Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05/01/2024, 06:11
Static task
static1
Behavioral task
behavioral1
Sample
42f416549ebd0dc588baf24fa81218e6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
42f416549ebd0dc588baf24fa81218e6.exe
Resource
win10v2004-20231215-en
General
-
Target
42f416549ebd0dc588baf24fa81218e6.exe
-
Size
127KB
-
MD5
42f416549ebd0dc588baf24fa81218e6
-
SHA1
cc3bbc05c73c6422e8a0c1167c76c00804e0fd77
-
SHA256
e51fb04b4c8dab811628ae9b8a18fb1318a4f4c108d4ff350093455ad9f6e29c
-
SHA512
ffd3b063307a1e8716e749beebf0e564f2261979e6954f570adfbcf312ec42bd594e9d1d7d8b895e23216d85050eeaa2593926d0fdf5b93125237ba884aca90e
-
SSDEEP
3072:sXqmPW+E0K7IbvJfGSl5Ygr35NjMS7RV/96lNd7eD4hTzT/+j:sXqmdEz7Ijo457klNdCKK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2808 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 1212 42f416549ebd0dc588baf24fa81218e6.exe 1212 42f416549ebd0dc588baf24fa81218e6.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\svchost.exe" 42f416549ebd0dc588baf24fa81218e6.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\T: svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1212 wrote to memory of 2808 1212 42f416549ebd0dc588baf24fa81218e6.exe 28 PID 1212 wrote to memory of 2808 1212 42f416549ebd0dc588baf24fa81218e6.exe 28 PID 1212 wrote to memory of 2808 1212 42f416549ebd0dc588baf24fa81218e6.exe 28 PID 1212 wrote to memory of 2808 1212 42f416549ebd0dc588baf24fa81218e6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\42f416549ebd0dc588baf24fa81218e6.exe"C:\Users\Admin\AppData\Local\Temp\42f416549ebd0dc588baf24fa81218e6.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
127KB
MD542f416549ebd0dc588baf24fa81218e6
SHA1cc3bbc05c73c6422e8a0c1167c76c00804e0fd77
SHA256e51fb04b4c8dab811628ae9b8a18fb1318a4f4c108d4ff350093455ad9f6e29c
SHA512ffd3b063307a1e8716e749beebf0e564f2261979e6954f570adfbcf312ec42bd594e9d1d7d8b895e23216d85050eeaa2593926d0fdf5b93125237ba884aca90e