Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 19:57
Static task
static1
Behavioral task
behavioral1
Sample
2308ed21c12b2b43e8e22d1e595ef5e7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2308ed21c12b2b43e8e22d1e595ef5e7.exe
Resource
win10v2004-20231222-en
General
-
Target
2308ed21c12b2b43e8e22d1e595ef5e7.exe
-
Size
10.4MB
-
MD5
2308ed21c12b2b43e8e22d1e595ef5e7
-
SHA1
613d67ac63f1229c170412e0d39f6dcb46b5ca5b
-
SHA256
1dd9b91d9204e448403d82f29f1327979781e2b48e37825ba75d9f78e858d95a
-
SHA512
401ef803ec044fd1078d0893a926d5dcafd80cf54c7260bb79495b564a83aa8211d4dec2d76b6be1182616eab1db0373de826a6c939792e3fda93fe7e60934dc
-
SSDEEP
24576:slxdvCcpOKCtBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBT:slzOR
Malware Config
Extracted
tofsee
defeatwax.ru
refabyd.info
Signatures
-
Creates new service(s) 1 TTPs
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2812 netsh.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2400 sc.exe 2844 sc.exe 2388 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2436 wrote to memory of 1216 2436 2308ed21c12b2b43e8e22d1e595ef5e7.exe 29 PID 2436 wrote to memory of 1216 2436 2308ed21c12b2b43e8e22d1e595ef5e7.exe 29 PID 2436 wrote to memory of 1216 2436 2308ed21c12b2b43e8e22d1e595ef5e7.exe 29 PID 2436 wrote to memory of 1216 2436 2308ed21c12b2b43e8e22d1e595ef5e7.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\2308ed21c12b2b43e8e22d1e595ef5e7.exe"C:\Users\Admin\AppData\Local\Temp\2308ed21c12b2b43e8e22d1e595ef5e7.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C mkdir C:\Windows\SysWOW64\vltzcppi\2⤵PID:1216
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C move /Y "C:\Users\Admin\AppData\Local\Temp\rmwznyyg.exe" C:\Windows\SysWOW64\vltzcppi\2⤵PID:2132
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" create vltzcppi binPath= "C:\Windows\SysWOW64\vltzcppi\rmwznyyg.exe /d\"C:\Users\Admin\AppData\Local\Temp\2308ed21c12b2b43e8e22d1e595ef5e7.exe\"" type= own start= auto DisplayName= "wifi support"2⤵
- Launches sc.exe
PID:2388
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" description vltzcppi "wifi internet conection"2⤵
- Launches sc.exe
PID:2400
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" start vltzcppi2⤵
- Launches sc.exe
PID:2844
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="Host-process for services of Windows" dir=in action=allow program="C:\Windows\SysWOW64\svchost.exe" enable=yes>nul2⤵
- Modifies Windows Firewall
PID:2812
-
-
C:\Windows\SysWOW64\vltzcppi\rmwznyyg.exeC:\Windows\SysWOW64\vltzcppi\rmwznyyg.exe /d"C:\Users\Admin\AppData\Local\Temp\2308ed21c12b2b43e8e22d1e595ef5e7.exe"1⤵PID:2896
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:2688
-