Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08/01/2024, 10:32 UTC
Static task
static1
Behavioral task
behavioral1
Sample
4b33702216949b8afe8794ecfc2cf504.exe
Resource
win7-20231215-en
General
-
Target
4b33702216949b8afe8794ecfc2cf504.exe
-
Size
4.2MB
-
MD5
4b33702216949b8afe8794ecfc2cf504
-
SHA1
76e060bc70507789bb7dd9e3f68ee9f6a8e6718c
-
SHA256
11004be319514e886ed27a41905e3ef648c307c09219c77917986cf5b5a7665b
-
SHA512
7cc2ac87c0e5fc0eccfe06ed302da4c42cdbd392f3f2ed8ab53137a82745632906e5adb3fd6fbee4389b6df1bfb9a4b0850e6722331e800bd14df925b9cca5d9
-
SSDEEP
98304:X14Wq9ua3mHJJPF9d2SxuvtjWQXoB7RDcQ22ZRsFJITw8n7g:l4Wq9uAmfwSxuFjJ4txdRsFOy
Malware Config
Signatures
-
Async RAT payload 8 IoCs
resource yara_rule behavioral1/memory/2396-19-0x00000000001C0000-0x0000000000252000-memory.dmp asyncrat behavioral1/files/0x000d00000001232a-17.dat asyncrat behavioral1/files/0x000d00000001232a-16.dat asyncrat behavioral1/files/0x000d00000001232a-13.dat asyncrat behavioral1/files/0x00360000000146c8-83.dat asyncrat behavioral1/memory/1676-89-0x00000000000C0000-0x0000000000152000-memory.dmp asyncrat behavioral1/files/0x00360000000146c8-87.dat asyncrat behavioral1/files/0x00360000000146c8-86.dat asyncrat -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2144 netsh.exe -
Executes dropped EXE 3 IoCs
pid Process 2912 LocalcvWDakIwue.exe 2396 LocalRtQvDmqDGH.exe 2652 CDS.exe -
Loads dropped DLL 6 IoCs
pid Process 1048 4b33702216949b8afe8794ecfc2cf504.exe 1048 4b33702216949b8afe8794ecfc2cf504.exe 2912 LocalcvWDakIwue.exe 2912 LocalcvWDakIwue.exe 2652 CDS.exe 2652 CDS.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" LocalcvWDakIwue.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2260 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1696 timeout.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2652 CDS.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1048 wrote to memory of 2912 1048 4b33702216949b8afe8794ecfc2cf504.exe 31 PID 1048 wrote to memory of 2912 1048 4b33702216949b8afe8794ecfc2cf504.exe 31 PID 1048 wrote to memory of 2912 1048 4b33702216949b8afe8794ecfc2cf504.exe 31 PID 1048 wrote to memory of 2912 1048 4b33702216949b8afe8794ecfc2cf504.exe 31 PID 1048 wrote to memory of 2912 1048 4b33702216949b8afe8794ecfc2cf504.exe 31 PID 1048 wrote to memory of 2912 1048 4b33702216949b8afe8794ecfc2cf504.exe 31 PID 1048 wrote to memory of 2912 1048 4b33702216949b8afe8794ecfc2cf504.exe 31 PID 1048 wrote to memory of 2396 1048 4b33702216949b8afe8794ecfc2cf504.exe 30 PID 1048 wrote to memory of 2396 1048 4b33702216949b8afe8794ecfc2cf504.exe 30 PID 1048 wrote to memory of 2396 1048 4b33702216949b8afe8794ecfc2cf504.exe 30 PID 1048 wrote to memory of 2396 1048 4b33702216949b8afe8794ecfc2cf504.exe 30 PID 2912 wrote to memory of 2652 2912 LocalcvWDakIwue.exe 29 PID 2912 wrote to memory of 2652 2912 LocalcvWDakIwue.exe 29 PID 2912 wrote to memory of 2652 2912 LocalcvWDakIwue.exe 29 PID 2912 wrote to memory of 2652 2912 LocalcvWDakIwue.exe 29 PID 2912 wrote to memory of 2652 2912 LocalcvWDakIwue.exe 29 PID 2912 wrote to memory of 2652 2912 LocalcvWDakIwue.exe 29 PID 2912 wrote to memory of 2652 2912 LocalcvWDakIwue.