Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
37a68b25980...fe.exe
windows7-x64
77a68b25980...fe.exe
windows10-2004-x64
7$PLUGINSDI...ig.dll
windows7-x64
3$PLUGINSDI...ig.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...or.dll
windows7-x64
3$PLUGINSDI...or.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
$PLUGINSDIR/t1.dll
windows7-x64
1$PLUGINSDIR/t1.dll
windows10-2004-x64
1IWsrv.exe
windows7-x64
1IWsrv.exe
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
27/01/2024, 13:45
Static task
static1
Behavioral task
behavioral1
Sample
7a68b2598040d342eef5e8194b7971fe.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7a68b2598040d342eef5e8194b7971fe.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/IpConfig.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/IpConfig.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/WmiInspector.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/WmiInspector.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/t1.dll
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/t1.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
IWsrv.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
IWsrv.exe
Resource
win10v2004-20231222-en
General
-
Target
7a68b2598040d342eef5e8194b7971fe.exe
-
Size
301KB
-
MD5
7a68b2598040d342eef5e8194b7971fe
-
SHA1
7147fad58f345d94cf597425f9a93621d3b8d88d
-
SHA256
211fc50105cca5c9893cefe7ea1d740dd8d789ebe762075fe58d0669d160fc88
-
SHA512
820bc1db147c32ecea615062055c178800296477ec114408ab0b1e768149875af35dd908ed708f2f4535fb784fda825788e08991fd80a45106629c1a54e7217e
-
SSDEEP
6144:bzfj/IEL1c57oIWkhJrCGTpFIYsgeWnwtCd:7/IELYklkhRCCYYsgG
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2792 IWsrv.exe 2784 IWsrv.exe -
Loads dropped DLL 13 IoCs
pid Process 2656 7a68b2598040d342eef5e8194b7971fe.exe 2656 7a68b2598040d342eef5e8194b7971fe.exe 2656 7a68b2598040d342eef5e8194b7971fe.exe 2656 7a68b2598040d342eef5e8194b7971fe.exe 2656 7a68b2598040d342eef5e8194b7971fe.exe 2656 7a68b2598040d342eef5e8194b7971fe.exe 2656 7a68b2598040d342eef5e8194b7971fe.exe 2656 7a68b2598040d342eef5e8194b7971fe.exe 2656 7a68b2598040d342eef5e8194b7971fe.exe 2656 7a68b2598040d342eef5e8194b7971fe.exe 2656 7a68b2598040d342eef5e8194b7971fe.exe 2656 7a68b2598040d342eef5e8194b7971fe.exe 2656 7a68b2598040d342eef5e8194b7971fe.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Finalize = "C:\\Users\\Admin\\AppData\\Roaming\\InstallW\\Full_Setup.exe /runonce" 7a68b2598040d342eef5e8194b7971fe.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2656 7a68b2598040d342eef5e8194b7971fe.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2792 2656 7a68b2598040d342eef5e8194b7971fe.exe 30 PID 2656 wrote to memory of 2792 2656 7a68b2598040d342eef5e8194b7971fe.exe 30 PID 2656 wrote to memory of 2792 2656 7a68b2598040d342eef5e8194b7971fe.exe 30 PID 2656 wrote to memory of 2792 2656 7a68b2598040d342eef5e8194b7971fe.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a68b2598040d342eef5e8194b7971fe.exe"C:\Users\Admin\AppData\Local\Temp\7a68b2598040d342eef5e8194b7971fe.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Roaming\InstallW\IWsrv.exeC:\Users\Admin\AppData\Roaming\InstallW\IWsrv.exe install2⤵
- Executes dropped EXE
PID:2792
-
-
C:\Users\Admin\AppData\Roaming\InstallW\IWsrv.exeC:\Users\Admin\AppData\Roaming\InstallW\IWsrv.exe1⤵
- Executes dropped EXE
PID:2784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114KB
MD5a3ed6f7ea493b9644125d494fbf9a1e6
SHA1ebeee67fb0b5b3302c69f47c5e7fca62e1a809d8
SHA256ec0f85f8a9d6b77081ba0103f967ef6705b547bf27bcd866d77ac909d21a1e08
SHA5127099e1bc78ba5727661aa49f75523126563a5ebccdff10cabf868ce5335821118384825f037fbf1408c416c0212aa702a5974bc54d1b63c9d0bcade140f9aae1
-
Filesize
104KB
MD58531346d16fa5d4768f6530d2eb2b65c
SHA1153601d36aa0ddfbc597b1e890917364878791ca
SHA256a9347413de4b0f90cac0b5e300cec9c867bdb28bd7a60d07b10fd31ee56c60cb
SHA512f214e75de20edeb7eece02659fd7dafc8c3d63c2350c58825bc6e9ce0b73237962d8273b4bc803a2f304cee9f9cad1cd4edab28322c1e678bc25eb88faa6a841
-
Filesize
20KB
MD5f02155fa3e59a8fc48a74a236b2bb42e
SHA16d76ee8f86fb29f3352c9546250d940f1a476fb8
SHA256096a4dc5150f631b4d4d10cae07ef0974dda205b174399f46209265e89c2c999
SHA5128be78e88c5ef2cd01713f7b5154cfdeea65605cc5d110522375884eeec6bad68616a4058356726cbbd15d28b42914864045f0587e1e49a4e18336f06c1c73399
-
Filesize
4KB
MD5058ba8a0916d957d3b91d08ea2e876e2
SHA11a7c36c50c5bd93f535b624a2882bc3905e7e7f3
SHA256510af8083c0eef8b04e1171a9d6d94c64a1859701bbb106c565d2ec869437661
SHA51224124b45bf42e186a06fcb71ca7e2c1fed3b762b681286185d7cdff53b3800c35b6326a6f21c82e9de59d8bbcb3fdab4a5c1cc9c8683e43ff230b07913d26f02
-
Filesize
55KB
MD58c68148377f2f6da1992261ae2503773
SHA10f49e7ce220bd4862c9335a6512718b6908b59c2
SHA256ce6f3275d7c103f4b65e1afd444924a59505943ebaf27a1fabd162b480318b4b
SHA512de11083a64777720a8f2289f8dd9ee73166b7e3e1ee5d5ef90b979d3f5d9299573c7af5d22035a6a1ec7da94b140792096d59be64364ccc53ef927317c832238