Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
18/01/2024, 21:18
Static task
static1
Behavioral task
behavioral1
Sample
660e88b92b0ad767c26941e04bcfb121.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
660e88b92b0ad767c26941e04bcfb121.exe
Resource
win10v2004-20231215-en
General
-
Target
660e88b92b0ad767c26941e04bcfb121.exe
-
Size
11KB
-
MD5
660e88b92b0ad767c26941e04bcfb121
-
SHA1
990ea4c5d62f723cda5dc1e61a9f8b9c0bd3b51d
-
SHA256
6564dfb8e2e6c4a68495909d816204123905bb25537cf76f64b00e388d84655b
-
SHA512
36e168e0b33deddcc0433a33150162d1b1c2cd49254d7e4a0296b52c32228467d3e18c009a592ea60e307fee7528a8054375366b488a5f89df560fc512e7f4e6
-
SSDEEP
192:5ZH+V+cXezw8x5xYQjxoxg/C3PnzQrTWa:b+IcXeUYTjxWgun+
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2184 svchosts.exe -
Loads dropped DLL 2 IoCs
pid Process 2172 660e88b92b0ad767c26941e04bcfb121.exe 2172 660e88b92b0ad767c26941e04bcfb121.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU Key = "C:\\Users\\Admin\\AppData\\Roaming\\svchosts.exe" svchosts.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM Key = "C:\\Users\\Admin\\AppData\\Roaming\\svchosts.exe" svchosts.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2184 2172 660e88b92b0ad767c26941e04bcfb121.exe 18 PID 2172 wrote to memory of 2184 2172 660e88b92b0ad767c26941e04bcfb121.exe 18 PID 2172 wrote to memory of 2184 2172 660e88b92b0ad767c26941e04bcfb121.exe 18 PID 2172 wrote to memory of 2184 2172 660e88b92b0ad767c26941e04bcfb121.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\660e88b92b0ad767c26941e04bcfb121.exe"C:\Users\Admin\AppData\Local\Temp\660e88b92b0ad767c26941e04bcfb121.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Roaming\svchosts.exe"C:\Users\Admin\AppData\Roaming\svchosts.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5660e88b92b0ad767c26941e04bcfb121
SHA1990ea4c5d62f723cda5dc1e61a9f8b9c0bd3b51d
SHA2566564dfb8e2e6c4a68495909d816204123905bb25537cf76f64b00e388d84655b
SHA51236e168e0b33deddcc0433a33150162d1b1c2cd49254d7e4a0296b52c32228467d3e18c009a592ea60e307fee7528a8054375366b488a5f89df560fc512e7f4e6