Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 22:04
Static task
static1
Behavioral task
behavioral1
Sample
42048a61da76b88c075b9752dfed4359.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
42048a61da76b88c075b9752dfed4359.exe
Resource
win10v2004-20231222-en
General
-
Target
42048a61da76b88c075b9752dfed4359.exe
-
Size
68KB
-
MD5
42048a61da76b88c075b9752dfed4359
-
SHA1
8cbae9276790eb0e9ecc619dfc2a53a6da3ed374
-
SHA256
768dd6ae63b5b01e5b7f0c3d52433e483c1d36e2a9645db30bba1a12d56130dc
-
SHA512
632c689cce04aff80673d01e2369413cfaed287fc84bc9cdff6348b2149629375b8b00d2cac297a0706ed5d614c685e907ae5511d2bce1b8965544583eb42242
-
SSDEEP
768:2cqliTduSTAl+qOQSgFrhKo//WomvdfQXwYt1IEDIefZsK:NqIxTTAcqOK3qowgnt1d
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 42048a61da76b88c075b9752dfed4359.exe Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Admin.exe -
Executes dropped EXE 1 IoCs
pid Process 2528 Admin.exe -
Loads dropped DLL 2 IoCs
pid Process 1272 42048a61da76b88c075b9752dfed4359.exe 1272 42048a61da76b88c075b9752dfed4359.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe" 42048a61da76b88c075b9752dfed4359.exe Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe" Admin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1272 42048a61da76b88c075b9752dfed4359.exe 1272 42048a61da76b88c075b9752dfed4359.exe 1272 42048a61da76b88c075b9752dfed4359.exe 2528 Admin.exe 1272 42048a61da76b88c075b9752dfed4359.exe 2528 Admin.exe 1272 42048a61da76b88c075b9752dfed4359.exe 2528 Admin.exe 1272 42048a61da76b88c075b9752dfed4359.exe 2528 Admin.exe 1272 42048a61da76b88c075b9752dfed4359.exe 2528 Admin.exe 1272 42048a61da76b88c075b9752dfed4359.exe 2528 Admin.exe 1272 42048a61da76b88c075b9752dfed4359.exe 2528 Admin.exe 1272 42048a61da76b88c075b9752dfed4359.exe 2528 Admin.exe 2528 Admin.exe 1272 42048a61da76b88c075b9752dfed4359.exe 2528 Admin.exe 1272 42048a61da76b88c075b9752dfed4359.exe 2528 Admin.exe 1272 42048a61da76b88c075b9752dfed4359.exe 1272 42048a61da76b88c075b9752dfed4359.exe 2528 Admin.exe 2528 Admin.exe 1272 42048a61da76b88c075b9752dfed4359.exe 1272 42048a61da76b88c075b9752dfed4359.exe 2528 Admin.exe 2528 Admin.exe 1272 42048a61da76b88c075b9752dfed4359.exe 2528 Admin.exe 1272 42048a61da76b88c075b9752dfed4359.exe 1272 42048a61da76b88c075b9752dfed4359.exe 2528 Admin.exe 2528 Admin.exe 1272 42048a61da76b88c075b9752dfed4359.exe 1272 42048a61da76b88c075b9752dfed4359.exe 2528 Admin.exe 2528 Admin.exe 1272 42048a61da76b88c075b9752dfed4359.exe 2528 Admin.exe 1272 42048a61da76b88c075b9752dfed4359.exe 2528 Admin.exe 1272 42048a61da76b88c075b9752dfed4359.exe 2528 Admin.exe 1272 42048a61da76b88c075b9752dfed4359.exe 1272 42048a61da76b88c075b9752dfed4359.exe 2528 Admin.exe 2528 Admin.exe 1272 42048a61da76b88c075b9752dfed4359.exe 2528 Admin.exe 1272 42048a61da76b88c075b9752dfed4359.exe 1272 42048a61da76b88c075b9752dfed4359.exe 2528 Admin.exe 2528 Admin.exe 1272 42048a61da76b88c075b9752dfed4359.exe 2528 Admin.exe 1272 42048a61da76b88c075b9752dfed4359.exe 2528 Admin.exe 1272 42048a61da76b88c075b9752dfed4359.exe 1272 42048a61da76b88c075b9752dfed4359.exe 2528 Admin.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1272 42048a61da76b88c075b9752dfed4359.exe 2528 Admin.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1272 wrote to memory of 2528 1272 42048a61da76b88c075b9752dfed4359.exe 28 PID 1272 wrote to memory of 2528 1272 42048a61da76b88c075b9752dfed4359.exe 28 PID 1272 wrote to memory of 2528 1272 42048a61da76b88c075b9752dfed4359.exe 28 PID 1272 wrote to memory of 2528 1272 42048a61da76b88c075b9752dfed4359.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\42048a61da76b88c075b9752dfed4359.exe"C:\Users\Admin\AppData\Local\Temp\42048a61da76b88c075b9752dfed4359.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\Admin.exe"C:\Users\Admin\Admin.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5e16e8328dafaa82ae29c99edf4d87037
SHA14b660014bff77c0cc4d3c08a2f3b761d9edf301a
SHA2568130fae6d949051ec4a62cbd1c50afeba5c4dc014c03c19c3cceab52cba5d8c0
SHA5122a8a5c0ca13f8ed59c56447cb8b8d18bcb57c52278dd59b018fbefe6ec952c39edbcb9e1f4829b186a973a826a55e54a80d7c59c7fc0172091ba31491575bf77
-
Filesize
68KB
MD56b126542ef9ac9bb584be5f998e2a336
SHA1556d4e8d845e44bfbd53bc3085536db577c297ba
SHA25675a5e41832c09278068281503c44c53087076da4c02f027f2967903a0ca03214
SHA512a1c20b53f58a380394a49deb6c6f512988b21ea38fffee429f93fa08b5d934f4ba07a2a6c651042017d20d1f53b759236b278ab18863d538a39ceffed8454b33
-
Filesize
49KB
MD520b810ee14bc89367ce2f5ab02b0037f
SHA1b078b3137f43f65be5dd769abce6045f9b239838
SHA25674d5e452b6d2527153cacfb2ac93eed90c5f7a851640b5bb93d6cafbe91c0c6f
SHA512743ac351703dacca6d8b38bda898c8320029d4725240892c228e1c5623dcaa0c61d3bf6c8e7f438e465d5669cbc472a53ed1b09d8b50829afad185ec4fba9677