Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
17/01/2024, 18:56
Static task
static1
Behavioral task
behavioral1
Sample
6358a73cfceb5b53a7ae122d99a2c228.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6358a73cfceb5b53a7ae122d99a2c228.exe
Resource
win10v2004-20231222-en
General
-
Target
6358a73cfceb5b53a7ae122d99a2c228.exe
-
Size
137KB
-
MD5
6358a73cfceb5b53a7ae122d99a2c228
-
SHA1
43ad6700e71236ba0d7b8cf54bb9d48f73e460f9
-
SHA256
dd93817d78ccfbecdc314d9b3183a2eebee12a89c3c070bbafd4ee80ac258812
-
SHA512
dfd4e02e7bee9b23039c47342f05a021b645b4e3972bf40c2f89c16cf3b45c65ef482aeb32b66b64341e04a39187fe909ac268d7cd01c1b8f1b07a2739f23124
-
SSDEEP
1536:qbnGysPZixQ5rIN4xunD7TFDIblyBoNHAILzo3w9mVIZVVU7xSD/Yfrb6GhjYlWf:0xIWQhPxivyJqoSI/mVQUtrrSkKMCe
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2604 netprotocol.exe 1668 netprotocol.exe 2524 netprotocol.exe -
Loads dropped DLL 4 IoCs
pid Process 2376 6358a73cfceb5b53a7ae122d99a2c228.exe 2756 6358a73cfceb5b53a7ae122d99a2c228.exe 2756 6358a73cfceb5b53a7ae122d99a2c228.exe 2604 netprotocol.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Netprotocol = "C:\\Users\\Admin\\AppData\\Roaming\\netprotocol.exe" 6358a73cfceb5b53a7ae122d99a2c228.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2376 set thread context of 2216 2376 6358a73cfceb5b53a7ae122d99a2c228.exe 28 PID 2216 set thread context of 2756 2216 6358a73cfceb5b53a7ae122d99a2c228.exe 29 PID 2604 set thread context of 1668 2604 netprotocol.exe 32 PID 1668 set thread context of 2524 1668 netprotocol.exe 33 -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2216 2376 6358a73cfceb5b53a7ae122d99a2c228.exe 28 PID 2376 wrote to memory of 2216 2376 6358a73cfceb5b53a7ae122d99a2c228.exe 28 PID 2376 wrote to memory of 2216 2376 6358a73cfceb5b53a7ae122d99a2c228.exe 28 PID 2376 wrote to memory of 2216 2376 6358a73cfceb5b53a7ae122d99a2c228.exe 28 PID 2376 wrote to memory of 2216 2376 6358a73cfceb5b53a7ae122d99a2c228.exe 28 PID 2376 wrote to memory of 2216 2376 6358a73cfceb5b53a7ae122d99a2c228.exe 28 PID 2376 wrote to memory of 2216 2376 6358a73cfceb5b53a7ae122d99a2c228.exe 28 PID 2376 wrote to memory of 2216 2376 6358a73cfceb5b53a7ae122d99a2c228.exe 28 PID 2376 wrote to memory of 2216 2376 6358a73cfceb5b53a7ae122d99a2c228.exe 28 PID 2376 wrote to memory of 2216 2376 6358a73cfceb5b53a7ae122d99a2c228.exe 28 PID 2216 wrote to memory of 2756 2216 6358a73cfceb5b53a7ae122d99a2c228.exe 29 PID 2216 wrote to memory of 2756 2216 6358a73cfceb5b53a7ae122d99a2c228.exe 29 PID 2216 wrote to memory of 2756 2216 6358a73cfceb5b53a7ae122d99a2c228.exe 29 PID 2216 wrote to memory of 2756 2216 6358a73cfceb5b53a7ae122d99a2c228.exe 29 PID 2216 wrote to memory of 2756 2216 6358a73cfceb5b53a7ae122d99a2c228.exe 29 PID 2216 wrote to memory of 2756 2216 6358a73cfceb5b53a7ae122d99a2c228.exe 29 PID 2216 wrote to memory of 2756 2216 6358a73cfceb5b53a7ae122d99a2c228.exe 29 PID 2216 wrote to memory of 2756 2216 6358a73cfceb5b53a7ae122d99a2c228.exe 29 PID 