Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 00:16
Static task
static1
Behavioral task
behavioral1
Sample
215b48d49b04ccd8fc8951b9dfa8f59d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
215b48d49b04ccd8fc8951b9dfa8f59d.exe
Resource
win10v2004-20231222-en
General
-
Target
215b48d49b04ccd8fc8951b9dfa8f59d.exe
-
Size
7KB
-
MD5
215b48d49b04ccd8fc8951b9dfa8f59d
-
SHA1
51208df94b3186cdb5887f20f158caa93f01ca09
-
SHA256
49b0c588abedc0239ef9580de207baa36d220ac82125bc65a6a3398692c66f24
-
SHA512
cb5025d9b9c13fcfe9da0ec4bb5318553518c7f539a6dc751fa3e313fbc6252a79bc69ac428ff36863f967156340aec6cbe5bed1aa794d454304176ebd0d3962
-
SSDEEP
96:AFB26INK4u5V0XzhjCb0q9Md57iZriH6sFwLcjOjVlNvCZM:Wr4520TsriH6sFwL5jfNmM
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\kkvk\ImagePath = "\\??\\C:\\Windows\\Fonts\\kkvk.fon" rundll32.exe -
Loads dropped DLL 4 IoCs
pid Process 2488 rundll32.exe 2488 rundll32.exe 2488 rundll32.exe 2488 rundll32.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Fonts\kkvk.fon rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3012 215b48d49b04ccd8fc8951b9dfa8f59d.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2488 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2700 3012 215b48d49b04ccd8fc8951b9dfa8f59d.exe 28 PID 3012 wrote to memory of 2700 3012 215b48d49b04ccd8fc8951b9dfa8f59d.exe 28 PID 3012 wrote to memory of 2700 3012 215b48d49b04ccd8fc8951b9dfa8f59d.exe 28 PID 3012 wrote to memory of 2700 3012 215b48d49b04ccd8fc8951b9dfa8f59d.exe 28 PID 2700 wrote to memory of 2488 2700 cmd.exe 30 PID 2700 wrote to memory of 2488 2700 cmd.exe 30 PID 2700 wrote to memory of 2488 2700 cmd.exe 30 PID 2700 wrote to memory of 2488 2700 cmd.exe 30 PID 2700 wrote to memory of 2488 2700 cmd.exe 30 PID 2700 wrote to memory of 2488 2700 cmd.exe 30 PID 2700 wrote to memory of 2488 2700 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\215b48d49b04ccd8fc8951b9dfa8f59d.exe"C:\Users\Admin\AppData\Local\Temp\215b48d49b04ccd8fc8951b9dfa8f59d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\cmd.execmd /c rundll32 Runt.dll,RundllTest2⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\rundll32.exerundll32 Runt.dll,RundllTest3⤵
- Sets service image path in registry
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: LoadsDriver
PID:2488
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD56f77616bcb050a69bdf95736c864a2e6
SHA1a0f0d11c0c84e07c786f188122c2c28e87208009
SHA256f83b1b32e262094c24da2b2a8b4e3923a4d99ed91142bda14536569702e8e87f
SHA512cedfce4634f7c8049e3020c68265a7402bc98d8f35669ac8391f271129a931b482af8572942f6d1591562f2e44609761c6214db77d2a33b2d012a7bec8ce08b6