Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/01/2024, 07:18
Static task
static1
Behavioral task
behavioral1
Sample
58509938dab387c484fecd5184fbef7f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
58509938dab387c484fecd5184fbef7f.exe
Resource
win10v2004-20231215-en
General
-
Target
58509938dab387c484fecd5184fbef7f.exe
-
Size
252KB
-
MD5
58509938dab387c484fecd5184fbef7f
-
SHA1
bbddeabb74f060b349e43b4ba80db60e780d6a25
-
SHA256
dc94b4affda2f2ccce65e9c70d5673c796c1418ffe11e1c956bda870d636758c
-
SHA512
2d4ed0b3f5d53a23b887f57a3e7b0f36d0ba60d04a5d61237dbc5119fbb5f8ad539f874d5ec29f94fd2992cba5c9f399dde2b75efcb3506aee5d00d2ac013ecd
-
SSDEEP
6144:EIO/OELQYCM/IsVVUUUEDOWb+BRuQRBuk+3g:EIIlEM/DUUUEDOWCBRbRkk+g
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2796 qwrtaw5.exe -
Loads dropped DLL 2 IoCs
pid Process 2464 58509938dab387c484fecd5184fbef7f.exe 2464 58509938dab387c484fecd5184fbef7f.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\sysinternals = "C:\\ProgramData\\qwrtaw5.exe" qwrtaw5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 58509938dab387c484fecd5184fbef7f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 58509938dab387c484fecd5184fbef7f.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 qwrtaw5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier qwrtaw5.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2464 58509938dab387c484fecd5184fbef7f.exe Token: SeDebugPrivilege 2796 qwrtaw5.exe Token: SeDebugPrivilege 2796 qwrtaw5.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2464 wrote to memory of 2796 2464 58509938dab387c484fecd5184fbef7f.exe 28 PID 2464 wrote to memory of 2796 2464 58509938dab387c484fecd5184fbef7f.exe 28 PID 2464 wrote to memory of 2796 2464 58509938dab387c484fecd5184fbef7f.exe 28 PID 2464 wrote to memory of 2796 2464 58509938dab387c484fecd5184fbef7f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\58509938dab387c484fecd5184fbef7f.exe"C:\Users\Admin\AppData\Local\Temp\58509938dab387c484fecd5184fbef7f.exe"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\ProgramData\qwrtaw5.exe"C:\ProgramData\qwrtaw5.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5ed797d8dc2c92401985d162e42ffa450
SHA10f02fc517c7facc4baefde4fe9467fb6488ebabe
SHA256b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e
SHA512e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2
-
Filesize
252KB
MD558509938dab387c484fecd5184fbef7f
SHA1bbddeabb74f060b349e43b4ba80db60e780d6a25
SHA256dc94b4affda2f2ccce65e9c70d5673c796c1418ffe11e1c956bda870d636758c
SHA5122d4ed0b3f5d53a23b887f57a3e7b0f36d0ba60d04a5d61237dbc5119fbb5f8ad539f874d5ec29f94fd2992cba5c9f399dde2b75efcb3506aee5d00d2ac013ecd