Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 10:45
Static task
static1
Behavioral task
behavioral1
Sample
534e8e291a09631ec0e63d1e93c2895c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
534e8e291a09631ec0e63d1e93c2895c.exe
Resource
win10v2004-20231215-en
General
-
Target
534e8e291a09631ec0e63d1e93c2895c.exe
-
Size
643KB
-
MD5
534e8e291a09631ec0e63d1e93c2895c
-
SHA1
79370058402f59160174975de94a1ae180c9a4cf
-
SHA256
302d6f18cd340b57755c0e80172cbf57db70d9b3c26a76bd24b2016b61bba45f
-
SHA512
9170a4fd9a20f229a80c48d8b3f82148c71daaf58b4638ad906ad6ea8382f0b775d2d1219e7a3fdb98c55bbf57baa77f40f3a43cd2bf1a99a03a954de50cddf1
-
SSDEEP
12288:u9pSdKrT3wBDe5394bxzJH3nCL7eZmePFF3Z4mxxNDqVTVOC3:uK4rsRWUzcLCIedQmXMVTz3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1724 Iowrminedzard.exe -
Loads dropped DLL 1 IoCs
pid Process 1724 Iowrminedzard.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Internet Explorer\Connection Wizard\Iowrminedzard.dll Iowrminedzard.exe File opened for modification C:\Program Files (x86)\Internet Explorer\Connection Wizard\Iowrminedzard.dll Iowrminedzard.exe File created C:\Program Files (x86)\Internet Explorer\Connection Wizard\Iowrminedzard.exe 534e8e291a09631ec0e63d1e93c2895c.exe File opened for modification C:\Program Files (x86)\Internet Explorer\Connection Wizard\Iowrminedzard.exe 534e8e291a09631ec0e63d1e93c2895c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1724 Iowrminedzard.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1724 Iowrminedzard.exe 1724 Iowrminedzard.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\534e8e291a09631ec0e63d1e93c2895c.exe"C:\Users\Admin\AppData\Local\Temp\534e8e291a09631ec0e63d1e93c2895c.exe"1⤵
- Drops file in Program Files directory
PID:2308
-
C:\Program Files (x86)\Internet Explorer\Connection Wizard\Iowrminedzard.exe"C:\Program Files (x86)\Internet Explorer\Connection Wizard\Iowrminedzard.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1724
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD59481c3d01bbc5a95ddaf705900e1e521
SHA10490c1ae79480edb472244f3105857c9c7b18c16
SHA256cbfe8bf74831e72893098a171dbf0781d49aac15ab06b0b5bbe92c2c97ff833e
SHA5126932fb356390b766fa743ec530f365ddb0b026609de99854e64bbd2a091a5a0a670e40f7b972128a1340384cf61cc6003a69240ff4c9a055d416d31d02a8ae6e
-
Filesize
54KB
MD52103e701d2e72e82557e40af3a92611a
SHA1e53db2d01e663a5e8111b096e4684659dd4c1009
SHA256dbce1d982327ff67f78aac1785afe7b17e255b5b78dc624a91e8c20a973282a7
SHA512f42becdf08dfb0582ec1c38596f6297aab95c83f4d4a33c362b9f60bf57e900b166068b1441e2b6aa8cefb0dc85575e8c3625d994d24dcd9d7273d0b5d302c22
-
Filesize
23KB
MD565441c3202c84e4469cd6df4a8f9f015
SHA1dc319c7dbf303c02e9b02c1ea9606f219c08818c
SHA2564d2ccb5def18f12b213421f0547c79f921b010e29160a1b34506e26561de55f2
SHA512367b20ff47a3b3e643f48cd5546955f17b4687a0accad9f3efe2ba7e8e63937cb5a4cfd58b2883a0214e5ee1b7dc5404de97d7adb8e08d447d5c16ffd80b8623