Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/01/2024, 18:00
Behavioral task
behavioral1
Sample
7803a778b8973e6e250f4cb8547c5023.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7803a778b8973e6e250f4cb8547c5023.exe
Resource
win10v2004-20231215-en
General
-
Target
7803a778b8973e6e250f4cb8547c5023.exe
-
Size
1006KB
-
MD5
7803a778b8973e6e250f4cb8547c5023
-
SHA1
4a752f28feafc53a6a5cddd22243f5966b072731
-
SHA256
20d6fc50d67624b84a40505ef1e340c6f2affb01da0e4dcd3195fce26f95f875
-
SHA512
4203ef38c175c32b74fcc3b0fc440ac5a462ddb2ebb747ed58ac146b4719ac7916b4331e6390f8519e7faf1673f259355e6d66d5364ae009db8f378768bc88eb
-
SSDEEP
24576:mRBlwE6T4RGVraavsBUeTrb8a3RfOqfbe:mhwrT4AVuqe/YqOoa
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2368-1-0x0000000000400000-0x0000000000542000-memory.dmp upx behavioral1/memory/1684-0-0x0000000000400000-0x0000000000542000-memory.dmp upx behavioral1/memory/1684-16-0x0000000000400000-0x0000000000542000-memory.dmp upx behavioral1/memory/2368-21-0x0000000000400000-0x0000000000542000-memory.dmp upx behavioral1/memory/2368-28-0x0000000000400000-0x0000000000542000-memory.dmp upx behavioral1/memory/1684-48-0x0000000000400000-0x0000000000542000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Runonce = "C:\\Windows\\system32\\runouce.exe" 7803a778b8973e6e250f4cb8547c5023.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: 7803a778b8973e6e250f4cb8547c5023.exe File opened (read-only) \??\M: 7803a778b8973e6e250f4cb8547c5023.exe File opened (read-only) \??\T: 7803a778b8973e6e250f4cb8547c5023.exe File opened (read-only) \??\W: 7803a778b8973e6e250f4cb8547c5023.exe File opened (read-only) \??\G: 7803a778b8973e6e250f4cb8547c5023.exe File opened (read-only) \??\H: 7803a778b8973e6e250f4cb8547c5023.exe File opened (read-only) \??\K: 7803a778b8973e6e250f4cb8547c5023.exe File opened (read-only) \??\N: 7803a778b8973e6e250f4cb8547c5023.exe File opened (read-only) \??\E: 7803a778b8973e6e250f4cb8547c5023.exe File opened (read-only) \??\O: 7803a778b8973e6e250f4cb8547c5023.exe File opened (read-only) \??\Q: 7803a778b8973e6e250f4cb8547c5023.exe File opened (read-only) \??\R: 7803a778b8973e6e250f4cb8547c5023.exe File opened (read-only) \??\Y: 7803a778b8973e6e250f4cb8547c5023.exe File opened (read-only) \??\Z: 7803a778b8973e6e250f4cb8547c5023.exe File opened (read-only) \??\J: 7803a778b8973e6e250f4cb8547c5023.exe File opened (read-only) \??\P: 7803a778b8973e6e250f4cb8547c5023.exe File opened (read-only) \??\S: 7803a778b8973e6e250f4cb8547c5023.exe File opened (read-only) \??\U: 7803a778b8973e6e250f4cb8547c5023.exe File opened (read-only) \??\V: 7803a778b8973e6e250f4cb8547c5023.exe File opened (read-only) \??\X: 7803a778b8973e6e250f4cb8547c5023.exe File opened (read-only) \??\I: 7803a778b8973e6e250f4cb8547c5023.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\runouce.exe 7803a778b8973e6e250f4cb8547c5023.exe File opened for modification C:\WINDOWS\SysWOW64\RUNOUCE.EXE 7803a778b8973e6e250f4cb8547c5023.exe File opened for modification C:\Windows\SysWOW64\runouce.exe 7803a778b8973e6e250f4cb8547c5023.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2368 7803a778b8973e6e250f4cb8547c5023.exe -
Suspicious behavior: MapViewOfSection 22 IoCs
pid Process 2368 7803a778b8973e6e250f4cb8547c5023.exe 2368 7803a778b8973e6e250f4cb8547c5023.exe 2368 7803a778b8973e6e250f4cb8547c5023.exe 2368 7803a778b8973e6e250f4cb8547c5023.exe 2368 7803a778b8973e6e250f4cb8547c5023.exe 2368 7803a778b8973e6e250f4cb8547c5023.exe 2368 7803a778b8973e6e250f4cb8547c5023.exe 2368 7803a778b8973e6e250f4cb8547c5023.exe 2368 7803a778b8973e6e250f4cb8547c5023.exe 2368 7803a778b8973e6e250f4cb8547c5023.exe 2368 7803a778b8973e6e250f4cb8547c5023.exe 2368 7803a778b8973e6e250f4cb8547c5023.exe 2368 7803a778b8973e6e250f4cb8547c5023.exe 2368 7803a778b8973e6e250f4cb8547c5023.exe 2368 7803a778b8973e6e250f4cb8547c5023.exe 2368 7803a778b8973e6e250f4cb8547c5023.exe 2368 7803a778b8973e6e250f4cb8547c5023.exe 2368 7803a778b8973e6e250f4cb8547c5023.exe 2368 7803a778b8973e6e250f4cb8547c5023.exe 2368 7803a778b8973e6e250f4cb8547c5023.exe 2368 7803a778b8973e6e250f4cb8547c5023.exe 2368 7803a778b8973e6e250f4cb8547c5023.