Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
08/01/2024, 14:04
Static task
static1
Behavioral task
behavioral1
Sample
97c2d5b8641875634156368989ff410bb6b5cab67c2c5430b73cb47d51982012.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
97c2d5b8641875634156368989ff410bb6b5cab67c2c5430b73cb47d51982012.exe
Resource
win10v2004-20231215-en
General
-
Target
97c2d5b8641875634156368989ff410bb6b5cab67c2c5430b73cb47d51982012.exe
-
Size
1.4MB
-
MD5
2f0d1effca8e06f489035a1e1facc192
-
SHA1
fd96f6c801e4791c82d2c7cf44c7a829d95a946b
-
SHA256
97c2d5b8641875634156368989ff410bb6b5cab67c2c5430b73cb47d51982012
-
SHA512
a8deb4a624d5d83c1c5aa98aa986dd9ae0b261a9e57066853e2187fc9ea25308e1d1e072efe80d76e569ff93734a75447566c9a31f5b0536fae532383075166f
-
SSDEEP
24576:Y4U6dqpfTTGiyfhy584ihQuL87Etqq6vOSpd57vwvN4j6Ii3Vke3u:Y4XwppyU+87jd57v243akj
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2612 wextract.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2040 set thread context of 2112 2040 97c2d5b8641875634156368989ff410bb6b5cab67c2c5430b73cb47d51982012.exe 28 PID 2112 set thread context of 1188 2112 calc.exe 17 PID 2112 set thread context of 2612 2112 calc.exe 31 PID 2612 set thread context of 1188 2612 wextract.exe 17 -
description ioc Process Key created \Registry\User\S-1-5-21-3427588347-1492276948-3422228430-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 wextract.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 2112 calc.exe 2112 calc.exe 2112 calc.exe 2112 calc.exe 2112 calc.exe 2112 calc.exe 2112 calc.exe 2112 calc.exe 2612 wextract.exe 2612 wextract.exe 2612 wextract.exe 2612 wextract.exe 2612 wextract.exe 2612 wextract.exe 2612 wextract.exe 2612 wextract.exe 2612 wextract.exe 2612 wextract.exe 2612 wextract.exe 2612 wextract.exe 2612 wextract.exe 2612 wextract.exe 2612 wextract.exe 2612 wextract.exe 2612 wextract.exe 2612 wextract.exe 2612 wextract.exe 2612 wextract.exe 2612 wextract.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1188 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2112 calc.exe 1188 Explorer.EXE 1188 Explorer.EXE 2612 wextract.exe 2612 wextract.exe 2612 wextract.exe 2612 wextract.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1188 Explorer.EXE 1188 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1188 Explorer.EXE 1188 Explorer.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2040 wrote to memory of 2112 2040 97c2d5b8641875634156368989ff410bb6b5cab67c2c5430b73cb47d51982012.exe 28 PID 2040 wrote to memory of 2112 2040 97c2d5b8641875634156368989ff410bb6b5cab67c2c5430b73cb47d51982012.exe 28 PID 2040 wrote to memory of 2112 2040 97c2d5b8641875634156368989ff410bb6b5cab67c2c5430b73cb47d51982012.exe 28 PID 2040 wrote to memory of 2112 2040 97c2d5b8641875634156368989ff410bb6b5cab67c2c5430b73cb47d51982012.exe 28 PID 2040 wrote to memory of 2112 2040 97c2d5b8641875634156368989ff410bb6b5cab67c2c5430b73cb47d51982012.exe 28 PID 2040 wrote to memory of 2112 2040 97c2d5b8641875634156368989ff410bb6b5cab67c2c5430b73cb47d51982012.exe 28 PID 2040 wrote to memory of 2112 2040 97c2d5b8641875634156368989ff410bb6b5cab67c2c5430b73cb47d51982012.exe 28 PID 1188 wrote to memory of 2612 1188 Explorer.EXE 31 PID 1188 wrote to memory of 2612 1188 Explorer.EXE 31 PID 1188 wrote to memory of 2612 1188 Explorer.EXE 31 PID 1188 wrote to memory of 2612 1188 Explorer.EXE 31 PID 1188 wrote to memory of 2612 1188 Explorer.EXE 31 PID 1188 wrote to memory of 2612 1188 Explorer.EXE 31 PID 1188 wrote to memory of 2612 1188 Explorer.EXE 31 PID 2612 wrote to memory of 756 2612 wextract.exe 34 PID 2612 wrote to memory of 756 2612 wextract.exe 34 PID 2612 wrote to memory of 756 2612 wextract.exe 34 PID 2612 wrote to memory of 756 2612 wextract.exe 34 PID 2612 wrote to memory of 756 2612 wextract.exe 34 PID 2612 wrote to memory of 756 2612 wextract.exe 34 PID 2612 wrote to memory of 756 2612 wextract.exe 34 PID 2612 wrote to memory of 756 2612 wextract.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\97c2d5b8641875634156368989ff410bb6b5cab67c2c5430b73cb47d51982012.exe"C:\Users\Admin\AppData\Local\Temp\97c2d5b8641875634156368989ff410bb6b5cab67c2c5430b73cb47d51982012.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SYSWOW64\calc.exe"C:\Windows\SYSWOW64\calc.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2112
-
-
-
C:\Windows\SysWOW64\wextract.exe"C:\Windows\SysWOW64\wextract.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:756
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
469KB
MD52555518e014abda6ab2156aceaa4c25c
SHA1dbfa5be3e5ab5705bea72c62591d1856a69e99a5
SHA25681f30ffed254f6660eda1845240da62f1a73e94dbae6ddb564f982825c7e99fe
SHA5126984f9bff3facf693dcf4d22883e402ebfe673305ab0395ea52881109ea2b467b7d61567e3e8a0ca7ff01a3969fb8e0e384790333c7f5807ead1ef190623c6ac
-
Filesize
895KB
MD51eb6acf76a15b74b38333af47dc1218d
SHA1a3fbc817f59b6a8899dc338cc15a75cdd17dfff1
SHA256a5ef3a78eb333b0e6dca194ea711dcbb036119a788ecfe125f05176fb0fb70a3
SHA512717931aa928de150abbb70d523c7dbd472bfa6c511ab55e0b50df8d9661d33635156ed7b750285fa383cdd4064f225ea022f0bead3e066ee2beba84ef5731c15