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b33702216949b8afe8794ecfc2cf504.exe"C:\Users\Admin\AppData\Local\Temp\4b33702216949b8afe8794ecfc2cf504.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\LocalRtQvDmqDGH.exe"C:\Users\Admin\AppData\LocalRtQvDmqDGH.exe"2⤵
- Executes dropped EXE
PID:2396 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp203D.tmp.bat""3⤵PID:1976
-
C:\Users\Admin\AppData\Roaming\Windows DeepSea.exe"C:\Users\Admin\AppData\Roaming\Windows DeepSea.exe"4⤵PID:1676
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Windows DeepSea" /tr '"C:\Users\Admin\AppData\Roaming\Windows DeepSea.exe"' & exit3⤵PID:1828
-
-
-
C:\Users\Admin\AppData\LocalcvWDakIwue.exe"C:\Users\Admin\AppData\LocalcvWDakIwue.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2912
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypted.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypted.exe"1⤵PID:2924
-
C:\Users\Admin\AppData\Roaming\WindowsApplication.exe"C:\Users\Admin\AppData\Roaming\WindowsApplication.exe"2⤵PID:1616
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\WindowsApplication.exe" "WindowsApplication.exe" ENABLE3⤵
- Modifies Windows Firewall
PID:2144
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CDS.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CDS.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2652
-
C:\Windows\SysWOW64\timeout.exetimeout 31⤵
- Delays execution with timeout.exe
PID:1696
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Windows DeepSea" /tr '"C:\Users\Admin\AppData\Roaming\Windows DeepSea.exe"'1⤵
- Creates scheduled task(s)
PID:2260
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5f77481eee8e8b139226df29b81d55269
SHA109f152fba8cf4b450fa0449341fd0e9e1597cf8e
SHA256f55fac5ac966d894969d4a0150c322368ef4373625ebdf84d3b69de2c0ade186
SHA512a6462e9695e578e355cd883be1a41e97ee88d019bd4e3e8b81b4d2d1d10354f4b50e25e6c4c2b2b1359818bd8c6edd8211136c2a9e8e9b14f9cf1261036ce085
-
Filesize
74KB
MD55e6bfe0a86f12f5a930f46fadb7fccd4
SHA17cb7569673bc4c585fe622bf6ab045cfbc76260a
SHA256edac2d2e701f93da855cd972f9ec34e7e514f00d5428e9012a4dc070b0bebe4a
SHA5124968a7063e9b0c1d7240391698e93a6623e3d206238f59329df0d9a07400924297cc1af1c7ad8a6d099667c95ac2be46859662602f5700d2b2532ec9c112154f
-
Filesize
2KB
MD5340b294efc691d1b20c64175d565ebc7
SHA181cb9649bd1c9a62ae79e781818fc24d15c29ce7
SHA25672566894059452101ea836bbff9ede5069141eeb52022ab55baa24e1666825c9
SHA5121395a8e175c63a1a1ff459a9dac437156c74299272e020e7e078a087969251a8534f17244a529acbc1b6800a97d4c0abfa3c88f6fcb88423f56dfaae9b49fc3d
-
Filesize
13KB
MD53e7ecaeb51c2812d13b07ec852d74aaf
SHA1e9bdab93596ffb0f7f8c65243c579180939acb26
SHA256e7e942993864e8b18780ef10a415f7b93924c6378248c52f0c96895735222b96
