Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 17:23
Static task
static1
Behavioral task
behavioral1
Sample
41779bb1c1019e7bd0cbedb12600b88b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
41779bb1c1019e7bd0cbedb12600b88b.exe
Resource
win10v2004-20231215-en
General
-
Target
41779bb1c1019e7bd0cbedb12600b88b.exe
-
Size
205KB
-
MD5
41779bb1c1019e7bd0cbedb12600b88b
-
SHA1
64785640f72d7cc4f3da804197a3cf8b278b30ff
-
SHA256
2974a704684460d3d9e5bc9c141fc2264280705dbf7cef6f4335f0d30f56a45c
-
SHA512
9ca7455c43be74bc002f1e55e4db2f527e71930472d122ea0ecf47453a5799ec5cb564e51944589fd5d28a0ae6efb15817036895645a745638fb6b4df140e4e0
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8tkgnYHfQlAp:o68i3odBiTl2+TCU/Tk8KfQlQ
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 41779bb1c1019e7bd0cbedb12600b88b.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\winhash_up.exe 41779bb1c1019e7bd0cbedb12600b88b.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 41779bb1c1019e7bd0cbedb12600b88b.exe File created C:\Windows\SHARE_TEMP\Icon13.ico 41779bb1c1019e7bd0cbedb12600b88b.exe File created C:\Windows\bugMAKER.bat 41779bb1c1019e7bd0cbedb12600b88b.exe File created C:\Windows\winhash_up.exez 41779bb1c1019e7bd0cbedb12600b88b.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 41779bb1c1019e7bd0cbedb12600b88b.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 41779bb1c1019e7bd0cbedb12600b88b.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 41779bb1c1019e7bd0cbedb12600b88b.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 41779bb1c1019e7bd0cbedb12600b88b.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 41779bb1c1019e7bd0cbedb12600b88b.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 41779bb1c1019e7bd0cbedb12600b88b.exe File opened for modification C:\Windows\winhash_up.exez 41779bb1c1019e7bd0cbedb12600b88b.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 41779bb1c1019e7bd0cbedb12600b88b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1032 wrote to memory of 2788 1032 41779bb1c1019e7bd0cbedb12600b88b.exe 28 PID 1032 wrote to memory of 2788 1032 41779bb1c1019e7bd0cbedb12600b88b.exe 28 PID 1032 wrote to memory of 2788 1032 41779bb1c1019e7bd0cbedb12600b88b.exe 28 PID 1032 wrote to memory of 2788 1032 41779bb1c1019e7bd0cbedb12600b88b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\41779bb1c1019e7bd0cbedb12600b88b.exe"C:\Users\Admin\AppData\Local\Temp\41779bb1c1019e7bd0cbedb12600b88b.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:2788
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD532fb28ecb036daf5ac74b6005f851772
SHA150bfcb16484549d61b858ed20ce2c73f993467d4
SHA256b2422ee8f14bf1f479e3a3a4600027b7621e777ce42bf57a3355da5124d5165a
SHA512160943546dbbb838db30230f6ba2eb3a1001a600a62736dc8255fdfef62468ebca13097796aed2346268e98a30de58e5a5d306fcddd4303b8a46d4351530168a