Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 07:43
Behavioral task
behavioral1
Sample
1273e6b2f68c1be047a6e1e3c2471e41.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1273e6b2f68c1be047a6e1e3c2471e41.exe
Resource
win10v2004-20231215-en
General
-
Target
1273e6b2f68c1be047a6e1e3c2471e41.exe
-
Size
10KB
-
MD5
1273e6b2f68c1be047a6e1e3c2471e41
-
SHA1
8c2c47b73cf18571a8c961e3d5e2b81ed487e37b
-
SHA256
5acc6b81f60d552e955f4cb4e1fb825340bf75ac0923730eaff532aecd7689d8
-
SHA512
022cd6198becbae4c0b5bab85cba5bd8ce26909dfa8014e1a97b9b92a8791133fc15dc77b3ede142abb5316929fc1d6c71437238b47fc931022946cb199f815e
-
SSDEEP
192:Ryvj2H5QwZPhoMVBAbWPFO3+3y2El/mGBx27D7IgOGB/DO4E7T3Z:IyH5Qi5zAbWtGIOuOa/q4ut
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Deletes itself 1 IoCs
pid Process 2880 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2008 xpsbosk.exe -
Loads dropped DLL 2 IoCs
pid Process 1080 1273e6b2f68c1be047a6e1e3c2471e41.exe 1080 1273e6b2f68c1be047a6e1e3c2471e41.exe -
resource yara_rule behavioral1/memory/1080-0-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/files/0x0008000000012281-3.dat upx behavioral1/memory/2008-11-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/files/0x0008000000012281-5.dat upx behavioral1/memory/1080-19-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\xpsbos.dll 1273e6b2f68c1be047a6e1e3c2471e41.exe File created C:\Windows\SysWOW64\xpsbosk.exe 1273e6b2f68c1be047a6e1e3c2471e41.exe File opened for modification C:\Windows\SysWOW64\xpsbosk.exe 1273e6b2f68c1be047a6e1e3c2471e41.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1080 1273e6b2f68c1be047a6e1e3c2471e41.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1080 wrote to memory of 2008 1080 1273e6b2f68c1be047a6e1e3c2471e41.exe 28 PID 1080 wrote to memory of 2008 1080 1273e6b2f68c1be047a6e1e3c2471e41.exe 28 PID 1080 wrote to memory of 2008 1080 1273e6b2f68c1be047a6e1e3c2471e41.exe 28 PID 1080 wrote to memory of 2008 1080 1273e6b2f68c1be047a6e1e3c2471e41.exe 28 PID 1080 wrote to memory of 2880 1080 1273e6b2f68c1be047a6e1e3c2471e41.exe 30 PID 1080 wrote to memory of 2880 1080 1273e6b2f68c1be047a6e1e3c2471e41.exe 30 PID 1080 wrote to memory of 2880 1080 1273e6b2f68c1be047a6e1e3c2471e41.exe 30 PID 1080 wrote to memory of 2880 1080 1273e6b2f68c1be047a6e1e3c2471e41.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1273e6b2f68c1be047a6e1e3c2471e41.exe"C:\Users\Admin\AppData\Local\Temp\1273e6b2f68c1be047a6e1e3c2471e41.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\xpsbosk.exeC:\Windows\system32\xpsbosk.exe ˜‰2⤵
- Executes dropped EXE
PID:2008
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\1273e6b2f68c1be047a6e1e3c2471e41.exe.bat2⤵
- Deletes itself
PID:2880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD55ba87c710a504477b8c0fc86ea0faaa4
SHA1b3c76b0fe2555297598b16deb63e2ccaa5b573c2
SHA256616624680fdcf9c44d3c7dc6ca31ee21fbfc9780e734a3b89672108705b717e9
SHA5120b4a9e4e8df3e4e12498e772505f37f6857b3ed6c4d928d1846f1cdba17f973de0821b54f75e5ece741b4b694b59a3897c7cd00284aeb69346449ada9b69ac03
-
Filesize
10KB
MD51273e6b2f68c1be047a6e1e3c2471e41
SHA18c2c47b73cf18571a8c961e3d5e2b81ed487e37b
SHA2565acc6b81f60d552e955f4cb4e1fb825340bf75ac0923730eaff532aecd7689d8
SHA512022cd6198becbae4c0b5bab85cba5bd8ce26909dfa8014e1a97b9b92a8791133fc15dc77b3ede142abb5316929fc1d6c71437238b47fc931022946cb199f815e