Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 02:00
Static task
static1
Behavioral task
behavioral1
Sample
23aadc08e2c5d53f2c408ce50dfd015d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
23aadc08e2c5d53f2c408ce50dfd015d.exe
Resource
win10v2004-20231215-en
General
-
Target
23aadc08e2c5d53f2c408ce50dfd015d.exe
-
Size
332KB
-
MD5
23aadc08e2c5d53f2c408ce50dfd015d
-
SHA1
18948c53a148e5fd6b4f70a836a9bf81f9e3e793
-
SHA256
1211b67dcf52b8d795c4300afd41c8d4c1252b17ae2417e909d0a37aba35ca6c
-
SHA512
12927a0ab2ea3823f3d4498a23d8a73a0a4e2918ed2bbecc387ee23a91bf2ecb747d2dc858e3f383e9aa70d7e8bcbc0cd496e6f8a2e1ddfc70fc6e0be2cdbc37
-
SSDEEP
6144:9M3885RvH9Smk+B0Ep9GTCl0hZDYWsRjdkWqobVeheTOvQMbiRjt2M7ngw0Eg:esLmk3Ep0TCCssWVbVeQTAl0Wr
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2324 043A6AEB00014973000A4136B4EB2331.exe -
Executes dropped EXE 1 IoCs
pid Process 2324 043A6AEB00014973000A4136B4EB2331.exe -
Loads dropped DLL 2 IoCs
pid Process 1368 23aadc08e2c5d53f2c408ce50dfd015d.exe 1368 23aadc08e2c5d53f2c408ce50dfd015d.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\043A6AEB00014973000A4136B4EB2331 = "C:\\ProgramData\\043A6AEB00014973000A4136B4EB2331\\043A6AEB00014973000A4136B4EB2331.exe" 043A6AEB00014973000A4136B4EB2331.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\SystemCertificates\DSL\CRLs 043A6AEB00014973000A4136B4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\SystemCertificates\DSL\CTLs 043A6AEB00014973000A4136B4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\SystemCertificates\DSL 23aadc08e2c5d53f2c408ce50dfd015d.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\SystemCertificates\DSL\Certificates 23aadc08e2c5d53f2c408ce50dfd015d.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\SystemCertificates\DSL\CRLs 23aadc08e2c5d53f2c408ce50dfd015d.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\SystemCertificates\DSL\CTLs 23aadc08e2c5d53f2c408ce50dfd015d.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\SystemCertificates\DSL 043A6AEB00014973000A4136B4EB2331.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\SystemCertificates\DSL\Certificates 043A6AEB00014973000A4136B4EB2331.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1368 23aadc08e2c5d53f2c408ce50dfd015d.exe 2324 043A6AEB00014973000A4136B4EB2331.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2324 043A6AEB00014973000A4136B4EB2331.exe 2324 043A6AEB00014973000A4136B4EB2331.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2324 043A6AEB00014973000A4136B4EB2331.exe 2324 043A6AEB00014973000A4136B4EB2331.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2324 043A6AEB00014973000A4136B4EB2331.exe 2324 043A6AEB00014973000A4136B4EB2331.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1368 wrote to memory of 2324 1368 23aadc08e2c5d53f2c408ce50dfd015d.exe 28 PID 1368 wrote to memory of 2324 1368 23aadc08e2c5d53f2c408ce50dfd015d.exe 28 PID 1368 wrote to memory of 2324 1368 23aadc08e2c5d53f2c408ce50dfd015d.exe 28 PID 1368 wrote to memory of 2324 1368 23aadc08e2c5d53f2c408ce50dfd015d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\23aadc08e2c5d53f2c408ce50dfd015d.exe"C:\Users\Admin\AppData\Local\Temp\23aadc08e2c5d53f2c408ce50dfd015d.exe"1⤵
- Loads dropped DLL
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\ProgramData\043A6AEB00014973000A4136B4EB2331\043A6AEB00014973000A4136B4EB2331.exe"C:\ProgramData\043A6AEB00014973000A4136B4EB2331\043A6AEB00014973000A4136B4EB2331.exe" "C:\Users\Admin\AppData\Local\Temp\23aadc08e2c5d53f2c408ce50dfd015d.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
332KB
MD523aadc08e2c5d53f2c408ce50dfd015d
SHA118948c53a148e5fd6b4f70a836a9bf81f9e3e793
SHA2561211b67dcf52b8d795c4300afd41c8d4c1252b17ae2417e909d0a37aba35ca6c
SHA51212927a0ab2ea3823f3d4498a23d8a73a0a4e2918ed2bbecc387ee23a91bf2ecb747d2dc858e3f383e9aa70d7e8bcbc0cd496e6f8a2e1ddfc70fc6e0be2cdbc37