Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 15:26
Static task
static1
Behavioral task
behavioral1
Sample
3d3551639b232de882d1396c1780e520.exe
Resource
win7-20231215-en
General
-
Target
3d3551639b232de882d1396c1780e520.exe
-
Size
1.5MB
-
MD5
3d3551639b232de882d1396c1780e520
-
SHA1
335c6cc43c820943dc62db9d2245bef54a15d78e
-
SHA256
e789a6e6e52c30deacb7d20805ec300038c4c9f2f92d73a27a1d9c9dd7802289
-
SHA512
9330a61bb236c75e7cfe0fb8ab7093250428fa22b257e9396b6f62acd4dbba84e8a523d2ff28f47d3af9a82df778e8a14e6682a6abfa6aff536fa0a483a9bece
-
SSDEEP
24576:TphwrIhv1qQjtY2jBe4NNl51X32mmYJL1g6gTcTK0gJnSpillA:TpHx1zd7/xpg6vTLgVmillA
Malware Config
Signatures
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3d3551639b232de882d1396c1780e520.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2356 3d3551639b232de882d1396c1780e520.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe 2356 3d3551639b232de882d1396c1780e520.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2872 2356 3d3551639b232de882d1396c1780e520.exe 28 PID 2356 wrote to memory of 2872 2356 3d3551639b232de882d1396c1780e520.exe 28 PID 2356 wrote to memory of 2872 2356 3d3551639b232de882d1396c1780e520.exe 28 PID 2356 wrote to memory of 2872 2356 3d3551639b232de882d1396c1780e520.exe 28 PID 2872 wrote to memory of 2744 2872 cmd.exe 30 PID 2872 wrote to memory of 2744 2872 cmd.exe 30 PID 2872 wrote to memory of 2744 2872 cmd.exe 30 PID 2872 wrote to memory of 2744 2872 cmd.exe 30 PID 2744 wrote to memory of 2692 2744 net.exe 31 PID 2744 wrote to memory of 2692 2744 net.exe 31 PID 2744 wrote to memory of 2692 2744 net.exe 31 PID 2744 wrote to memory of 2692 2744 net.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d3551639b232de882d1396c1780e520.exe"C:\Users\Admin\AppData\Local\Temp\3d3551639b232de882d1396c1780e520.exe"1⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop Spooler2⤵
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\net.exenet stop Spooler3⤵
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Spooler4⤵PID:2692
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding1⤵PID:2076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f4425e2dbad18b27a473d5a9828e43bb
SHA1f84d6b92656d00d081ee5ef8ab21b7028c12938b
SHA256eae8a0f72b92e0d3e2095001df76d8eb25d1161bf9256b145e1e59c8a3b8dc5a
SHA51260ee6dccc9a54e1024359103ea054f80d3b7f647214f82562c7a569dba3fd46c54d8975ce4a1a8fcb03211e124fc1ef27a2dd6fa93861db8cf0fd79ccad0abde