Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 09:58
Behavioral task
behavioral1
Sample
71edd6f77fdcff571bb0aed2377dd841.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
71edd6f77fdcff571bb0aed2377dd841.exe
Resource
win10v2004-20231215-en
General
-
Target
71edd6f77fdcff571bb0aed2377dd841.exe
-
Size
11KB
-
MD5
71edd6f77fdcff571bb0aed2377dd841
-
SHA1
c9c5dc37941f396aa468b13960349ef0cb475780
-
SHA256
dface1d6dbb263a681606509dff1e19abcb5ac0566f2a26b4bd6cc2972136b6c
-
SHA512
0dbe2b84cc00516c7a4a62eb8de3f4ef722de9a17e252f2efdc6dbd0828ce7d5ec78e9776db35f6da273bcfd7cc8fb1e33c64c5496581d9fdf6318d76b52eeca
-
SSDEEP
192:3hPjdoOGNMIhLlWuJBi4NCmF8uBd6DWJ0iDT9d5tprjpKw122r8kiLM:3h5oOGNMIhLguJBlNCmladiv9dVAw9rN
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Deletes itself 1 IoCs
pid Process 2456 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2992 appmick.exe -
Loads dropped DLL 2 IoCs
pid Process 1276 71edd6f77fdcff571bb0aed2377dd841.exe 1276 71edd6f77fdcff571bb0aed2377dd841.exe -
resource yara_rule behavioral1/memory/1276-1-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/files/0x000b000000014b31-3.dat upx behavioral1/memory/1276-4-0x0000000000230000-0x000000000023F000-memory.dmp upx behavioral1/memory/2992-11-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/1276-12-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\appmic.dll 71edd6f77fdcff571bb0aed2377dd841.exe File created C:\Windows\SysWOW64\appmick.exe 71edd6f77fdcff571bb0aed2377dd841.exe File opened for modification C:\Windows\SysWOW64\appmick.exe 71edd6f77fdcff571bb0aed2377dd841.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1276 wrote to memory of 2992 1276 71edd6f77fdcff571bb0aed2377dd841.exe 28 PID 1276 wrote to memory of 2992 1276 71edd6f77fdcff571bb0aed2377dd841.exe 28 PID 1276 wrote to memory of 2992 1276 71edd6f77fdcff571bb0aed2377dd841.exe 28 PID 1276 wrote to memory of 2992 1276 71edd6f77fdcff571bb0aed2377dd841.exe 28 PID 1276 wrote to memory of 2456 1276 71edd6f77fdcff571bb0aed2377dd841.exe 29 PID 1276 wrote to memory of 2456 1276 71edd6f77fdcff571bb0aed2377dd841.exe 29 PID 1276 wrote to memory of 2456 1276 71edd6f77fdcff571bb0aed2377dd841.exe 29 PID 1276 wrote to memory of 2456 1276 71edd6f77fdcff571bb0aed2377dd841.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\71edd6f77fdcff571bb0aed2377dd841.exe"C:\Users\Admin\AppData\Local\Temp\71edd6f77fdcff571bb0aed2377dd841.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\appmick.exeC:\Windows\system32\appmick.exe ˜‰2⤵
- Executes dropped EXE
PID:2992
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\71edd6f77fdcff571bb0aed2377dd841.exe.bat2⤵
- Deletes itself
PID:2456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
182B
MD5c252a7746469d5a6e96d37206a65f88c
SHA1c301e79db958dc5f17f058b4dbfef2057b579838
SHA2568a9cd7d46fccc927ae9e61172a59418aeb894ac65ff3b633e746270ab42339d5
SHA512451f73fc1a946fc68e769eeb86289d0e9246360375578fd51608fca2248931b4fc0e4cecfcc3506d8da7dde76c1e1b42ab4b7d0c9a3ffa5a55016f09b890f7ab
-
Filesize
11KB
MD571edd6f77fdcff571bb0aed2377dd841
SHA1c9c5dc37941f396aa468b13960349ef0cb475780
SHA256dface1d6dbb263a681606509dff1e19abcb5ac0566f2a26b4bd6cc2972136b6c
SHA5120dbe2b84cc00516c7a4a62eb8de3f4ef722de9a17e252f2efdc6dbd0828ce7d5ec78e9776db35f6da273bcfd7cc8fb1e33c64c5496581d9fdf6318d76b52eeca