Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12/01/2024, 15:03
Static task
static1
Behavioral task
behavioral1
Sample
56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe
Resource
win10v2004-20231215-en
General
-
Target
56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe
-
Size
227KB
-
MD5
56c7c8dbb0eb3a743a96bc2b4ccbccd6
-
SHA1
98da4979bebfcbd7212db25f857e21947aa49ba5
-
SHA256
1246d67d866b350856f273187beaf829b6bcba477e7e4302b89cb16ae5fc5299
-
SHA512
ccedab420d4d625c17c0f28d9cc52a5df62091eda3bc18683f6be36cd731541f5aba3886e7ca356a6ca7b05e818d668800777b0a7b973530f7680977d3dea1bd
-
SSDEEP
3072:/cT9g8immW6Pozkk2eKs/CSr2nQ/E2S5ny+bF2u1I+ddDK7Hlq/e8FpSkgnYEkgJ:o68i3odBiTl2+TCU/4k8nkM
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\bugMAKER.bat 56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe File created C:\Windows\winhash_up.exe 56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe File created C:\Windows\SHARE_TEMP\Icon13.ico 56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe File created C:\Windows\winhash_up.exez 56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe File opened for modification C:\Windows\winhash_up.exez 56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2840 2272 56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe 28 PID 2272 wrote to memory of 2840 2272 56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe 28 PID 2272 wrote to memory of 2840 2272 56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe 28 PID 2272 wrote to memory of 2840 2272 56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe"C:\Users\Admin\AppData\Local\Temp\56c7c8dbb0eb3a743a96bc2b4ccbccd6.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:2840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD558427bf50a517286de9014d3c49edf24
SHA1d05349924e62f3d19cee92b75dc1031cbb39755d
SHA256589cceb08ae9a4064c2946470d50f56af073aa2535a37a293f81978000a1eef4
SHA5126b765a34dd5aac9a19c0cc347b41e6e45b0f31f69a906be175e0f19827503568a14ab5a9f5aa2cf22c6709750b0ec41512d731ac30a4b101587ecb760e9e8d27