Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 09:56
Behavioral task
behavioral1
Sample
6752f4178a9554f8aed55982a9776838.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6752f4178a9554f8aed55982a9776838.exe
Resource
win10v2004-20231222-en
General
-
Target
6752f4178a9554f8aed55982a9776838.exe
-
Size
10KB
-
MD5
6752f4178a9554f8aed55982a9776838
-
SHA1
11be215cbe3c3c037b38704875dc0160ed71ff5f
-
SHA256
cf2bccb31721b9ef9efe982b0ecc5ca5cdecded9dffb5ba0d87a45356da110a5
-
SHA512
42c147edb9cb4ee910c6a112f8084a9de4b4418d410c05adf768432f2422bfa51816950b0c389e5559709a3481b0a40fbb64bfd879304268cb4bbb84f5fc7030
-
SSDEEP
192:CDuFSHP37IQsDocCg3wPjdadrLVc7PG1KnoeSjKSBH1JXZl819/V3Z:4KSvrIQsD1APjdadrBEoHR1zl8b
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Deletes itself 1 IoCs
pid Process 2820 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3052 mduaeyk.exe -
Loads dropped DLL 2 IoCs
pid Process 2168 6752f4178a9554f8aed55982a9776838.exe 2168 6752f4178a9554f8aed55982a9776838.exe -
resource yara_rule behavioral1/memory/2168-19-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/3052-11-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/files/0x000d000000012337-10.dat upx behavioral1/memory/2168-4-0x0000000000030000-0x000000000003E000-memory.dmp upx behavioral1/memory/2168-0-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral1/memory/3052-21-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\mduaey.dll 6752f4178a9554f8aed55982a9776838.exe File created C:\Windows\SysWOW64\mduaeyk.exe 6752f4178a9554f8aed55982a9776838.exe File opened for modification C:\Windows\SysWOW64\mduaeyk.exe 6752f4178a9554f8aed55982a9776838.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2168 wrote to memory of 3052 2168 6752f4178a9554f8aed55982a9776838.exe 3 PID 2168 wrote to memory of 3052 2168 6752f4178a9554f8aed55982a9776838.exe 3 PID 2168 wrote to memory of 3052 2168 6752f4178a9554f8aed55982a9776838.exe 3 PID 2168 wrote to memory of 3052 2168 6752f4178a9554f8aed55982a9776838.exe 3 PID 2168 wrote to memory of 2820 2168 6752f4178a9554f8aed55982a9776838.exe 2 PID 2168 wrote to memory of 2820 2168 6752f4178a9554f8aed55982a9776838.exe 2 PID 2168 wrote to memory of 2820 2168 6752f4178a9554f8aed55982a9776838.exe 2 PID 2168 wrote to memory of 2820 2168 6752f4178a9554f8aed55982a9776838.exe 2
Processes
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\6752f4178a9554f8aed55982a9776838.exe.bat1⤵
- Deletes itself
PID:2820
-
C:\Windows\SysWOW64\mduaeyk.exeC:\Windows\system32\mduaeyk.exe ˜‰1⤵
- Executes dropped EXE
PID:3052
-
C:\Users\Admin\AppData\Local\Temp\6752f4178a9554f8aed55982a9776838.exe"C:\Users\Admin\AppData\Local\Temp\6752f4178a9554f8aed55982a9776838.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD5c9c3b13441df428ba3444b661e36ab7f
SHA1c62e5063da3b7121051909f2dacc7b10d5c220ea
SHA2568814be29a650b4d906519834f5412907fb8b70d21be63c7f2eac21ab51007b15
SHA512a1cf35148e5c26d6d322409441bf8ec2a13b159f42a804999ffd5ce512ecc1da5123504320689a4dc9a5e04bf601a9d25b8191663aaabba8ec5637c4fe1995da
-
Filesize
10KB
MD56752f4178a9554f8aed55982a9776838
SHA111be215cbe3c3c037b38704875dc0160ed71ff5f
SHA256cf2bccb31721b9ef9efe982b0ecc5ca5cdecded9dffb5ba0d87a45356da110a5
SHA51242c147edb9cb4ee910c6a112f8084a9de4b4418d410c05adf768432f2422bfa51816950b0c389e5559709a3481b0a40fbb64bfd879304268cb4bbb84f5fc7030