Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
2s -
max time network
4s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 10:59
Static task
static1
Behavioral task
behavioral1
Sample
169770d1b39686dba1237519ab827a2d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
169770d1b39686dba1237519ab827a2d.exe
Resource
win10v2004-20231222-en
General
-
Target
169770d1b39686dba1237519ab827a2d.exe
-
Size
42KB
-
MD5
169770d1b39686dba1237519ab827a2d
-
SHA1
fb5352912ffff67cea1afe02c38a7e19993d7851
-
SHA256
fc39d9f91900bed78a83835b43cdc19375e3278a3878ebfd5bf6e4f5b94d1839
-
SHA512
d2fe537125dd519437de12224d679ef044902abf03bb0185b1288f9f8bd900bb56ce18fc8fb8cee19219e643ed942ad5efe1269c4a97716be632dcc43daa427d
-
SSDEEP
768:n+WwQOIEXqFsVSNAB8pz7T8RQYHhplSm8IIYkYDgn7Tf241WJkBI:+odIqcMA6tTFwpkP7Ykn248J3
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\File-Sharing Wizard = "shwizard.exe" 169770d1b39686dba1237519ab827a2d.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\shwizard.exe 169770d1b39686dba1237519ab827a2d.exe File opened for modification C:\Windows\SysWOW64\shwizard.exe 169770d1b39686dba1237519ab827a2d.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1472 set thread context of 1720 1472 169770d1b39686dba1237519ab827a2d.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1472 wrote to memory of 1720 1472 169770d1b39686dba1237519ab827a2d.exe 28 PID 1472 wrote to memory of 1720 1472 169770d1b39686dba1237519ab827a2d.exe 28 PID 1472 wrote to memory of 1720 1472 169770d1b39686dba1237519ab827a2d.exe 28 PID 1472 wrote to memory of 1720 1472 169770d1b39686dba1237519ab827a2d.exe 28 PID 1472 wrote to memory of 1720 1472 169770d1b39686dba1237519ab827a2d.exe 28 PID 1472 wrote to memory of 1720 1472 169770d1b39686dba1237519ab827a2d.exe 28 PID 1472 wrote to memory of 1720 1472 169770d1b39686dba1237519ab827a2d.exe 28 PID 1472 wrote to memory of 1720 1472 169770d1b39686dba1237519ab827a2d.exe 28 PID 1472 wrote to memory of 1720 1472 169770d1b39686dba1237519ab827a2d.exe 28 PID 1472 wrote to memory of 1720 1472 169770d1b39686dba1237519ab827a2d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\169770d1b39686dba1237519ab827a2d.exe"C:\Users\Admin\AppData\Local\Temp\169770d1b39686dba1237519ab827a2d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\169770d1b39686dba1237519ab827a2d.exe"C:\Users\Admin\AppData\Local\Temp\169770d1b39686dba1237519ab827a2d.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:1720 -
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\system32\shwizard.exe"3⤵PID:2924
-
C:\Windows\SysWOW64\shwizard.exe"C:\Windows\SysWOW64\shwizard.exe"4⤵PID:2704
-
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.zip3⤵PID:2972
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q *.com3⤵PID:2564
-
-
C:\Windows\SysWOW64\CMD.exeCMD /C del /F /S /Q "%HOMEPATH%\Desktop\*.com"3⤵PID:2760
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD5169770d1b39686dba1237519ab827a2d
SHA1fb5352912ffff67cea1afe02c38a7e19993d7851
SHA256fc39d9f91900bed78a83835b43cdc19375e3278a3878ebfd5bf6e4f5b94d1839
SHA512d2fe537125dd519437de12224d679ef044902abf03bb0185b1288f9f8bd900bb56ce18fc8fb8cee19219e643ed942ad5efe1269c4a97716be632dcc43daa427d