Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/01/2024, 08:40
Static task
static1
Behavioral task
behavioral1
Sample
743c4293924966145a15247019678041.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
743c4293924966145a15247019678041.exe
Resource
win10v2004-20231215-en
General
-
Target
743c4293924966145a15247019678041.exe
-
Size
4.8MB
-
MD5
743c4293924966145a15247019678041
-
SHA1
ab5cd9f4c3818b44ec13c3003ab024365b439d7d
-
SHA256
504c149e8c6eec8df5921e3985f4c39905c672e99934ed647297a36a46738689
-
SHA512
97159de873a712b016cbb40b97c27168edc40c9ae899afdf207ebd595fa219703818837e2e0d8627dc1164b37312d87b396f15774860e87d6542369c6dde4f37
-
SSDEEP
98304:PX4uRbJiH9PqGVGOobrS+S8Qu+4warOauQ4KS/f41WvdYvzyUyazx14:vXRWPqGVYi8QuRORKS/hvdYyUya0
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2880 743c4293924966145a15247019678041.tmp 2700 Minima.exe -
Loads dropped DLL 3 IoCs
pid Process 2816 743c4293924966145a15247019678041.exe 2880 743c4293924966145a15247019678041.tmp 2880 743c4293924966145a15247019678041.tmp -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 18 IoCs
description ioc Process File created C:\Program Files (x86)\Corrupti\rerum\is-MGMB3.tmp 743c4293924966145a15247019678041.tmp File created C:\Program Files (x86)\Corrupti\rerum\is-QAQQ7.tmp 743c4293924966145a15247019678041.tmp File created C:\Program Files (x86)\Corrupti\aut\is-VUK37.tmp 743c4293924966145a15247019678041.tmp File created C:\Program Files (x86)\Corrupti\rerum\is-G21LG.tmp 743c4293924966145a15247019678041.tmp File created C:\Program Files (x86)\Corrupti\rerum\is-3VUL1.tmp 743c4293924966145a15247019678041.tmp File opened for modification C:\Program Files (x86)\Corrupti\rerum\sqlite3.dll 743c4293924966145a15247019678041.tmp File created C:\Program Files (x86)\Corrupti\aut\is-LHQ6A.tmp 743c4293924966145a15247019678041.tmp File created C:\Program Files (x86)\Corrupti\is-M1G50.tmp 743c4293924966145a15247019678041.tmp File created C:\Program Files (x86)\Corrupti\aut\is-364CV.tmp 743c4293924966145a15247019678041.tmp File created C:\Program Files (x86)\Corrupti\aut\is-1BSCV.tmp 743c4293924966145a15247019678041.tmp File created C:\Program Files (x86)\Corrupti\rerum\is-04D6K.tmp 743c4293924966145a15247019678041.tmp File created C:\Program Files (x86)\Corrupti\rerum\is-12OBD.tmp 743c4293924966145a15247019678041.tmp File opened for modification C:\Program Files (x86)\Corrupti\unins000.dat 743c4293924966145a15247019678041.tmp File opened for modification C:\Program Files (x86)\Corrupti\rerum\Minima.exe 743c4293924966145a15247019678041.tmp File created C:\Program Files (x86)\Corrupti\unins000.dat 743c4293924966145a15247019678041.tmp File created C:\Program Files (x86)\Corrupti\is-H5GC2.tmp 743c4293924966145a15247019678041.tmp File created C:\Program Files (x86)\Corrupti\is-JIEPT.tmp 743c4293924966145a15247019678041.tmp File created C:\Program Files (x86)\Corrupti\is-DRBQN.tmp 743c4293924966145a15247019678041.tmp -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2880 743c4293924966145a15247019678041.tmp 2880 743c4293924966145a15247019678041.