Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 05:14
Behavioral task
behavioral1
Sample
2995c500fad1d1cf8b5be0380f6ea6bd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2995c500fad1d1cf8b5be0380f6ea6bd.exe
Resource
win10v2004-20231215-en
General
-
Target
2995c500fad1d1cf8b5be0380f6ea6bd.exe
-
Size
127KB
-
MD5
2995c500fad1d1cf8b5be0380f6ea6bd
-
SHA1
fb6fe606662973380b9a580a990f0fe194edba80
-
SHA256
6856f73cf4da248af188a08f275d3829d4cf31c83ce5da8b94cb30a1834ffbef
-
SHA512
e22c412dcf0e2edadb2d4d1de3cdd7b91f0530f96179119d83843a128afd33f4a178f7dfcbe30accb31d829bcebe759c0e4aa3bae567a9e1cb6fbe369612725f
-
SSDEEP
3072:Pgj+t/SA5EZv+Py9IPEvMnMpDBPRBovupuMmg6oS:PgjG1W1GPbMp1pBcdr
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\coolserver = "C:\\Windows\\coolserver.exe" coolserver.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ coolserver.exe -
Executes dropped EXE 1 IoCs
pid Process 2672 coolserver.exe -
resource yara_rule behavioral1/memory/1724-0-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/files/0x000b000000012731-6.dat upx behavioral1/memory/1724-9-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2672-12-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2672-14-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2672-15-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2672-16-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2672-17-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2672-18-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2672-19-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2672-20-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2672-21-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2672-22-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2672-23-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2672-24-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2672-25-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2672-26-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2672-27-0x0000000000400000-0x0000000000455000-memory.dmp upx behavioral1/memory/2672-28-0x0000000000400000-0x0000000000455000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\coolserver.exe 2995c500fad1d1cf8b5be0380f6ea6bd.exe File opened for modification C:\Windows\coolserver.exe 2995c500fad1d1cf8b5be0380f6ea6bd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2672 1724 2995c500fad1d1cf8b5be0380f6ea6bd.exe 28 PID 1724 wrote to memory of 2672 1724 2995c500fad1d1cf8b5be0380f6ea6bd.exe 28 PID 1724 wrote to memory of 2672 1724 2995c500fad1d1cf8b5be0380f6ea6bd.exe 28 PID 1724 wrote to memory of 2672 1724 2995c500fad1d1cf8b5be0380f6ea6bd.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2995c500fad1d1cf8b5be0380f6ea6bd.exe"C:\Users\Admin\AppData\Local\Temp\2995c500fad1d1cf8b5be0380f6ea6bd.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\coolserver.exe"C:\Windows\coolserver.exe"2⤵
- Adds policy Run key to start application
- Executes dropped EXE
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
127KB
MD52995c500fad1d1cf8b5be0380f6ea6bd
SHA1fb6fe606662973380b9a580a990f0fe194edba80
SHA2566856f73cf4da248af188a08f275d3829d4cf31c83ce5da8b94cb30a1834ffbef
SHA512e22c412dcf0e2edadb2d4d1de3cdd7b91f0530f96179119d83843a128afd33f4a178f7dfcbe30accb31d829bcebe759c0e4aa3bae567a9e1cb6fbe369612725f