Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 14:11
Static task
static1
Behavioral task
behavioral1
Sample
4111b26bc3a915c2fcefc4deaa1c61cb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4111b26bc3a915c2fcefc4deaa1c61cb.exe
Resource
win10v2004-20231215-en
General
-
Target
4111b26bc3a915c2fcefc4deaa1c61cb.exe
-
Size
113KB
-
MD5
4111b26bc3a915c2fcefc4deaa1c61cb
-
SHA1
da6c06bb211f8410436ed8de04a868707df8c53c
-
SHA256
64da52a89d0b6ec1821ebdb657c9aa3fad75480f7720b2263f4d89894ec7f508
-
SHA512
b26cc1fbfd71b694674ced0e2a3b26be84397858eb1c2ed794c1c3805173b6d5a2820af1deaa1ab85191deb0c2c7b9cf61c12a6ad58a56b3e6fab6812aea1215
-
SSDEEP
3072:qyXLk5H/DjYuAk2RTWti0o7DriNQLAAuHyW+9+Cl43v/bo3cA:qu4H/ouAji4CNqLQf443bo3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2228 qwrtaw5.exe -
Loads dropped DLL 2 IoCs
pid Process 1944 4111b26bc3a915c2fcefc4deaa1c61cb.exe 1944 4111b26bc3a915c2fcefc4deaa1c61cb.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Explorer = "C:\\ProgramData\\qwrtaw5.exe" qwrtaw5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 qwrtaw5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier qwrtaw5.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 4111b26bc3a915c2fcefc4deaa1c61cb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 4111b26bc3a915c2fcefc4deaa1c61cb.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1944 4111b26bc3a915c2fcefc4deaa1c61cb.exe Token: SeDebugPrivilege 2228 qwrtaw5.exe Token: SeDebugPrivilege 2228 qwrtaw5.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1944 wrote to memory of 2228 1944 4111b26bc3a915c2fcefc4deaa1c61cb.exe 28 PID 1944 wrote to memory of 2228 1944 4111b26bc3a915c2fcefc4deaa1c61cb.exe 28 PID 1944 wrote to memory of 2228 1944 4111b26bc3a915c2fcefc4deaa1c61cb.exe 28 PID 1944 wrote to memory of 2228 1944 4111b26bc3a915c2fcefc4deaa1c61cb.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4111b26bc3a915c2fcefc4deaa1c61cb.exe"C:\Users\Admin\AppData\Local\Temp\4111b26bc3a915c2fcefc4deaa1c61cb.exe"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\ProgramData\qwrtaw5.exe"C:\ProgramData\qwrtaw5.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:2228
-