Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 12:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
185a2ca1884de3983a525cdd7104daa0.exe
Resource
win7-20231129-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
185a2ca1884de3983a525cdd7104daa0.exe
Resource
win10v2004-20231222-en
6 signatures
150 seconds
General
-
Target
185a2ca1884de3983a525cdd7104daa0.exe
-
Size
267KB
-
MD5
185a2ca1884de3983a525cdd7104daa0
-
SHA1
131969f13c3e141e660aa219e90a78a07d390151
-
SHA256
c7cc67bd019e049c62342206f2d2a7af46fc58a950d1ff1db958d7c09290b6df
-
SHA512
eaa875e55522050870bb2742ee261f3efbb46448c5d3c8cb63c4ad60748bf17d6fa16e9f841d92a4c78f90c2b9f5bf6dcd7be232c07b7d753cd29c8baadd48e5
-
SSDEEP
6144:KxZaCYILHJne0fIJQsSWUhM8CBesCbYE/o/G+O:K9YILH9yQLBhJCdKzg/G7
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2100 f55MiVIY0kwAU92.exe -
Executes dropped EXE 2 IoCs
pid Process 3040 f55MiVIY0kwAU92.exe 2100 f55MiVIY0kwAU92.exe -
Loads dropped DLL 5 IoCs
pid Process 2028 185a2ca1884de3983a525cdd7104daa0.exe 2028 185a2ca1884de3983a525cdd7104daa0.exe 2028 185a2ca1884de3983a525cdd7104daa0.exe 3040 f55MiVIY0kwAU92.exe 2100 f55MiVIY0kwAU92.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\QTWZw1vidP3N = "C:\\ProgramData\\fgFbR27rWExrdHdf\\f55MiVIY0kwAU92.exe" 185a2ca1884de3983a525cdd7104daa0.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3008 set thread context of 2028 3008 185a2ca1884de3983a525cdd7104daa0.exe 14 PID 3040 set thread context of 2100 3040 f55MiVIY0kwAU92.exe 18 PID 2100 set thread context of 2676 2100 f55MiVIY0kwAU92.exe 25 -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2028 3008 185a2ca1884de3983a525cdd7104daa0.exe 14 PID 3008 wrote to memory of 2028 3008 185a2ca1884de3983a525cdd7104daa0.exe 14 PID 3008 wrote to memory of 2028 3008 185a2ca1884de3983a525cdd7104daa0.exe 14 PID 3008 wrote to memory of 2028 3008 185a2ca1884de3983a525cdd7104daa0.exe 14 PID 3008 wrote to memory of 2028 3008 185a2ca1884de3983a525cdd7104daa0.exe 14 PID 3008 wrote to memory of 2028 3008 185a2ca1884de3983a525cdd7104daa0.exe 14 PID 2028 wrote to memory of 3040 2028 185a2ca1884de3983a525cdd7104daa0.exe 19 PID 2028 wrote to memory of 3040 2028 185a2ca1884de3983a525cdd7104daa0.exe 19 PID 2028 wrote to memory of 3040 2028 185a2ca1884de3983a525cdd7104daa0.exe 19 PID 2028 wrote to memory of 3040 2028 185a2ca1884de3983a525cdd7104daa0.exe 19 PID 3040 wrote to memory of 2100 3040 f55MiVIY0kwAU92.exe 18 PID 3040 wrote to memory of 2100 3040 f55MiVIY0kwAU92.exe 18 PID 3040 wrote to memory of 2100 3040 f55MiVIY0kwAU92.exe 18 PID 3040 wrote to memory of 2100 3040 f55MiVIY0kwAU92.exe 18 PID 3040 wrote to memory of 2100 3040 f55MiVIY0kwAU92.exe 18 PID 3040 wrote to memory of 2100 3040 f55MiVIY0kwAU92.exe 18 PID 2100 wrote to memory of 2676 2100 f55MiVIY0kwAU92.exe 25 PID 2100 wrote to memory of 2676 2100 f55MiVIY0kwAU92.exe 25 PID 2100 wrote to memory of 2676 2100 f55MiVIY0kwAU92.exe 25 PID 2100 wrote to memory of 2676 2100 f55MiVIY0kwAU92.exe 25 PID 2100 wrote to memory of 2676 2100 f55MiVIY0kwAU92.exe 25 PID 2100 wrote to memory of 2676 2100 f55MiVIY0kwAU92.exe 25
Processes
-
C:\Users\Admin\AppData\Local\Temp\185a2ca1884de3983a525cdd7104daa0.exe"C:\Users\Admin\AppData\Local\Temp\185a2ca1884de3983a525cdd7104daa0.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\ProgramData\fgFbR27rWExrdHdf\f55MiVIY0kwAU92.exe"C:\ProgramData\fgFbR27rWExrdHdf\f55MiVIY0kwAU92.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3040
-
-
C:\Users\Admin\AppData\Local\Temp\185a2ca1884de3983a525cdd7104daa0.exe"C:\Users\Admin\AppData\Local\Temp\185a2ca1884de3983a525cdd7104daa0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3008
-
C:\ProgramData\fgFbR27rWExrdHdf\f55MiVIY0kwAU92.exe"C:\ProgramData\fgFbR27rWExrdHdf\f55MiVIY0kwAU92.exe"1⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Program Files (x86)\Windows Media Player\wmpconfig.exe"C:\Program Files (x86)\Windows Media Player\wmpconfig.exe" /i:21002⤵PID:2676
-