Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 20:21
Static task
static1
Behavioral task
behavioral1
Sample
3dcb1fd38aa6652f0d1e89be4cb1fc8c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3dcb1fd38aa6652f0d1e89be4cb1fc8c.exe
Resource
win10v2004-20231215-en
General
-
Target
3dcb1fd38aa6652f0d1e89be4cb1fc8c.exe
-
Size
374KB
-
MD5
3dcb1fd38aa6652f0d1e89be4cb1fc8c
-
SHA1
ac968738b2b2ffd5547e24bab19da5406876825f
-
SHA256
2120c3a76f104d7962085d38480bf27d2664d30d1b560b9fc6bcd7b3f46c9aec
-
SHA512
893057b3a3505bf75ed3735d37933d35812af44190a3dd0064c62d9d091c0a1f4d4bf336086577161658631a1b23982080857487abef2c09f9cd9c3f2ed86d9b
-
SSDEEP
6144:XLPA/STp6gTF2idZecnl20lHRxp3gslk9ihl0/srEQpPK+e1FtEuxF+U2/kW:X99lRF3Z4mxx/oEtlK+kt9T2MW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2808 PPKart.exe -
Loads dropped DLL 3 IoCs
pid Process 1948 3dcb1fd38aa6652f0d1e89be4cb1fc8c.exe 1948 3dcb1fd38aa6652f0d1e89be4cb1fc8c.exe 2808 PPKart.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3dcb1fd38aa6652f0d1e89be4cb1fc8c.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\Microsoft Shared\MSINFO\atmPP2.dll PPKart.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2808 PPKart.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2808 1948 3dcb1fd38aa6652f0d1e89be4cb1fc8c.exe 14 PID 1948 wrote to memory of 2808 1948 3dcb1fd38aa6652f0d1e89be4cb1fc8c.exe 14 PID 1948 wrote to memory of 2808 1948 3dcb1fd38aa6652f0d1e89be4cb1fc8c.exe 14 PID 1948 wrote to memory of 2808 1948 3dcb1fd38aa6652f0d1e89be4cb1fc8c.exe 14
Processes
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PPKart.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\PPKart.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:2808
-
C:\Users\Admin\AppData\Local\Temp\3dcb1fd38aa6652f0d1e89be4cb1fc8c.exe"C:\Users\Admin\AppData\Local\Temp\3dcb1fd38aa6652f0d1e89be4cb1fc8c.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53d0c08052e53ef27c710a3b196504547
SHA1f96351674f4d647bf49701fb502282e59877b805
SHA256cb7fcd049c044f49f98e9e29d7ee5bb277514079f77d2d661fda23fabfce4d56
SHA512063ae761acb0fd8741439d06a62a7bad32a04e58099b55fabbfc1c9de5e8254f846023e21928a8847097c680a37ce0c593136030b44bc76c2c372c41bc27f77e
-
Filesize
14KB
MD5f1979ddd2fb35b8a2612506b14f5122f
SHA133faece827f2ccf49dab4309c91fec0b50d9dc02
SHA25624f59dd80b913a9b83c99cb4578c7935037b8c3f4c036abd6f876691630c10a3
SHA51285590a01934db1f334cdc0d4707bf2e6c7e1b805f1de74a8513407b7bd23e334186dc5ba487bd4792b1ac50645421e0a965c0a9657b05b0768ff15bba047434e