SHA512635cd5173b595f1905af9eeea65037601cf8496d519c506b6d082662d438c26a1bfe653eaf6edcb117ccf8767975c37ab0238ca4c77574e2706f9b238a15ad4d
-
Filesize
47KB
MD59edf3d5858793e6f8c26d51debc1aa4a
SHA1d13674919ae1a8aedba54c71c3a01c7b1e267dcf
SHA256bb000131dc3f99826cb24850df9e572abb6cd44ddc7b92117dc6ff391e40bf20
SHA512633b33c6aed68f6a175a697850baa4546956b551baf6ae469495a55fdbb912d94daadeaef7c5af815453d3a19040e3c1092c91e9a500cd63ee48d6eab138800e
-
Filesize
42KB
MD52c7bc55d61ff9dbf946d3e0476d28911
SHA1ec9602859e99a69566f93910f3a32a86ff7b034a
SHA25605b2589bdd071916f619df422642e136b887992b8cba10b88100a129c628ad3b
SHA512e370586fdafd0e8bea74ed6a4970f64d563300615d95736a024c02e69524f6658d68c852a2d83f3a6d63c5a6a39e88f7ccc7df09221ef482f93de8a620e6fa8a
-
Filesize
50KB
MD56dc9f4c4b61c1498257f1516f7e6cef7
SHA10b5e00dc4a2495b6c01bcaec8b4affd6d24a8e64
SHA256e94a217782bdf7e38a5dc5ba1d954a322ecab333433e77d10ded343a6a96c4ef
SHA5121294038b07bafa7f003542b108e1fa0b70da4bd2974482a9bf2b4175098fa78d06e9f032fe273d04ace068399b881851a6b9cf342312588e71160d710d15d411
-
Filesize
39KB
MD56de10a6df0e0dbb9c4ad44967ce1d4b2
SHA155b9e9d4593413ea54a090e8cd4095a890a48336
SHA256b061a20668197682a2dec52c4c328926cb685859e1f54991ba73841c1b88017d
SHA5126a6809b03bba4fbf5a75af8fd33344c8732d28b0385d2176090767b6f9ff3c749f63fea0a9b3db137e34ab15c9dced4911d13b9a46175997729230cd264138ac
-
Filesize
29KB
MD5deddeaa26cc1fba0a7f03d2e0d934c9b
SHA10dd90db5361fc3ecedde2c5731c31d2e669e30ba
SHA2566f091bc6f60bddf90a679e5c7cbb2d1fec4076068284a4e35532d3c0b042f878
SHA5120b7a412847f26e7c3ab28c2475ceffa85923f07b166289c1fc82555d4eedb17cdf77f7727c77fc35697296a2999820de0a55d4bff82a81e189136319267394f0
-
Filesize
100KB
MD503eb03e4346eca6c6cfd3f303517310f
SHA10d5aec9fd731045045a18edf9aefef00c58d104a
SHA256cd7157c25ba98bf10373c74ec5e4bae51095dd8d138c4705712cf0c1f22919a7
SHA512853f6db8b48b6e089a09aea27304323a7dd416c8df4dffeff0ebb70ee49f374509137d5795004f5ad7edf4c81c6a946712328392c96a32bc8ec1de4262dca71f
-
Filesize
5B
MD568934a3e9455fa72420237eb05902327
SHA17cb6efb98ba5972a9b5090dc2e517fe14d12cb04
SHA256fcbcf165908dd18a9e49f7ff27810176db8e9f63b4352213741664245224f8aa
SHA512719fa67eef49c4b2a2b83f0c62bddd88c106aaadb7e21ae057c8802b700e36f81fe3f144812d8b05d66dc663d908b25645e153262cf6d457aa34e684af9e328d
-
Filesize
26KB
MD5231dedb97a5993f32c7fac0d1f5eabee
SHA1690e931d4b4bb84bea0314ca58b00be53755ff68
SHA2569daa7ce9bf5d93fc4ae23c0be86991e3f57a26330ed1566bd7c7f0b5adadc7db
SHA512d5af76d04c207e5ebe92f28e8fb63e33b6b67459888b51ec95d53fd19177dd4c45300ba71f966ad5465cee3e1dd0a1a73ea41ea06bf6c9a77aee7b7f9d6d0aec
-
Filesize
159B
MD55965e869589bfd08b7140baaa0782f64
SHA1b7539f3a211f73490a8f0a36cf2a30da16081967
SHA256320b86d536551416664d5c3852061fa91c8371fdcdd3ca2826e44dca5a0dee53
SHA512767f774dffdbc0efc93d296a9c11f8ff65c458bbbbaf9a554644ddff3617dfe0878ee07bf6a840666f94c4520e31aaaacab8aac2913fa10649df5854d936da84
-
Filesize
30KB
MD5c907717b0af9ed2af09ab4004cf3262b
SHA166d36ddad394acbba11a7557439c4e92dcdfd423
