Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 06:33

General

  • Target

    2bd67f0f7bba76a4859c8b137e920e4a.exe

  • Size

    168KB

  • MD5

    2bd67f0f7bba76a4859c8b137e920e4a

  • SHA1

    6a89e06cfb257619ae15799bc9c7e0c42b92f7e2

  • SHA256

    7dc4466130ed3330355480c74db83b07a261f27de89786065826e59b1a1c0d6d

  • SHA512

    eadf918981ffa7b4fee71a959524b9e715f996d4ea2055b8df73c5c99c6db768b73c2310eab86ffd31cf6fa58f79b1a81a92485f2b81632cc27ffa4890674e91

  • SSDEEP

    1536:kqXJrEys7cv+c/RgBtKH67bU8TkWRifJYwdtmP+7m5KFbwQL4AW3lV4ckUl0OEZq:5BR+cpgB4ZCchor5KFjkF/5YC6XJnnqL

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2bd67f0f7bba76a4859c8b137e920e4a.exe
    "C:\Users\Admin\AppData\Local\Temp\2bd67f0f7bba76a4859c8b137e920e4a.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2504
    • C:\Users\Admin\weera.exe
      "C:\Users\Admin\weera.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\weera.exe

    Filesize

    168KB

    MD5

    4cfd14ce48abc7b561b31ba24174f369

    SHA1

    98711fd6a621596d35e93667c161d4794bb4f6b1

    SHA256

    59dcde59def21bc6dba85f323f980c7a8f72a0b01d7144803a7888482fe52234

    SHA512

    87677d233e42c98a28ce3f88081ea52afb4091a09e929d9f8f1a0ce2df194327fc0227914648bfbc92a91e93d0b6e6f9f294c2d1f3bfc5ddfa666ea68eca9248