2216 wrote to memory of 2756 2216 6358a73cfceb5b53a7ae122d99a2c228.exe 29 PID 2756 wrote to memory of 2604 2756 6358a73cfceb5b53a7ae122d99a2c228.exe 30 PID 2756 wrote to memory of 2604 2756 6358a73cfceb5b53a7ae122d99a2c228.exe 30 PID 2756 wrote to memory of 2604 2756 6358a73cfceb5b53a7ae122d99a2c228.exe 30 PID 2756 wrote to memory of 2604 2756 6358a73cfceb5b53a7ae122d99a2c228.exe 30 PID 2604 wrote to memory of 1668 2604 netprotocol.exe 32 PID 2604 wrote to memory of 1668 2604 netprotocol.exe 32 PID 2604 wrote to memory of 1668 2604 netprotocol.exe 32 PID 2604 wrote to memory of 1668 2604 netprotocol.exe 32 PID 2604 wrote to memory of 1668 2604 netprotocol.exe 32 PID 2604 wrote to memory of 1668 2604 netprotocol.exe 32 PID 2604 wrote to memory of 1668 2604 netprotocol.exe 32 PID 2604 wrote to memory of 1668 2604 netprotocol.exe 32 PID 2604 wrote to memory of 1668 2604 netprotocol.exe 32 PID 2604 wrote to memory of 1668 2604 netprotocol.exe 32 PID 1668 wrote to memory of 2524 1668 netprotocol.exe 33 PID 1668 wrote to memory of 2524 1668 netprotocol.exe 33 PID 1668 wrote to memory of 2524 1668 netprotocol.exe 33 PID 1668 wrote to memory of 2524 1668 netprotocol.exe 33 PID 1668 wrote to memory of 2524 1668 netprotocol.exe 33 PID 1668 wrote to memory of 2524 1668 netprotocol.exe 33 PID 1668 wrote to memory of 2524 1668 netprotocol.exe 33 PID 1668 wrote to memory of 2524 1668 netprotocol.exe 33 PID 1668 wrote to memory of 2524 1668 netprotocol.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\6358a73cfceb5b53a7ae122d99a2c228.exe"C:\Users\Admin\AppData\Local\Temp\6358a73cfceb5b53a7ae122d99a2c228.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\6358a73cfceb5b53a7ae122d99a2c228.exe"C:\Users\Admin\AppData\Local\Temp\6358a73cfceb5b53a7ae122d99a2c228.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\6358a73cfceb5b53a7ae122d99a2c228.exe"C:\Users\Admin\AppData\Local\Temp\6358a73cfceb5b53a7ae122d99a2c228.exe"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Roaming\netprotocol.exeC:\Users\Admin\AppData\Roaming\netprotocol.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Roaming\netprotocol.exeC:\Users\Admin\AppData\Roaming\netprotocol.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Roaming\netprotocol.exeC:\Users\Admin\AppData\Roaming\netprotocol.exe6⤵
- Executes dropped EXE
PID:2524
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD595f62965058baacadb83c2da94ca47de
SHA1b3115c8b56105e1eae02fda8b3536b3bf38436ca
SHA256d76b2bde3f59d34dbf1bba5917bfd17470703801b17984ad90b6cebcf914deb9
SHA5129fbd110938f1c0a97b1f2742c8233e28a7e2802477f9222d3e0db95c1959ed3a1183b57ca1c92f006e6dbdf3ab03297cba0c6e06e2e2778a6dfa1e4ac2d7cb77
-
Filesize
137KB
MD52bb11b24670b744ab7517246b7e626fe
SHA1e6becfbdc9a5b41e39d8252aa135f6e59956a25c
SHA2560ee3d6af19c6849155568151ed704d2eac0b07545a07029913e651355168f0fb
SHA512b656990ea5ccf501b5efddaba3cea0f960e469ea6541aec1cc0f72d45de0cf2ea5d5316b629d742e5151d9a20b84ef8a35c95b8f242b2371f180e22cf847ba0d