Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 02:31
Static task
static1
Behavioral task
behavioral1
Sample
3ba924bf3e0820ef470658bad678a428.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3ba924bf3e0820ef470658bad678a428.exe
Resource
win10v2004-20231222-en
General
-
Target
3ba924bf3e0820ef470658bad678a428.exe
-
Size
109KB
-
MD5
3ba924bf3e0820ef470658bad678a428
-
SHA1
e9b231a0e3ece9067d56dff0fd980e10ed94c4d5
-
SHA256
c3f12d98540dd9fc3bd975e7e324c29fc6794bac69c2997dc4152d59c70a5d7f
-
SHA512
733f2471e1b09ad4d821b1329cbc591f5a780152ee2e7eff435a324c5b9af1d779a44c8d7e8ca957136e262a47cc8f029c2156f8579b695b1553eb2252ed2378
-
SSDEEP
3072:I9amc9x9gOkBX7BeQRPdxP3nTOaVLfBQ9puHI/x3u:Ik8Ok51eQRPPPzD7HI/Bu
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 940 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2504 avp.exe -
Loads dropped DLL 1 IoCs
pid Process 3032 3ba924bf3e0820ef470658bad678a428.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 3ba924bf3e0820ef470658bad678a428.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\deLPlme.bat 3ba924bf3e0820ef470658bad678a428.exe File created C:\Windows\SysWOW64\od3mdi.dll 3ba924bf3e0820ef470658bad678a428.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\avp.exe 3ba924bf3e0820ef470658bad678a428.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 3032 3ba924bf3e0820ef470658bad678a428.exe 476 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 3032 3ba924bf3e0820ef470658bad678a428.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3032 wrote to memory of 940 3032 3ba924bf3e0820ef470658bad678a428.exe 18 PID 3032 wrote to memory of 940 3032 3ba924bf3e0820ef470658bad678a428.exe 18 PID 3032 wrote to memory of 940 3032 3ba924bf3e0820ef470658bad678a428.exe 18 PID 3032 wrote to memory of 940 3032 3ba924bf3e0820ef470658bad678a428.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ba924bf3e0820ef470658bad678a428.exe"C:\Users\Admin\AppData\Local\Temp\3ba924bf3e0820ef470658bad678a428.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\cmd.execmd /c delplme.bat2⤵
- Deletes itself
PID:940
-
-
C:\Windows\avp.exeC:\Windows\avp.exe1⤵
- Executes dropped EXE
PID:2504