Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 06:19
Behavioral task
behavioral1
Sample
2b81aee1f38e29a7e768e474afc076be.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2b81aee1f38e29a7e768e474afc076be.exe
Resource
win10v2004-20231215-en
General
-
Target
2b81aee1f38e29a7e768e474afc076be.exe
-
Size
214KB
-
MD5
2b81aee1f38e29a7e768e474afc076be
-
SHA1
5460a3d5b43f31d7aad68ca9dfc394d931f3bae5
-
SHA256
68c39f0c9f3a6cb37e76df88bfa5f7676d5c6c1d07aa1bd97d13acb3c7329928
-
SHA512
f8e9a5dbad1bd477334daa262a83092af594f09984e53b08149dfd0468f14a0a57cdff4d4ed76a8703248c9f0e2b8c12938178180ad60200ced3e8a1d207e148
-
SSDEEP
6144:QpQ93B7KnYyed+W5bZ9jmtMVosxIh7S3SDxMBQdq:QGn86bZ9jmyGsuhUSDxX
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2784 cmd.exe -
resource yara_rule behavioral1/memory/2104-0-0x0000000000400000-0x0000000000494000-memory.dmp upx behavioral1/memory/2104-9-0x0000000000400000-0x0000000000494000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\npcom.exe 2b81aee1f38e29a7e768e474afc076be.exe File created C:\Windows\SysWOW64\tsetup.exe 2b81aee1f38e29a7e768e474afc076be.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2784 2104 2b81aee1f38e29a7e768e474afc076be.exe 29 PID 2104 wrote to memory of 2784 2104 2b81aee1f38e29a7e768e474afc076be.exe 29 PID 2104 wrote to memory of 2784 2104 2b81aee1f38e29a7e768e474afc076be.exe 29 PID 2104 wrote to memory of 2784 2104 2b81aee1f38e29a7e768e474afc076be.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b81aee1f38e29a7e768e474afc076be.exe"C:\Users\Admin\AppData\Local\Temp\2b81aee1f38e29a7e768e474afc076be.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\cmd.execmd /c 2b81aee1f38e29a7e768e474afc076be.bat2⤵
- Deletes itself
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
163B
MD5f3047893dd19fb70688d42bc90d9cdcb
SHA1d780f8f28286774c9e23318b2ebf16d3ac76a610
SHA25631232ece1cf69af5d23f9f2cbce734a74364b90340946953333f2faa603b228b
SHA512b0b3e82df45f9e69a0fdadc6fde729702cb5ee78964501bc3ecac0ae3d52833dc65ab2302f6367e7b07f5bf4d3988e43524f3b01642bab7bbe97437161dfd1f4