Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    01/01/2024, 16:57

General

  • Target

    3d6258aff21a972ac848fcbc0da64cf3.exe

  • Size

    96KB

  • MD5

    3d6258aff21a972ac848fcbc0da64cf3

  • SHA1

    10071a7805bbef129c549201a75cb812263536a6

  • SHA256

    e46e71e8c6cda6f143dfcc6a319badd0add38b3e25a4d6fddae59b17bd512ee4

  • SHA512

    71be70c461d02cd4b171b7f0c25220fe8f1eed3af27e9e0b14703ad158bf9771769639d1296c3ba2e472bc402373a05a11e6a37ebdca6e067cdcccaf6bd730ca

  • SSDEEP

    1536:BVsieIi8aA0a2uIU+OBTiaTJn8etNNOhj/85Wa1sqARs9LJK0R+:BRez8JPIU5Tlnrtv47qMoo0R+

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 8 IoCs
  • Drops file in System32 directory 13 IoCs
  • Modifies data under HKEY_USERS 24 IoCs
  • Modifies registry class 64 IoCs
  • Runs net.exe
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d6258aff21a972ac848fcbc0da64cf3.exe
    "C:\Users\Admin\AppData\Local\Temp\3d6258aff21a972ac848fcbc0da64cf3.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1476
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c "net start 26EDC"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2068
    • C:\Windows\SysWOW64\26EDC.exe
      C:\Windows\system32\26EDC.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2892
  • C:\Windows\SysWOW64\net1.exe
    C:\Windows\system32\net1 start 26EDC
    1⤵
      PID:3040
    • C:\Windows\SysWOW64\net.exe
      net start 26EDC
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1732
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c "net start 26EDC"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2680
    • C:\Windows\SysWOW64\26EDC.exe
      C:\Windows\SysWOW64\26EDC.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2660
      • C:\Windows\SysWOW64\D494F.exe
        C:\Windows\system32\D494F.exe eee
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Modifies data under HKEY_USERS
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:1656
    • C:\Windows\SysWOW64\net1.exe
      C:\Windows\system32\net1 start 26EDC
      1⤵
        PID:2656
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 start 26EDC
        1⤵
          PID:2612
        • C:\Windows\SysWOW64\net.exe
          net start 26EDC
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:2604
        • C:\Windows\SysWOW64\net.exe
          net start 26EDC
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:2820
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c "net start 26EDC"
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:2740

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\26EDC.exe

          Filesize

          96KB

          MD5

          3d6258aff21a972ac848fcbc0da64cf3

          SHA1

          10071a7805bbef129c549201a75cb812263536a6

          SHA256

          e46e71e8c6cda6f143dfcc6a319badd0add38b3e25a4d6fddae59b17bd512ee4

          SHA512

          71be70c461d02cd4b171b7f0c25220fe8f1eed3af27e9e0b14703ad158bf9771769639d1296c3ba2e472bc402373a05a11e6a37ebdca6e067cdcccaf6bd730ca

        • C:\Windows\SysWOW64\D494F.exe

          Filesize

          92KB

          MD5

          a25d6bcc5e83d8668bb465af4e465c5e

          SHA1

          93ff26261aff15c3263df4c0246852e838c54a8c

          SHA256

          b759bb2fd3751186cc6c2988faa23f9f27b66f56dc008a6d45e3239a266bd4e6

          SHA512

          3f998eee5205df3166b1d2538a3095a40704ed00b06b4195c6ee7ea696dcc2a2833a7493e61ad729856aa524e7bb2a1fa976b99f46dde93ef428b17282a3dd95

        • C:\Windows\SysWOW64\MSWINSCK.OCX

          Filesize

          92KB

          MD5

          c375a79c5b71d9ea66c0f7d307062d50

          SHA1

          989ba225501aab3402b7883edeb7927c32e281f8

          SHA256

          55dee621e9890672484946fd3a3097c4cf0d303a6d50fa598baac2c5a4352de4

          SHA512

          99e48fa3ba99775213a8d5d5f35104b7d4a055483b78a520b0d3af887d84182c2608022875fb82cadadd06be0f0409a8866aaf6dfaaf8b32524095aaa8c41d85

        • \Windows\SysWOW64\D494F.exe

          Filesize

          98KB

          MD5

          ff0bfbcd96ed5890ea32d9fd1ed5ebc2

          SHA1

          3a2f5814bf3b8fdfa3a7dd34291e4800dd0f46bc

          SHA256

          9c9f5a1cce939c29170b2056b084503b16e8fb30dabd59db757e6bf23358dbea

          SHA512

          6fcbbf77c0017879b50d34400dbb65bb79ca8aabec9f2c66c78199baf82616728d8df91e8d98f6505c10ad720d792523e23d9fc6f38f8ed4a4e9ce0981e8766a

        • memory/1476-18-0x0000000000400000-0x0000000000448000-memory.dmp

          Filesize

          288KB

        • memory/1476-0-0x0000000000400000-0x0000000000448000-memory.dmp

          Filesize

          288KB

        • memory/1476-12-0x0000000000240000-0x0000000000288000-memory.dmp

          Filesize

          288KB

        • memory/1476-1-0x0000000000020000-0x0000000000022000-memory.dmp

          Filesize

          8KB

        • memory/2660-22-0x0000000000400000-0x0000000000448000-memory.dmp

          Filesize

          288KB

        • memory/2660-23-0x0000000000020000-0x0000000000022000-memory.dmp

          Filesize

          8KB

        • memory/2660-41-0x0000000000400000-0x0000000000448000-memory.dmp

          Filesize

          288KB

        • memory/2892-17-0x0000000000400000-0x0000000000448000-memory.dmp

          Filesize

          288KB

        • memory/2892-15-0x0000000000020000-0x0000000000022000-memory.dmp

          Filesize

          8KB

        • memory/2892-14-0x0000000000400000-0x0000000000448000-memory.dmp

          Filesize

          288KB