Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 19:43
Static task
static1
Behavioral task
behavioral1
Sample
3db636a478c20b1ab0e904da4d0c68b9.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3db636a478c20b1ab0e904da4d0c68b9.exe
Resource
win10v2004-20231215-en
General
-
Target
3db636a478c20b1ab0e904da4d0c68b9.exe
-
Size
220KB
-
MD5
3db636a478c20b1ab0e904da4d0c68b9
-
SHA1
1a41f0eed7ebf12b7343a462a4fab16596ac8034
-
SHA256
dba13d4cecd44dfcd69331701d6fdab3cca66c09e9c061dcf7f65eb881e8c6fa
-
SHA512
7f9bb01138f4433bad509368ef2e378475699dd03161d34bbd84ebc890dce1f0e23bfb56b03461e0464d0bb5abaabd226d9e358f571e0a84609e3b467daaa87a
-
SSDEEP
3072:ttCnFCqR8Ss361HRcaZ72fWXIxZXDXrj2kiCay8Rqrica9/aR2OJ+ndsX7v4qXx/:Ocq0361HRcf3VAjv3cCalDt
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3064 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3036 fzhqrulv.exe -
Loads dropped DLL 4 IoCs
pid Process 3064 cmd.exe 3064 cmd.exe 3036 fzhqrulv.exe 3036 fzhqrulv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 2172 taskkill.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2680 PING.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3036 fzhqrulv.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2172 taskkill.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3036 fzhqrulv.exe 3036 fzhqrulv.exe 3036 fzhqrulv.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3036 fzhqrulv.exe 3036 fzhqrulv.exe 3036 fzhqrulv.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 880 wrote to memory of 3064 880 3db636a478c20b1ab0e904da4d0c68b9.exe 21 PID 880 wrote to memory of 3064 880 3db636a478c20b1ab0e904da4d0c68b9.exe 21 PID 880 wrote to memory of 3064 880 3db636a478c20b1ab0e904da4d0c68b9.exe 21 PID 880 wrote to memory of 3064 880 3db636a478c20b1ab0e904da4d0c68b9.exe 21 PID 3064 wrote to memory of 2172 3064 cmd.exe 17 PID 3064 wrote to memory of 2172 3064 cmd.exe 17 PID 3064 wrote to memory of 2172 3064 cmd.exe 17 PID 3064 wrote to memory of 2172 3064 cmd.exe 17 PID 3064 wrote to memory of 2680 3064 cmd.exe 18 PID 3064 wrote to memory of 2680 3064 cmd.exe 18 PID 3064 wrote to memory of 2680 3064 cmd.exe 18 PID 3064 wrote to memory of 2680 3064 cmd.exe 18 PID 3064 wrote to memory of 3036 3064 cmd.exe 33 PID 3064 wrote to memory of 3036 3064 cmd.exe 33 PID 3064 wrote to memory of 3036 3064 cmd.exe 33 PID 3064 wrote to memory of 3036 3064 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\3db636a478c20b1ab0e904da4d0c68b9.exe"C:\Users\Admin\AppData\Local\Temp\3db636a478c20b1ab0e904da4d0c68b9.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /pid 880 & ping -n 3 127.1 & del /f /q "C:\Users\Admin\AppData\Local\Temp\3db636a478c20b1ab0e904da4d0c68b9.exe" & start C:\Users\Admin\AppData\Local\fzhqrulv.exe -f2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\fzhqrulv.exeC:\Users\Admin\AppData\Local\fzhqrulv.exe -f3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3036
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /pid 8801⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2172
-
C:\Windows\SysWOW64\PING.EXEping -n 3 127.11⤵
- Runs ping.exe
PID:2680