Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 08:17
Static task
static1
Behavioral task
behavioral1
Sample
133609987b5845873bd41700cd9f098a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
133609987b5845873bd41700cd9f098a.exe
Resource
win10v2004-20231215-en
General
-
Target
133609987b5845873bd41700cd9f098a.exe
-
Size
191KB
-
MD5
133609987b5845873bd41700cd9f098a
-
SHA1
e90efbec5f8e91b552767075c5b928d413b17417
-
SHA256
818e0c6a88022f0eb31f59f5c9ba901d32340f28946ebcfeee90884b48ff6224
-
SHA512
ea7fa6804ed261921ce974ed5f073f2b6b126ed3ab051c0d1069b8a56e43eb499963dbba96009676bf97ea53074cd364d0d90166e6ec55e625711a5f2f3dd5c0
-
SSDEEP
3072:TEH+GiEs2SMylNOjyFbxJM5QcRGkHRQI+zapw42FjJh6N7iGn/BLpPf1ZLVc/TBs:TsehzRFkMkHaPzasFv6NucTPffklJ2jn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2644 08.exe -
Loads dropped DLL 7 IoCs
pid Process 1696 133609987b5845873bd41700cd9f098a.exe 1696 133609987b5845873bd41700cd9f098a.exe 2644 08.exe 2644 08.exe 2704 WerFault.exe 2704 WerFault.exe 2704 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 133609987b5845873bd41700cd9f098a.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\system.dll 08.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2704 2644 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1696 wrote to memory of 2644 1696 133609987b5845873bd41700cd9f098a.exe 28 PID 1696 wrote to memory of 2644 1696 133609987b5845873bd41700cd9f098a.exe 28 PID 1696 wrote to memory of 2644 1696 133609987b5845873bd41700cd9f098a.exe 28 PID 1696 wrote to memory of 2644 1696 133609987b5845873bd41700cd9f098a.exe 28 PID 1696 wrote to memory of 2644 1696 133609987b5845873bd41700cd9f098a.exe 28 PID 1696 wrote to memory of 2644 1696 133609987b5845873bd41700cd9f098a.exe 28 PID 1696 wrote to memory of 2644 1696 133609987b5845873bd41700cd9f098a.exe 28 PID 2644 wrote to memory of 2748 2644 08.exe 29 PID 2644 wrote to memory of 2748 2644 08.exe 29 PID 2644 wrote to memory of 2748 2644 08.exe 29 PID 2644 wrote to memory of 2748 2644 08.exe 29 PID 2644 wrote to memory of 2748 2644 08.exe 29 PID 2644 wrote to memory of 2748 2644 08.exe 29 PID 2644 wrote to memory of 2748 2644 08.exe 29 PID 2644 wrote to memory of 2704 2644 08.exe 31 PID 2644 wrote to memory of 2704 2644 08.exe 31 PID 2644 wrote to memory of 2704 2644 08.exe 31 PID 2644 wrote to memory of 2704 2644 08.exe 31 PID 2644 wrote to memory of 2704 2644 08.exe 31 PID 2644 wrote to memory of 2704 2644 08.exe 31 PID 2644 wrote to memory of 2704 2644 08.exe 31 PID 2748 wrote to memory of 2668 2748 cmd.exe 32 PID 2748 wrote to memory of 2668 2748 cmd.exe 32 PID 2748 wrote to memory of 2668 2748 cmd.exe 32 PID 2748 wrote to memory of 2668 2748 cmd.exe 32 PID 2748 wrote to memory of 2668 2748 cmd.exe 32 PID 2748 wrote to memory of 2668 2748 cmd.exe 32 PID 2748 wrote to memory of 2668 2748 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\133609987b5845873bd41700cd9f098a.exe"C:\Users\Admin\AppData\Local\Temp\133609987b5845873bd41700cd9f098a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\08.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\08.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\system32 /e /p everyone:f3⤵
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32 /e /p everyone:f4⤵PID:2668
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 2683⤵
- Loads dropped DLL
- Program crash
PID:2704
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD503c078a7170ba7cf51eb07771619fe12
SHA1732d91e5998d0a1c6fd52d17089cb1ab871e4e67
SHA256914e59cf12869533b27888b75b9b5e5344e2068c15236938fd4fb6c7a4a962b1
SHA512d1bf4d6de020425b7f4ce2e327efb25cea53360ee52d0319b3f09740fa915a32c4fe530876711b3dc0e34290fffa4935e10e33a88a057f22429e18b6e5a166fe
-
Filesize
15KB
MD512a06350969bdc6e81253514e8c2358b
SHA12575b9c4e59ec91e050393922720789debf47696
SHA2565591ba6aee0b8b8e7a1e816197b3f48f995bf365b8da33294efcf5c44cd5add0
SHA512e09e5f01ef33ac55045b918814a5b3cfcb47a4df358e8e18be25f408ac5cff333015adc1e16e71df1b188666c32fb48bfbf48f8d7b1e8f4e047051b502ac7522