Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/01/2024, 20:27
Static task
static1
Behavioral task
behavioral1
Sample
3f00a9c4b14481bd86f8022e63eda48f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3f00a9c4b14481bd86f8022e63eda48f.exe
Resource
win10v2004-20231215-en
General
-
Target
3f00a9c4b14481bd86f8022e63eda48f.exe
-
Size
197KB
-
MD5
3f00a9c4b14481bd86f8022e63eda48f
-
SHA1
3b61e596441bcbeb8176413e68a04f49a87b3366
-
SHA256
fb25db075a57a1a9c51115eaad1a8dc42f7f7344d8aedf1b864887b521b440c4
-
SHA512
f58fe438635e4ed27a7e7e595f0cf68c6454300f2df41875177607e3dd3652af4985b86cdcc8459e7c1535ae61aa2051bcaebf22cedb76454dd66cb79a7a42e2
-
SSDEEP
3072:O2VzMvCZU0OGReIhOJoA72uIiSjy3gm9FaXAnU3PXAvAm6mlzbl7735lNxlmSbR8:PrZUkReIh/o3zn1UfXAYhU3lXJ7xlm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2388 Hsitaa.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\TG0PTF86JH = "C:\\Windows\\Hsitaa.exe" Hsitaa.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job 3f00a9c4b14481bd86f8022e63eda48f.exe File opened for modification C:\Windows\Tasks\{35DC3473-A719-4d14-B7C1-FD326CA84A0C}.job 3f00a9c4b14481bd86f8022e63eda48f.exe File created C:\Windows\Hsitaa.exe 3f00a9c4b14481bd86f8022e63eda48f.exe File opened for modification C:\Windows\Hsitaa.exe 3f00a9c4b14481bd86f8022e63eda48f.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe 2388 Hsitaa.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1216 wrote to memory of 2388 1216 3f00a9c4b14481bd86f8022e63eda48f.exe 28 PID 1216 wrote to memory of 2388 1216 3f00a9c4b14481bd86f8022e63eda48f.exe 28 PID 1216 wrote to memory of 2388 1216 3f00a9c4b14481bd86f8022e63eda48f.exe 28 PID 1216 wrote to memory of 2388 1216 3f00a9c4b14481bd86f8022e63eda48f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f00a9c4b14481bd86f8022e63eda48f.exe"C:\Users\Admin\AppData\Local\Temp\3f00a9c4b14481bd86f8022e63eda48f.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\Hsitaa.exeC:\Windows\Hsitaa.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2388
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
197KB
MD53f00a9c4b14481bd86f8022e63eda48f
SHA13b61e596441bcbeb8176413e68a04f49a87b3366
SHA256fb25db075a57a1a9c51115eaad1a8dc42f7f7344d8aedf1b864887b521b440c4
SHA512f58fe438635e4ed27a7e7e595f0cf68c6454300f2df41875177607e3dd3652af4985b86cdcc8459e7c1535ae61aa2051bcaebf22cedb76454dd66cb79a7a42e2
-
Filesize
344B
MD568d6055659b7e2ce72ed2101447aeb57
SHA1dbbac5eb00c02b1c9aeb2c141612c23e0137ee54
SHA256dd05f07c7b8762fbe404c54cac27164ab4b61e8c3c32c1ae8d77003273ae4ccb
SHA51245755481fb9fd246fa20acd9c0a44ba974261c91e0c58277e250fd10f820f7c35f30087194a6d797923348a57096cbdfaa38c5f0893b9c0c926f5b0f3ae3e679