SHA2569248be3529652a937a003708f90e01e4651d5e7d706b8596521bb7377e8731aa
SHA51230be7c0a41648493b1189df7e3cfa21c21d342390b803d56c9dc9d39ae363a29cb46e62c571861c76c2b4158034dd3832e63af4e99f80c0436e0e4fbceb90e52
-
Filesize
57KB
MD5c2262936e349008223114b41cbd03692
SHA12b4ad7466add4f1c2481091cb76513c1e36e46fc
SHA2569ba17997a28fd4323bda8b8e3044aa64e3e87abb399450b4233624cd189c21d1
SHA5125080cd47760d6b0c102241965e436db581ea593326602dbe5e006fab62634c4addee7a14d10588cdefa052b494ca78e7cbafec5bd53a709afa211f04c8abb85a
-
Filesize
1KB
MD542023f5fbc43f5ad2835f9f3c4cc056a
SHA1daf61e35807b0602c9970b065404e41346e81087
SHA2566e4d5fef0e647015adcb4493c72d018a24f0dde2d42038f02635b3ac9eee0656
SHA5121b46a76ae42bc3aa4926f8141f68ba7a1dd235bc3cffc511717160a7704964bafb6f74b50a28dc7a22e12985432c4e26728f8853fe7af92aaddfb7830da384a5
-
Filesize
5KB
MD50e71a852910831796af5d45def4f0139
SHA15dbeaa7a099262c7645584073a6d5a8b239b68f5
SHA25634abf0abedd91b646fce0fe4bd8e58d99e431ebddff7a6ae41154bd0044cc016
SHA51211f5b79c90d815cf13aeaee154d1e24ac8c21fdf9ea2861e7882f5c36fc383e0432cdeebfe79700d2ce6e5ea6f28315b97abf2b4d2dc307b6700764f94b41f1d
-
Filesize
26KB
MD5d66e765aed9a1c4334dbc6ba83b314f1
SHA15c453041775f6feda387f01cbb5a4e31a8e4e58c
SHA25624d3d2f76ee9cf2903fdebd8127e7a1b05c2aa2f8466429cf9d2faa2b4094031
SHA5123b389506659bc3e8eb922b04b11b8ec945486e2b0f623a637f4945ccbde020f4ca29f8b7fc035518e7c254544387a02d3b9cfdc743793f76cce35f9d67c8e051
-
Filesize
49KB
MD52b81dbbe7931a618efe9c4cbc18afa2c
SHA1428a2969b28c29cd1ebd2bb445d7e4d607bb2095
SHA256259198c0d449d555aa5f42e02ae92fef220787374969645798e6c843aebaa904
SHA512e529b8e0c3bbc59e9bf65a435497b301e66037f0697c0c089daac0bece7b7e7bc27f22b297193db053d56f3aaad24a0119269c7dae041cd9c80589d90ab1152d
-
Filesize
47KB
MD54fed28a1e034d20c8911dc2871e61d69
SHA1f5d34864570d1e1d1f9c7cd14e37acf34f486d90
SHA256a07200eb13710f9ff5a7441ae1ec4b9e23087e0df061a10dbe667f17f5314f31
SHA51237c48563405d604a2be3fccf822c57b806658bb7830607f5944d1c90387f70d930a9955b2a305cb56f5c9383b75f3148784013999b1646fc02e54ea67444e332
-
Filesize
50KB
MD559b2bfa6c2128a2f5023beecc90eafe7
SHA14be82d3df616e3e095f1d94dde1e07dd27e09b09
SHA2566f9215777f9fa91da8553a83ac057dd7262c7e501514e8f95e52df80af62267c
SHA51287106d35f83cc71ab73dfdc4141645b8f26288d6624e1cf804850e21ea85de160fec601e2963902d8548cac82d482d01b5c37e2a26152a8aebc91b42c17b3c3a
-
Filesize
52KB
MD5ca14fa98dbd3dbc1394d26d87b7ab471
SHA173eaead5135a8bfc9e3514ef29b0b231d9ed8c58
SHA2568f7bfb073c6b72b73dbf56ef4fdde46b2e6abab9ad3383a9a18fa4e0da1d1850
SHA512d0fd4134384d8fa41ba0d634b7d5a9f24ae0900d83d4abce05d723535c649412285e0a556aea3c2b01692df4d27c360c6f00c6d6cf43a5fdfeea85249408d7c7
-
Filesize
3KB
MD5ca666664325a037432f2ef2abd2d395f
SHA1753c3b61c249f45b3c2b16375a2982134208b413
SHA256d14f117f8930a019f1150772f6b93d0e8764d67fa56dc7b9f38f6cb453fbba8f
SHA51293f7453818c22c4a3e5e00fc08b258f84861ed7ae057415febf2d6c98bace3a383b5f7e4bb1844b836e59d696abf8bf7bdcf242edbaa7074b8c8e28ac90dfeaf
-
Filesize
54KB
MD54eb07612e2a5eed3c707b00fa87c3ddb
