Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06/01/2024, 04:03
Static task
static1
Behavioral task
behavioral1
Sample
453b55c4edcb63c6cf3b2077b5d88991.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
453b55c4edcb63c6cf3b2077b5d88991.exe
Resource
win10v2004-20231222-en
General
-
Target
453b55c4edcb63c6cf3b2077b5d88991.exe
-
Size
14KB
-
MD5
453b55c4edcb63c6cf3b2077b5d88991
-
SHA1
3c9a1f1b0aaf2b6c5dc52a365afa9461107c0845
-
SHA256
6c055ad1d7d54b5eb0d13e16d55e740db81028913b81a3c00bdfaa2ebb66b645
-
SHA512
eacd69417e7d0e29ec8bcb5f36a65f4daf8ac0b562b79a7491afde0d92b0fdeb1665d03f10aacffb6ae720cbf22dcaff85eb49c1a86d67595b3e1b313c4f3e54
-
SSDEEP
192:Tb61S4bEpynRZtRjzDbiZlOWiknlLfP1oynlY2+IXesWnLM:3jBynRZtRPql/nlb1Y2+BsWL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2644 msccrt.exe -
Executes dropped EXE 1 IoCs
pid Process 2644 msccrt.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\msccrt = "C:\\Windows\\msccrt.exe" msccrt.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\msccrt.dll msccrt.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\msccrt.exe 453b55c4edcb63c6cf3b2077b5d88991.exe File opened for modification C:\Windows\msccrt.exe 453b55c4edcb63c6cf3b2077b5d88991.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2644 msccrt.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1620 453b55c4edcb63c6cf3b2077b5d88991.exe Token: SeDebugPrivilege 2644 msccrt.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2644 1620 453b55c4edcb63c6cf3b2077b5d88991.exe 28 PID 1620 wrote to memory of 2644 1620 453b55c4edcb63c6cf3b2077b5d88991.exe 28 PID 1620 wrote to memory of 2644 1620 453b55c4edcb63c6cf3b2077b5d88991.exe 28 PID 1620 wrote to memory of 2644 1620 453b55c4edcb63c6cf3b2077b5d88991.exe 28 PID 2644 wrote to memory of 1240 2644 msccrt.exe 21 PID 2644 wrote to memory of 1240 2644 msccrt.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\453b55c4edcb63c6cf3b2077b5d88991.exe"C:\Users\Admin\AppData\Local\Temp\453b55c4edcb63c6cf3b2077b5d88991.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\msccrt.exeC:\Windows\msccrt.exe @C:\Users\Admin\AppData\Local\Temp\453b55c4edcb63c6cf3b2077b5d88991.exe@16203⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5453b55c4edcb63c6cf3b2077b5d88991
SHA13c9a1f1b0aaf2b6c5dc52a365afa9461107c0845
SHA2566c055ad1d7d54b5eb0d13e16d55e740db81028913b81a3c00bdfaa2ebb66b645
SHA512eacd69417e7d0e29ec8bcb5f36a65f4daf8ac0b562b79a7491afde0d92b0fdeb1665d03f10aacffb6ae720cbf22dcaff85eb49c1a86d67595b3e1b313c4f3e54