Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
13/01/2024, 14:47
Behavioral task
behavioral1
Sample
58fb6908563d7ca58bc4f11d5af0c2da.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
58fb6908563d7ca58bc4f11d5af0c2da.exe
Resource
win10v2004-20231222-en
General
-
Target
58fb6908563d7ca58bc4f11d5af0c2da.exe
-
Size
27KB
-
MD5
58fb6908563d7ca58bc4f11d5af0c2da
-
SHA1
32a0217989b22f099f2748d9a94cce44dc19ec44
-
SHA256
1967d22da4cf35379ff71d503094114b713071de67672606c03f239693e0eaae
-
SHA512
ac2c83dcc02fbb8031f44bc84099f38acc4f73608036b4f828fef203a7df183aa2b2ed49e1a25d5696f81027244f103644bbed22e6b98f402b2051071706db5f
-
SSDEEP
768:ypuTVQoynPg9f4cwafHpb7GYYMSqDC0LEhPFgFwSZHG:ywTV4Pg9fLwGkYYMSqDteMV
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Deletes itself 1 IoCs
pid Process 1920 cmd.exe -
resource yara_rule behavioral1/memory/2940-0-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral1/memory/2940-9-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects 58fb6908563d7ca58bc4f11d5af0c2da.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects 58fb6908563d7ca58bc4f11d5af0c2da.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\mmmxabxa.dll 58fb6908563d7ca58bc4f11d5af0c2da.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Toolbar 58fb6908563d7ca58bc4f11d5af0c2da.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2940 wrote to memory of 1920 2940 58fb6908563d7ca58bc4f11d5af0c2da.exe 28 PID 2940 wrote to memory of 1920 2940 58fb6908563d7ca58bc4f11d5af0c2da.exe 28 PID 2940 wrote to memory of 1920 2940 58fb6908563d7ca58bc4f11d5af0c2da.exe 28 PID 2940 wrote to memory of 1920 2940 58fb6908563d7ca58bc4f11d5af0c2da.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\58fb6908563d7ca58bc4f11d5af0c2da.exe"C:\Users\Admin\AppData\Local\Temp\58fb6908563d7ca58bc4f11d5af0c2da.exe"1⤵
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\cmd.execmd /c preved.bat2⤵
- Deletes itself
PID:1920
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
215B
MD50e5dd95efa1a317ea81da2dc91923c46
SHA1875b59dd6958af19abdc289b89f106980db6b62d
SHA2567b19af2f8e703e6b11d1a98de814084043e46e4cb29374df3075cae0381e2d2f
SHA51228a7ed9944c4dac136ac5d334fdbb5fe6e9738388cfca6b4b4d90d169b3aa856f63265396e08ab10b63f143dced7a29ee76a63636944f4dca23676d6924c8ecb