Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 12:26
Static task
static1
Behavioral task
behavioral1
Sample
187d609614e06a588697e42b20aa56b3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
187d609614e06a588697e42b20aa56b3.exe
Resource
win10v2004-20231222-en
General
-
Target
187d609614e06a588697e42b20aa56b3.exe
-
Size
20KB
-
MD5
187d609614e06a588697e42b20aa56b3
-
SHA1
a44accc08f7b5784f829012fadf0b56ace989f31
-
SHA256
a48751cdbe7b05295b19256e4b204b3fafb63ff965496877c374fea12152c9a5
-
SHA512
a0504ece3c57bc02ddd9a9bec1396a633d24aaa55e3cda5fa96ee84204123674ee88559f98acd673cac257a1f76dd758ffd2aa8da741d053439da2bed5cf27bc
-
SSDEEP
384:h50odYm0zDb12kmpvwG5gech7ad+Uv44AxY/1IlrTnaj/oVZYv93P:wo50zgk8vwG5gxh709vhvyl/+93P
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 1984 187d609614e06a588697e42b20aa56b3.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RUN\rufnpnpn = "C:\\Windows\\unnnnjoa.exe" 187d609614e06a588697e42b20aa56b3.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\tfenfpej.dll 187d609614e06a588697e42b20aa56b3.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\unnnnjoa.exe 187d609614e06a588697e42b20aa56b3.exe File opened for modification C:\Windows\unnnnjoa.exe 187d609614e06a588697e42b20aa56b3.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1984 187d609614e06a588697e42b20aa56b3.exe 1984 187d609614e06a588697e42b20aa56b3.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1984 187d609614e06a588697e42b20aa56b3.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1984 wrote to memory of 1220 1984 187d609614e06a588697e42b20aa56b3.exe 21 PID 1984 wrote to memory of 1220 1984 187d609614e06a588697e42b20aa56b3.exe 21 PID 1984 wrote to memory of 1220 1984 187d609614e06a588697e42b20aa56b3.exe 21 PID 1984 wrote to memory of 1220 1984 187d609614e06a588697e42b20aa56b3.exe 21 PID 1984 wrote to memory of 1220 1984 187d609614e06a588697e42b20aa56b3.exe 21 PID 1984 wrote to memory of 1220 1984 187d609614e06a588697e42b20aa56b3.exe 21 PID 1984 wrote to memory of 1220 1984 187d609614e06a588697e42b20aa56b3.exe 21 PID 1984 wrote to memory of 1220 1984 187d609614e06a588697e42b20aa56b3.exe 21 PID 1984 wrote to memory of 1220 1984 187d609614e06a588697e42b20aa56b3.exe 21 PID 1984 wrote to memory of 1220 1984 187d609614e06a588697e42b20aa56b3.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\187d609614e06a588697e42b20aa56b3.exe"C:\Users\Admin\AppData\Local\Temp\187d609614e06a588697e42b20aa56b3.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD593328961479654346bfa39bc8da517ab
SHA19ffbb1bc204403276b471580f93b8c777bdea994
SHA256b37a49814ce6194977c337b2b07acce9e4060a14a9f1fe3cff987bc6539b41ce
SHA5128901521e2b3d0671e9d9c8c7328d472f552f04be59280f8516be7974a7082ddc7fd9c0d82b61cb79032e5d7ee56ad85d4276f6e13c8417a89ce5dc2c721f69c3