Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/01/2024, 16:36
Static task
static1
Behavioral task
behavioral1
Sample
59333f2abf7178f211439d828c48e7df.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
59333f2abf7178f211439d828c48e7df.exe
Resource
win10v2004-20231215-en
General
-
Target
59333f2abf7178f211439d828c48e7df.exe
-
Size
48KB
-
MD5
59333f2abf7178f211439d828c48e7df
-
SHA1
14c40d54436293aa6e41767b02b7f243dbae6de5
-
SHA256
692d680db18cda87e53b654d609aa694a4652e20a08e8e8f0c2a6fb5ee9ff745
-
SHA512
53f5c513f0d1fd54f91f473be548cf28eb29f7dea599a0b89e5092f1d194b18d3f541a4b9ab81e84e7eabdf51207b1a16c50d95b2ec87f659147553486be311c
-
SSDEEP
768:peiynC7e+v5C5ODwQGi1Lq3BKCNUf1AKik4Pvmo:CCa+v5tWimUQm4mo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2344 ctfmon.exe -
Loads dropped DLL 1 IoCs
pid Process 2652 59333f2abf7178f211439d828c48e7df.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ctfmon.exe 59333f2abf7178f211439d828c48e7df.exe File opened for modification C:\Windows\ctfmon.exe 59333f2abf7178f211439d828c48e7df.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2652 59333f2abf7178f211439d828c48e7df.exe 2652 59333f2abf7178f211439d828c48e7df.exe 2652 59333f2abf7178f211439d828c48e7df.exe 2652 59333f2abf7178f211439d828c48e7df.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2652 59333f2abf7178f211439d828c48e7df.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2344 2652 59333f2abf7178f211439d828c48e7df.exe 14 PID 2652 wrote to memory of 2344 2652 59333f2abf7178f211439d828c48e7df.exe 14 PID 2652 wrote to memory of 2344 2652 59333f2abf7178f211439d828c48e7df.exe 14 PID 2652 wrote to memory of 2344 2652 59333f2abf7178f211439d828c48e7df.exe 14
Processes
-
C:\Windows\ctfmon.exe"C:\Windows\ctfmon.exe"1⤵
- Executes dropped EXE
PID:2344
-
C:\Users\Admin\AppData\Local\Temp\59333f2abf7178f211439d828c48e7df.exe"C:\Users\Admin\AppData\Local\Temp\59333f2abf7178f211439d828c48e7df.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5eb6495bc723c6f01344994df35833de0
SHA16f73c008f1be214c13bee089d5a602492b4960ff
SHA2560cace35d1709566943c012fd41061b60cc1856a59c36ff2dbe4953a316290e2e
SHA512f8fedd60b7f93587dbd6be13dd1fd89799b52eb9fee9e042c1faa9e84634a7d2aa5bc768bce1b404dc934c7987e319f12403bf1b5cdd1e67fc4ba98affa83356
-
Filesize
26KB
MD559fe39bf6b09867fc986fc69155f9be7
SHA1ad6b241e6784643e164805617a74d1144dd8000f
SHA256c634e981d9a52d244728a22d3ca06c234c2ca838231c621ad8a4abe535bb802c
SHA5129bb7482878f725e9c26f756271108286d0b17eeba6919bcffe44a62b13bf8e53fd95ccc911aae8f40c10941d042ffb23947a0a75c0c297ce542dca9a6272e177