Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
23s -
max time network
24s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 04:19
Behavioral task
behavioral1
Sample
27e44811411a982a3bd4a7c2b54b24b9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
27e44811411a982a3bd4a7c2b54b24b9.exe
Resource
win10v2004-20231215-en
General
-
Target
27e44811411a982a3bd4a7c2b54b24b9.exe
-
Size
127KB
-
MD5
27e44811411a982a3bd4a7c2b54b24b9
-
SHA1
bf1c1306fa9652b6c306871987778e454cc39c04
-
SHA256
8e4331d52ceef7e4331682ed990acbc673e137f0ab194c4cb546b0faa5c32341
-
SHA512
d097b941a6c1de7de7c696467ff8a32c6117b26d45bdcdcdf965a79833251f655b8fc26b8a4a9e14b89ca54fb3cab02b12c8b4a58542dc7f3c28c648c80a59b6
-
SSDEEP
3072:PRzDmRIVgdnTzhtjDbg2v02fa/OkG1CYT9TZ0KS8ihL4NhT3X7foutY:PRfqTd5P+C1fTffS866hffoS
Malware Config
Signatures
-
Drops file in Drivers directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\pxon5xyxz3.sys 27e44811411a982a3bd4a7c2b54b24b9.exe File created C:\Windows\SysWOW64\drivers\4ct3.sys 27e44811411a982a3bd4a7c2b54b24b9.exe File opened for modification C:\Windows\SysWOW64\drivers\4ct3.sys 27e44811411a982a3bd4a7c2b54b24b9.exe File created C:\Windows\SysWOW64\drivers\pxon5xyxz3.sys 27e44811411a982a3bd4a7c2b54b24b9.exe -
Sets service image path in registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\4ct3\ImagePath = "system32\\drivers\\4ct3.sys" 27e44811411a982a3bd4a7c2b54b24b9.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\pxon5xyxz3\ImagePath = "system32\\drivers\\pxon5xyxz3.sys" 27e44811411a982a3bd4a7c2b54b24b9.exe -
resource yara_rule behavioral1/memory/2180-0-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2180-6-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral1/memory/2180-10-0x0000000000400000-0x000000000044B000-memory.dmp upx -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\piq160afr8.dll 27e44811411a982a3bd4a7c2b54b24b9.exe File opened for modification C:\Windows\SysWOW64\piq160afr8.dll 27e44811411a982a3bd4a7c2b54b24b9.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 464 Process not Found 464 Process not Found