Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/01/2024, 07:45
Static task
static1
Behavioral task
behavioral1
Sample
5aae714ba755d784134b75ff2860c916.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5aae714ba755d784134b75ff2860c916.exe
Resource
win10v2004-20231215-en
General
-
Target
5aae714ba755d784134b75ff2860c916.exe
-
Size
209KB
-
MD5
5aae714ba755d784134b75ff2860c916
-
SHA1
83f09f9b8c0dd468bcaf7adb6fe774cf1105fbee
-
SHA256
e9f9ca004f8c9495936e647c5e127f422567459e13ea683153e6b33c6af17d38
-
SHA512
197cbdcff204c854bc7f4fb43d6d73ff045487707ee246ce8e53c973196bcafa00103f1909da17b210f1db1b0107f16509ed9a711d247478aac242b26a21a049
-
SSDEEP
6144:74VUVK1pQYsbgVqmCit8l+Fuj9v7DcY44:EVWADVJR8lXtDcr
Malware Config
Signatures
-
Loads dropped DLL 5 IoCs
pid Process 2320 5aae714ba755d784134b75ff2860c916.exe 1692 rundll32.exe 1692 rundll32.exe 1692 rundll32.exe 1692 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\Metropolis = "rundll32.exe C:\\Windows\\system32\\sshnas21.dll,GetHandle" 5aae714ba755d784134b75ff2860c916.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\sshnas21.dll 5aae714ba755d784134b75ff2860c916.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2320 5aae714ba755d784134b75ff2860c916.exe 2320 5aae714ba755d784134b75ff2860c916.exe 1692 rundll32.exe 1692 rundll32.exe 1692 rundll32.exe 1692 rundll32.exe 1692 rundll32.exe 1692 rundll32.exe 1692 rundll32.exe 1692 rundll32.exe 1692 rundll32.exe 1692 rundll32.exe 1692 rundll32.exe 1692 rundll32.exe 1692 rundll32.exe 1692 rundll32.exe 1692 rundll32.exe 1692 rundll32.exe 1692 rundll32.exe 1692 rundll32.exe 1692 rundll32.exe 1692 rundll32.exe 1692 rundll32.exe 1692 rundll32.exe 1692 rundll32.exe 1692 rundll32.exe 1692 rundll32.exe 1692 rundll32.exe 1692 rundll32.exe 1692 rundll32.exe 1692 rundll32.exe 1692 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2320 5aae714ba755d784134b75ff2860c916.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2320 wrote to memory of 1692 2320 5aae714ba755d784134b75ff2860c916.exe 28 PID 2320 wrote to memory of 1692 2320 5aae714ba755d784134b75ff2860c916.exe 28 PID 2320 wrote to memory of 1692 2320 5aae714ba755d784134b75ff2860c916.exe 28 PID 2320 wrote to memory of 1692 2320 5aae714ba755d784134b75ff2860c916.exe 28 PID 2320 wrote to memory of 1692 2320 5aae714ba755d784134b75ff2860c916.exe 28 PID 2320 wrote to memory of 1692 2320 5aae714ba755d784134b75ff2860c916.exe 28 PID 2320 wrote to memory of 1692 2320 5aae714ba755d784134b75ff2860c916.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5aae714ba755d784134b75ff2860c916.exe"C:\Users\Admin\AppData\Local\Temp\5aae714ba755d784134b75ff2860c916.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Windows\system32\sshnas21.dll,GetHandle2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
170KB
MD5415d15f74185ec87436f77dd3dd4e429
SHA11c3892e75109c09acae5825609328869f817c3c2
SHA2561c6e8c0569b0ea1246a1fcec3781b3d81b15d113986aa3e190610e17c63a6761
SHA512ba0030c237599c9564589584609680b9ddb7f6ff2c58cc9b16f8ec643b9ba7581019cc90ae9e6e25fa53cfe8dd757f420b11e9388af931702e954d1dfb42c843