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2368 7803a778b8973e6e250f4cb8547c5023.exe Token: SeTakeOwnershipPrivilege 1684 7803a778b8973e6e250f4cb8547c5023.exe Token: SeRestorePrivilege 1684 7803a778b8973e6e250f4cb8547c5023.exe Token: SeBackupPrivilege 1684 7803a778b8973e6e250f4cb8547c5023.exe Token: SeChangeNotifyPrivilege 1684 7803a778b8973e6e250f4cb8547c5023.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2368 1684 7803a778b8973e6e250f4cb8547c5023.exe 6 PID 1684 wrote to memory of 2368 1684 7803a778b8973e6e250f4cb8547c5023.exe 6 PID 1684 wrote to memory of 2368 1684 7803a778b8973e6e250f4cb8547c5023.exe 6 PID 1684 wrote to memory of 2368 1684 7803a778b8973e6e250f4cb8547c5023.exe 6 PID 1684 wrote to memory of 2368 1684 7803a778b8973e6e250f4cb8547c5023.exe 6 PID 1684 wrote to memory of 2368 1684 7803a778b8973e6e250f4cb8547c5023.exe 6 PID 1684 wrote to memory of 2368 1684 7803a778b8973e6e250f4cb8547c5023.exe 6 PID 2368 wrote to memory of 388 2368 7803a778b8973e6e250f4cb8547c5023.exe 26 PID 2368 wrote to memory of 388 2368 7803a778b8973e6e250f4cb8547c5023.exe 26 PID 2368 wrote to memory of 388 2368 7803a778b8973e6e250f4cb8547c5023.exe 26 PID 2368 wrote to memory of 388 2368 7803a778b8973e6e250f4cb8547c5023.exe 26 PID 2368 wrote to memory of 388 2368 7803a778b8973e6e250f4cb8547c5023.exe 26 PID 2368 wrote to memory of 388 2368 7803a778b8973e6e250f4cb8547c5023.exe 26 PID 2368 wrote to memory of 388 2368 7803a778b8973e6e250f4cb8547c5023.exe 26 PID 2368 wrote to memory of 400 2368 7803a778b8973e6e250f4cb8547c5023.exe 25 PID 2368 wrote to memory of 400 2368 7803a778b8973e6e250f4cb8547c5023.exe 25 PID 2368 wrote to memory of 400 2368 7803a778b8973e6e250f4cb8547c5023.exe 25 PID 2368 wrote to memory of 400 2368 7803a778b8973e6e250f4cb8547c5023.exe 25 PID 2368 wrote to memory of 400 2368 7803a778b8973e6e250f4cb8547c5023.exe 25 PID 2368 wrote to memory of 400 2368 7803a778b8973e6e250f4cb8547c5023.exe 25 PID 2368 wrote to memory of 400 2368 7803a778b8973e6e250f4cb8547c5023.exe 25 PID 2368 wrote to memory of 436 2368 7803a778b8973e6e250f4cb8547c5023.exe 24 PID 2368 wrote to memory of 436 2368 7803a778b8973e6e250f4cb8547c5023.exe 24 PID 2368 wrote to memory of 436 2368 7803a778b8973e6e250f4cb8547c5023.exe 24 PID 2368 wrote to memory of 436 2368 7803a778b8973e6e250f4cb8547c5023.exe 24 PID 2368 wrote to memory of 436 2368 7803a778b8973e6e250f4cb8547c5023.exe 24 PID 2368 wrote to memory of 436 2368 7803a778b8973e6e250f4cb8547c5023.exe 24 PID 2368 wrote to memory of 436 2368 7803a778b8973e6e250f4cb8547c5023.exe 24 PID 2368 wrote to memory of 484 2368 7803a778b8973e6e250f4cb8547c5023.exe 23 PID 2368 wrote to memory of 484 2368 7803a778b8973e6e250f4cb8547c5023.exe 23 PID 2368 wrote to memory of 484 2368 7803a778b8973e6e250f4cb8547c5023.exe 23 PID 2368 wrote to memory of 484 2368 7803a778b8973e6e250f4cb8547c5023.exe 23 PID 2368 wrote to memory of 484 2368 7803a778b8973e6e250f4cb8547c5023.exe 23 PID 2368 wrote to memory of 484 2368 7803a778b8973e6e250f4cb8547c5023.exe 23 PID 2368 wrote to memory of 484 2368 7803a778b8973e6e250f4cb8547c5023.exe 23 PID 2368 wrote to memory of 492 2368 7803a778b8973e6e250f4cb8547c5023.exe 22 PID 2368 wrote to memory of 492 2368 7803a778b8973e6e250f4cb8547c5023.exe 22 PID 2368 wrote to memory of 492 2368 7803a778b8973e6e250f4cb8547c5023.exe 22 PID 2368 wrote to memory of 492 2368 7803a778b8973e6e250f4cb8547c5023.exe 22 PID 2368 wrote to memory of 492 2368 7803a778b8973e6e250f4cb8547c5023.exe 