SHA1274c59999de4a3d3f6289155b146d127a8c8e34e
SHA2561d6032ba6d1bf6e2eb8bf310af327d0e78d4fab6e0eb2e407e50500633bc1759
SHA512d43b7c37d1bfd8319797ef4063a288f5b8fe1f162a1c9b43a8b964e39d468eb8c887f561cf33bcb68b474a36e64922970841ea9096f5ca4ff9a2cc945c7b5c92
-
Filesize
30KB
MD5d4ea12e66ae1fb158337ba4cae24984f
SHA1b9d4fa320868e899861575468b1509303c5492e2
SHA2569b2c109703a64914399b8dbd9b56dea6db882d9194022f923e29b26d564401b7
SHA512f8f5cb02ac6171ca1b5e4724f50c52dd2a50286ef21aef108836eeafcece4a681c414d40ea0be3834264a5097c751a74ca0ed34a5a5f7a6b85abffafc45c9132
-
Filesize
48KB
MD5ea9ae9d5699babe96cb3abb6b2dced5b
SHA1635b44ca0c29f69d9a45e953d2be1144730d4ec6
SHA25620d0db36bb0797e5af4e63dadc6988cb56c8e52666439273c41b6573bfc51d5a
SHA51241b813f1b800c0fd255b160786fd866966eaf8263cb23382bc30fa4a1b3119d0f65b088341f5f9c593bddfceea9b7a0e8ade5b01cfd11b68af233a1565aa5a10
-
Filesize
72KB
MD54ff1be8db6b5bb6b67c5b0882407d462
SHA1460e0603d3832a7505d7673ddb8ccacacda4d023
SHA2562e5e58f1638c80e9c583dccc2f0a36f658963a91d224af19d624d30551fee716
SHA5125784deca49edf8426053fc826580615e80bce566b8bd03abbe3cefefcc73c277f85743fd9c0e8295a2d268739fef66fe42b5423c6be7cf8d23afeec6c3c8b403
-
Filesize
39KB
MD5a092431eebd5feadaa0fe2835fc47a8a
SHA113f77775cb7371668f9dcf77624943568c8a79b8
SHA2568db943433b85e389602010645ca6a1dc5d9c927fef82111f8c9815a57821daab
SHA5122fe9b07678aea2dd6d8c38e101674cb2559c85069de19d2030fed9817b6e969eeb685fdb5ba3eaf418ef98bfae844069d6f5ed7eff336070238fff5ee2b13c25
-
Filesize
104KB
MD57afcf78fa0ac17bf50233199c579f63a
SHA183b12c71c932bc8cca94382dd3d5d9845464e9ce
SHA25606f2dcea60b7b844eccda5b2ea755f37691d0fd76d7c79f9b9e5f2d277b50156
SHA512e133b6607dd8b5c13515765ca70e88ae136da736baf1f3fa97e6c9bad03238974b0dd575de58f9f01d4568e394847b519310018b99fabe2a2873da790961c4c4
-
Filesize
45KB
MD5552ff93198acec5b50a6dc2d92680c73
SHA188cfedc1d9e13cc976624b889399337c25fddb75
SHA256bbe5505640491ce04dafff241a28acb248a43ce9705c41108cbb84355b198701
SHA51253d4b72752884f7d047b5045f222ffa793fc5ca1234026f5f122b88bdf11ff50d99fecbcbacce3356a55a8f7aa92fbcfda02f020a4c36d3d50789d71d941cb14
-
Filesize
32KB
MD552ea6343d3e6baf10dfbe5ee61e012db
SHA114b55ba21f8d51644b3f340a077aea8f97479682
SHA256ebadcab424b05383ba83a2d3b68947834a2d9d9cd928fd8032321e5360b4b7f1
SHA512455617327853fe15a6d97a368512685c054da4a7d18fccacec1e6e35bdd5a32215a5eab8372e47c852908cb91f7d7f550446ff97d1f03b871880aef35550019a
-
Filesize
11KB
MD5ab2cb12d0711d1d97478105f8540945a
SHA1ec48e0b9a03e4b4f3c551d42bac7c510be0276ab
SHA2566cf85b85e73928ef0a57411febeae808148bcf054575c80bb6fe7eb26b85e234
SHA5129e90e9831437438b2efd239607839bd8b08681c4e2a1e3fa96f0ad2f17ff14ab2ee215bf3ea9a4c7140dbbb8380d7cd5781a6f7b767ed08a174f9c55aacf8286
-
Filesize
35KB
MD5b403ad59f449d455b58fc1829bb1ad9a
SHA1ce866b1e2e3aca9744afcde9068d6e8517131875
SHA256218a3002d33bf1ddae03f4fac0d0f5043f58500f6b165bb4d2ef61ca3b36e299
SHA5121b22fab6c747c4211ba588a33931f6ad3e517d256d04607d790f00aa6f66f5b03b0f670307a8045d6c656ef9047de929c967ce34472ad66b9ff4e167aaef6805