Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/01/2024, 14:52
Behavioral task
behavioral1
Sample
6fb51927c83cbc82696030ce4c3222a5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6fb51927c83cbc82696030ce4c3222a5.exe
Resource
win10v2004-20231215-en
General
-
Target
6fb51927c83cbc82696030ce4c3222a5.exe
-
Size
74KB
-
MD5
6fb51927c83cbc82696030ce4c3222a5
-
SHA1
89845bf72a542836158afff4986e84d9fbea26a9
-
SHA256
dfb1c10ae39b8b81badba43646d271868c4c39d1d1e59c8b17847428f650cff3
-
SHA512
595de0519ee4876925438b38e7b2f172df3abd0bd5da58b1832c1f73dfafec4f8183d5fd721ad8ead93af50ffc986d45bcb0f26af7429a01fe016b2319dce5bb
-
SSDEEP
1536:SCmN+K8/Qe1fThSC7Tf3FJ+76m4o9F2j4wEpkkCe+aF:SCY+N/QedhSC7r3X66m9EGkA
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1640 netprotocol.exe -
Loads dropped DLL 2 IoCs
pid Process 1268 6fb51927c83cbc82696030ce4c3222a5.exe 1268 6fb51927c83cbc82696030ce4c3222a5.exe -
resource yara_rule behavioral1/memory/1268-0-0x0000000000400000-0x0000000000431000-memory.dmp upx behavioral1/files/0x000800000001222d-9.dat upx behavioral1/memory/1640-12-0x0000000000400000-0x0000000000431000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Netprotocol = "C:\\Users\\Admin\\AppData\\Roaming\\netprotocol.exe" 6fb51927c83cbc82696030ce4c3222a5.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1268 wrote to memory of 1640 1268 6fb51927c83cbc82696030ce4c3222a5.exe 28 PID 1268 wrote to memory of 1640 1268 6fb51927c83cbc82696030ce4c3222a5.exe 28 PID 1268 wrote to memory of 1640 1268 6fb51927c83cbc82696030ce4c3222a5.exe 28 PID 1268 wrote to memory of 1640 1268 6fb51927c83cbc82696030ce4c3222a5.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fb51927c83cbc82696030ce4c3222a5.exe"C:\Users\Admin\AppData\Local\Temp\6fb51927c83cbc82696030ce4c3222a5.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Roaming\netprotocol.exeC:\Users\Admin\AppData\Roaming\netprotocol.exe2⤵
- Executes dropped EXE
PID:1640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD5d4d21da64f1044576c05cb1a567b7772
SHA1c6eb7479c7aac8502fc25b8e1c5d7d159bd5049e
SHA25688b1cdffcf4673028dcefa10c09619bf35db57e1f0e3e90eadc2bbfa8a4c1ec1
SHA512bdd1ac16d4c54e079c188437e5d1aa2cb4189f9da40cde6fa344410dbd2d0ce7a35c993703e94fd36c4b6a0b897b58c056f118613a173377729168611d600444