHA2566528cbb6bf51d9bfee0911b9d41ac1f0aaf9c8605dff8fe0399170fa2e6fa2d7
SHA512588c84c99f70e5031b10d5f782d61485fc7516b930946c859814b93fa1c296d459e302b159849c74e6f4c8a2cff4856595c684157b3f6e3d6e3025b1dec7e0bb
-
Filesize
146KB
MD52eab769d4b859e7bff25401ea0758e6f
SHA1f6c1258a7cae2ea7506c064ab81ecebd397d0062
SHA256e9dcedadb33cca6fe48a3ba21fd9f17c25d32b44e76c1bee24525d6046616a13
SHA51278faf2183b3cc64f85ef50f9dc375a5c8ad061d0674cb65f076b985d1721f78d79f52cabbdf6dab3d6be9b08e2f381c1bbfe84ca7063b49f16c5eab09355428b