Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 22:19
Behavioral task
behavioral1
Sample
72fec4a8540bb7739ad1ce6a751c8a64.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
72fec4a8540bb7739ad1ce6a751c8a64.exe
Resource
win10v2004-20231215-en
General
-
Target
72fec4a8540bb7739ad1ce6a751c8a64.exe
-
Size
12KB
-
MD5
72fec4a8540bb7739ad1ce6a751c8a64
-
SHA1
9f4a61a5eb8af57881d97a29fec0aaef7be3ad16
-
SHA256
8de2ecae6974d0b59260b5c761323aa3d61864bd772a999ce5851ba163c83220
-
SHA512
167650614aecd47104cbd6ef10013409134e4467b946c23f1053facd99e02be896665c61241390c8994ae69b40df215326b19c0e5b17ecccd881cf129b41f8bc
-
SSDEEP
192:tb1JwjxT20IZnVWI/4PBcuEievsFlWRbsm:tbqBEZnVWI0clWFlW57
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2132 wscript.exe -
resource yara_rule behavioral1/memory/2864-0-0x0000000000400000-0x000000000040D000-memory.dmp upx behavioral1/memory/2864-4-0x0000000000400000-0x000000000040D000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\seruices.exe 72fec4a8540bb7739ad1ce6a751c8a64.exe File opened for modification C:\Windows\SysWOW64\seruices.exe 72fec4a8540bb7739ad1ce6a751c8a64.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2864 72fec4a8540bb7739ad1ce6a751c8a64.exe 2864 72fec4a8540bb7739ad1ce6a751c8a64.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2132 2864 72fec4a8540bb7739ad1ce6a751c8a64.exe 28 PID 2864 wrote to memory of 2132 2864 72fec4a8540bb7739ad1ce6a751c8a64.exe 28 PID 2864 wrote to memory of 2132 2864 72fec4a8540bb7739ad1ce6a751c8a64.exe 28 PID 2864 wrote to memory of 2132 2864 72fec4a8540bb7739ad1ce6a751c8a64.exe 28 PID 2864 wrote to memory of 1252 2864 72fec4a8540bb7739ad1ce6a751c8a64.exe 10
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\72fec4a8540bb7739ad1ce6a751c8a64.exe"C:\Users\Admin\AppData\Local\Temp\72fec4a8540bb7739ad1ce6a751c8a64.exe"2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\\1.vbs3⤵
- Deletes itself
PID:2132
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
322B
MD5004abd6b7dbfc47eda32ef1cfb4cf06b
SHA12fa53a215454282951aab3d7af3c374aa074c3e7
SHA25637034de3a5631722b713496c6a81c6bcbfb873c7493e687dbc19859d07391d83
SHA512146982d70c13f6c8f46776491ee8a9267c7b387980fdd24bd27e9f36bc05a1bf2fc6188400e968f3026bd3fcad156595d532a769d8bf7a2eaf57df6c4b66a33e