22 PID 2368 wrote to memory of 492 2368 7803a778b8973e6e250f4cb8547c5023.exe 22 PID 2368 wrote to memory of 492 2368 7803a778b8973e6e250f4cb8547c5023.exe 22 PID 2368 wrote to memory of 500 2368 7803a778b8973e6e250f4cb8547c5023.exe 21 PID 2368 wrote to memory of 500 2368 7803a778b8973e6e250f4cb8547c5023.exe 21 PID 2368 wrote to memory of 500 2368 7803a778b8973e6e250f4cb8547c5023.exe 21 PID 2368 wrote to memory of 500 2368 7803a778b8973e6e250f4cb8547c5023.exe 21 PID 2368 wrote to memory of 500 2368 7803a778b8973e6e250f4cb8547c5023.exe 21 PID 2368 wrote to memory of 500 2368 7803a778b8973e6e250f4cb8547c5023.exe 21 PID 2368 wrote to memory of 500 2368 7803a778b8973e6e250f4cb8547c5023.exe 21 PID 2368 wrote to memory of 592 2368 7803a778b8973e6e250f4cb8547c5023.exe 20 PID 2368 wrote to memory of 592 2368 7803a778b8973e6e250f4cb8547c5023.exe 20 PID 2368 wrote to memory of 592 2368 7803a778b8973e6e250f4cb8547c5023.exe 20 PID 2368 wrote to memory of 592 2368 7803a778b8973e6e250f4cb8547c5023.exe 20 PID 2368 wrote to memory of 592 2368 7803a778b8973e6e250f4cb8547c5023.exe 20 PID 2368 wrote to memory of 592 2368 7803a778b8973e6e250f4cb8547c5023.exe 20 PID 2368 wrote to memory of 592 2368 7803a778b8973e6e250f4cb8547c5023.exe 20 PID 2368 wrote to memory of 668 2368 7803a778b8973e6e250f4cb8547c5023.exe 19 PID 2368 wrote to memory of 668 2368 7803a778b8973e6e250f4cb8547c5023.exe 19 PID 2368 wrote to memory of 668 2368 7803a778b8973e6e250f4cb8547c5023.exe 19 PID 2368 wrote to memory of 668 2368 7803a778b8973e6e250f4cb8547c5023.exe 19 PID 2368 wrote to memory of 668 2368 7803a778b8973e6e250f4cb8547c5023.exe 19 PID 2368 wrote to memory of 668 2368 7803a778b8973e6e250f4cb8547c5023.exe 19 PID 2368 wrote to memory of 668 2368 7803a778b8973e6e250f4cb8547c5023.exe 19 PID 2368 wrote to memory of 736 2368 7803a778b8973e6e250f4cb8547c5023.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\7803a778b8973e6e250f4cb8547c5023.exe"C:\Users\Admin\AppData\Local\Temp\7803a778b8973e6e250f4cb8547c5023.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\7803a778b8973e6e250f4cb8547c5023.exe"C:\Users\Admin\AppData\Local\Temp\7803a778b8973e6e250f4cb8547c5023.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2368
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe1⤵PID:2160
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation1⤵PID:2360
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1096
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1356
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1324
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1232
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork1⤵PID:340
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1020
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService1⤵PID:300
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService1⤵PID:988
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs1⤵PID:856
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted1⤵PID:808
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted1⤵PID:736
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS1⤵PID:668
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch1⤵PID:592
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe1⤵PID:500
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:492
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:484
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:436
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:400
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5e7aa8bc50a93af0517dfdf3790ad2600
SHA189cd162bf5c889ff50cde7af67a0f4042ecc1430
SHA256f44102fd43395ccef0006255c8dbd0e71fe53e1afb86dfbc397ea04f848f43c0
SHA5122bdfe0751dc0b507bd9135642b15b3b69bd5b9d0a97e63a3da96e04118bab23ece9cf0ca65745f066307f635e4c23e5124e2e1cae3a5c416fcf717143a18eaa2