Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
3s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 03:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3bb9540039e411bae67403b78822d19c.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
3bb9540039e411bae67403b78822d19c.exe
Resource
win10v2004-20231215-en
1 signatures
150 seconds
General
-
Target
3bb9540039e411bae67403b78822d19c.exe
-
Size
145KB
-
MD5
3bb9540039e411bae67403b78822d19c
-
SHA1
8bfc3de61dad1907f1d8b9a3706f33eab645166d
-
SHA256
d3af14f71b89cdd01193472f1004027cbffc660636e022e3f5115f537639678e
-
SHA512
3565b9e00c20d03039ad4618d559d1cba4cc7910731968d49f0b293e9aab655e431fe984c07825f2009a0609dc25935dfec2db0806a4d21d3816f390cffbc47e
-
SSDEEP
1536:cOSYU3r+cWfG0mQnt2mET7/DdfEd5N5KKb392MrqxUnsEM2dXJILlUzuTpHplWOY:gYGhQeTlfEH395rqPkdKtH5c
Score
7/10
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2348-1-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral1/memory/2308-0-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral1/memory/2308-3-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral1/memory/2348-52228-0x0000000000400000-0x000000000047F000-memory.dmp upx behavioral1/memory/2348-52230-0x0000000000400000-0x000000000047F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Run\PopRock = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3bb9540039e411bae67403b78822d19c.exe" 3bb9540039e411bae67403b78822d19c.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\{BB65B0FB-5712-401b-B616-E69AC55E2757}.job 3bb9540039e411bae67403b78822d19c.exe File opened for modification C:\Windows\Tasks\{BB65B0FB-5712-401b-B616-E69AC55E2757}.job 3bb9540039e411bae67403b78822d19c.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2348 3bb9540039e411bae67403b78822d19c.exe 2348 3bb9540039e411bae67403b78822d19c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2348 2308 3bb9540039e411bae67403b78822d19c.exe 14 PID 2308 wrote to memory of 2348 2308 3bb9540039e411bae67403b78822d19c.exe 14 PID 2308 wrote to memory of 2348 2308 3bb9540039e411bae67403b78822d19c.exe 14 PID 2308 wrote to memory of 2348 2308 3bb9540039e411bae67403b78822d19c.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\3bb9540039e411bae67403b78822d19c.exeC:\Users\Admin\AppData\Local\Temp\3bb9540039e411bae67403b78822d19c.exe1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2348
-
C:\Users\Admin\AppData\Local\Temp\3bb9540039e411bae67403b78822d19c.exe"C:\Users\Admin\AppData\Local\Temp\3bb9540039e411bae67403b78822d19c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2308