Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 02:38
Static task
static1
Behavioral task
behavioral1
Sample
24c6c25e1293b9ee5088ee2bed04ce16.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
24c6c25e1293b9ee5088ee2bed04ce16.exe
Resource
win10v2004-20231215-en
General
-
Target
24c6c25e1293b9ee5088ee2bed04ce16.exe
-
Size
166KB
-
MD5
24c6c25e1293b9ee5088ee2bed04ce16
-
SHA1
01518a363603bce4aa4fbced71497f3a71a04dbe
-
SHA256
0413487aa799f62e05d13968ebdf59f0bf02af8ef88284a67aff704c033a265a
-
SHA512
c9a41d458fb9abd52b2c0486ea6fa0c6487bd8963c5213e1464a43bc3d0f4ac0d9315173932ad22d52f0808d5b7ab309070f23cf42b7834e95ca49b62cf4ab9f
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/k85:o68i3odBiTl2+TCU/Z
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 24c6c25e1293b9ee5088ee2bed04ce16.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon7.ico 24c6c25e1293b9ee5088ee2bed04ce16.exe File created C:\Windows\SHARE_TEMP\Icon13.ico 24c6c25e1293b9ee5088ee2bed04ce16.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 24c6c25e1293b9ee5088ee2bed04ce16.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 24c6c25e1293b9ee5088ee2bed04ce16.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 24c6c25e1293b9ee5088ee2bed04ce16.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 24c6c25e1293b9ee5088ee2bed04ce16.exe File opened for modification C:\Windows\winhash_up.exez 24c6c25e1293b9ee5088ee2bed04ce16.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 24c6c25e1293b9ee5088ee2bed04ce16.exe File created C:\Windows\bugMAKER.bat 24c6c25e1293b9ee5088ee2bed04ce16.exe File created C:\Windows\winhash_up.exez 24c6c25e1293b9ee5088ee2bed04ce16.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 24c6c25e1293b9ee5088ee2bed04ce16.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 24c6c25e1293b9ee5088ee2bed04ce16.exe File created C:\Windows\winhash_up.exe 24c6c25e1293b9ee5088ee2bed04ce16.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2396 2072 24c6c25e1293b9ee5088ee2bed04ce16.exe 28 PID 2072 wrote to memory of 2396 2072 24c6c25e1293b9ee5088ee2bed04ce16.exe 28 PID 2072 wrote to memory of 2396 2072 24c6c25e1293b9ee5088ee2bed04ce16.exe 28 PID 2072 wrote to memory of 2396 2072 24c6c25e1293b9ee5088ee2bed04ce16.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\24c6c25e1293b9ee5088ee2bed04ce16.exe"C:\Users\Admin\AppData\Local\Temp\24c6c25e1293b9ee5088ee2bed04ce16.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD50a11caf9d255d9274098298be21db3c7
SHA130d085b4dea265f418c369e91ecf6478d94bfb4e
SHA256db9124fbe79818e657de26f8a31f884f71ab0e2ed5146e1031c50b1e4c1417f1
SHA5122eb9c061e8ba1d5cbddd867cd6e697c89c7cbe5663c8c9ef7a614ad35655cbda51085f542dd73b793f8982cf63bb68cf2ce589ade7d763e4e232ce6f8db01808