Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
15/01/2024, 03:38
Static task
static1
Behavioral task
behavioral1
Sample
5c093f72d1ac9fa97d0d5289655e7d74.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5c093f72d1ac9fa97d0d5289655e7d74.exe
Resource
win10v2004-20231222-en
General
-
Target
5c093f72d1ac9fa97d0d5289655e7d74.exe
-
Size
46KB
-
MD5
5c093f72d1ac9fa97d0d5289655e7d74
-
SHA1
9b8fd11233416fe520cda2be289775850bbf3cd1
-
SHA256
8aa82fd500e80cc53263f05b916ea7a4a0eb3ed5b54ce3ed98e02fff45d739f5
-
SHA512
a7940f1505eef9e345f0f2d6a0eb3b96adabbb3955a65de55e1e10166aceef676991fe56aafad18fa459d2b706ba234e6692384400dbed47c27b863a217009b9
-
SSDEEP
768:Y4rPIkz0ABBt5BeIPH/ceMdehVikgsGhbfk3p9g0MUnl+vb/ebWI17hhfCEX:mkzLz9/hMdyEkgsF3p9JMUnAT2a2hhfR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3068 cfgload32.exe -
Loads dropped DLL 2 IoCs
pid Process 2016 5c093f72d1ac9fa97d0d5289655e7d74.exe 2016 5c093f72d1ac9fa97d0d5289655e7d74.exe -
Drops file in System32 directory 19 IoCs
description ioc Process File created C:\Windows\SysWOW64\cfgload32.exe\cfgload32.exe cfgload32.exe File created C:\Windows\SysWOW64\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe cfgload32.exe File created C:\Windows\SysWOW64\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe cfgload32.exe File created C:\Windows\SysWOW64\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe cfgload32.exe File created C:\Windows\SysWOW64\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe cfgload32.exe File created C:\Windows\SysWOW64\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe cfgload32.exe File created C:\Windows\SysWOW64\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe cfgload32.exe File created C:\Windows\SysWOW64\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe cfgload32.exe File created C:\Windows\SysWOW64\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe cfgload32.exe File created C:\Windows\SysWOW64\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe cfgload32.exe File created C:\Windows\SysWOW64\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe cfgload32.exe File created C:\Windows\SysWOW64\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe cfgload32.exe File created C:\Windows\SysWOW64\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe cfgload32.exe File created C:\Windows\SysWOW64\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe cfgload32.exe File created C:\Windows\SysWOW64\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe\cfgload32.exe cfgload32.exe File created C:\Windows\SysWOW64\cfgload32.exe 5c093f72d1ac9fa97d0d5289655e7d74.exe File opened for modification C:\Windows\SysWOW64\cfgload32.exe 5c093f72d1ac9fa97d0d5289655e7d74.exe File created C:\Windows\SysWOW64\cfgload32.exe cfgload32.exe File created C:\Windows\SysWOW64\cfgload32.exe\cfgload32.exe\cfgload32.exe cfgload32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2016 5c093f72d1ac9fa97d0d5289655e7d74.exe 3068 cfgload32.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2016 wrote to memory of 3068 2016 5c093f72d1ac9fa97d0d5289655e7d74.exe 28 PID 2016 wrote to memory of 3068 2016 5c093f72d1ac9fa97d0d5289655e7d74.exe 28 PID 2016 wrote to memory of 3068 2016 5c093f72d1ac9fa97d0d5289655e7d74.exe 28 PID 2016 wrote to memory of 3068 2016 5c093f72d1ac9fa97d0d5289655e7d74.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c093f72d1ac9fa97d0d5289655e7d74.exe"C:\Users\Admin\AppData\Local\Temp\5c093f72d1ac9fa97d0d5289655e7d74.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\cfgload32.exeC:\Windows\system32\cfgload32.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3068
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD5ea33fc3fa2fd612f5c669b994d9c332c
SHA14e1605866e3a438bfb111c9b40e03b7c52997bee
SHA256375c88f540e7e22e32d0dd43db5c3a23439a94df5a6da6aa8848e602bab1de51
SHA51278f270637eb5da42dd1ec6013f6b85248aeae24f2829515049f34647d9aa37cd5cd7ad93d9632d65cf6bd652a40b07a0ecce224e86a1481e7ea92bd8b8bf403e
-
Filesize
46KB
MD55c093f72d1ac9fa97d0d5289655e7d74
SHA19b8fd11233416fe520cda2be289775850bbf3cd1
SHA2568aa82fd500e80cc53263f05b916ea7a4a0eb3ed5b54ce3ed98e02fff45d739f5
SHA512a7940f1505eef9e345f0f2d6a0eb3b96adabbb3955a65de55e1e10166aceef676991fe56aafad18fa459d2b706ba234e6692384400dbed47c27b863a217009b9