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2880 743c4293924966145a15247019678041.tmp -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2816 wrote to memory of 2880 2816 743c4293924966145a15247019678041.exe 28 PID 2816 wrote to memory of 2880 2816 743c4293924966145a15247019678041.exe 28 PID 2816 wrote to memory of 2880 2816 743c4293924966145a15247019678041.exe 28 PID 2816 wrote to memory of 2880 2816 743c4293924966145a15247019678041.exe 28 PID 2816 wrote to memory of 2880 2816 743c4293924966145a15247019678041.exe 28 PID 2816 wrote to memory of 2880 2816 743c4293924966145a15247019678041.exe 28 PID 2816 wrote to memory of 2880 2816 743c4293924966145a15247019678041.exe 28 PID 2880 wrote to memory of 2700 2880 743c4293924966145a15247019678041.tmp 29 PID 2880 wrote to memory of 2700 2880 743c4293924966145a15247019678041.tmp 29 PID 2880 wrote to memory of 2700 2880 743c4293924966145a15247019678041.tmp 29 PID 2880 wrote to memory of 2700 2880 743c4293924966145a15247019678041.tmp 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\743c4293924966145a15247019678041.exe"C:\Users\Admin\AppData\Local\Temp\743c4293924966145a15247019678041.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\is-RIH5I.tmp\743c4293924966145a15247019678041.tmp"C:\Users\Admin\AppData\Local\Temp\is-RIH5I.tmp\743c4293924966145a15247019678041.tmp" /SL5="$5014C,4319728,721408,C:\Users\Admin\AppData\Local\Temp\743c4293924966145a15247019678041.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Program Files (x86)\Corrupti\rerum\Minima.exe"C:\Program Files (x86)\Corrupti/\rerum\Minima.exe" d33ea9aeaf55fd261c3afe4927f1bef53⤵
- Executes dropped EXE
PID:2700
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
814KB
MD5bb197619f4c7aebd7765ef5d57ad4ac3
SHA14773cd5f5ecda080d0721961ecf741dc31325eb2
SHA25601ae883a7c1f8dd78160a462f0789753f21c7ae43576eecb20557cd84db3c3e5
SHA5123f6a94459db9e983629ea12beaee35dbe699deb1157ba6ff76d96da2e31210ae36f51cffc9d5fe192106bd334612d46ff5bf177a9c40a71386c6f923a36e331f
-
Filesize
1.1MB
MD5ced16afdf48987cf299cb41595d113ca
SHA12b2280b395a88e86a0cd30932bc5f1d1bcb3f634
SHA256404d1fd670563565b7573eb098250725ee4a947b3f6379160c17be76e560cb2a
SHA512ef4ffdf738ec481f3219503bb4dcdbf74cba0c75ea17c94a68824fadc337aae345ffa0457e3251202ad95066ef058a7107ee6c3828d2cfea01295e76f3ff85e9
-
Filesize
657KB
MD5e19a185d9c3dc7324f67850246d05698
SHA1fda6405ea3e47b667d2d8445a33a90e6a98bc219
SHA2565b20dafb22f47426171fcc9d3b27350e445a43210f57853c68b23f792c0f697e
SHA512828fa26be852f4195347c212f57ebdfb0d9faee4a6e7ce4c1de008704a3f2ccf4a5e319b3ce46193c0cef6e61228311858e98575a88bf3c256a109f9a5176e94
-
Filesize
641KB
MD5f4d2240110f85849ba7859063ed92370
SHA142ba77cf3f3c0dd92e3f4acc9403a2461119d2f3
SHA256aac602ae0c570c64eee99ce5ca68bed4ea228d42f6a7056d0a2fc84e9155bc64
SHA5126ba63a11625e743d21df15702d5c081864d5e398e0396388e23006df61ac03a826a9f09bd247be6d92b76958d6dbd64f02034f479f116895b4de8a81252a9a06
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
712KB
MD5a959fa6637cdc35618d90108fa1f7e99
SHA1752034726205c2f96f5ae0016e7df2076f01f12b
SHA256c50f7c8f5c4cb2549622c9777038072b5b2ffe0d3b7ff460287de658ec746944
SHA512a410e063f5420454f6d053a6d154a139d7591985417e3298ef1dbbff66910089d2eea38162b8994db9ff13be5049e2b8ced5f2a9d12a4a986228124d01435f05