Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
29/01/2024, 10:36
Static task
static1
Behavioral task
behavioral1
Sample
7f9feda2c0547e62a4031e87884f894a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7f9feda2c0547e62a4031e87884f894a.exe
Resource
win10v2004-20231222-en
General
-
Target
7f9feda2c0547e62a4031e87884f894a.exe
-
Size
41KB
-
MD5
7f9feda2c0547e62a4031e87884f894a
-
SHA1
01cca3006f60fe9b8c7f93d190fe30b1349f3193
-
SHA256
7887c75b53fd530c8e9ff62984862c8999fcc0c1d2938076a803f8b5acf24200
-
SHA512
3c6b403e7b12b7a87ae2d122974385e7f864dcfa734481cac5f82f1b150c76f138df92680b7e5b2549c75d7218ee6e5b4663dfaa1c66686cfe3e6b62e189c823
-
SSDEEP
768:QGBar1ZIZYnfI9opm6AIHIjaI7g9mVmUn5oNE/W5dRV8:fW1ZIZqI9opm6AIHIjzmUiNzd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2152 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2172 sxhost.exe -
Loads dropped DLL 2 IoCs
pid Process 2336 7f9feda2c0547e62a4031e87884f894a.exe 2336 7f9feda2c0547e62a4031e87884f894a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2172 2336 7f9feda2c0547e62a4031e87884f894a.exe 30 PID 2336 wrote to memory of 2172 2336 7f9feda2c0547e62a4031e87884f894a.exe 30 PID 2336 wrote to memory of 2172 2336 7f9feda2c0547e62a4031e87884f894a.exe 30 PID 2336 wrote to memory of 2172 2336 7f9feda2c0547e62a4031e87884f894a.exe 30 PID 2336 wrote to memory of 2152 2336 7f9feda2c0547e62a4031e87884f894a.exe 29 PID 2336 wrote to memory of 2152 2336 7f9feda2c0547e62a4031e87884f894a.exe 29 PID 2336 wrote to memory of 2152 2336 7f9feda2c0547e62a4031e87884f894a.exe 29 PID 2336 wrote to memory of 2152 2336 7f9feda2c0547e62a4031e87884f894a.exe 29 PID 2172 wrote to memory of 2688 2172 sxhost.exe 33 PID 2172 wrote to memory of 2688 2172 sxhost.exe 33 PID 2172 wrote to memory of 2688 2172 sxhost.exe 33 PID 2172 wrote to memory of 2688 2172 sxhost.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f9feda2c0547e62a4031e87884f894a.exe"C:\Users\Admin\AppData\Local\Temp\7f9feda2c0547e62a4031e87884f894a.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\7F9FED~1.EXE >> NUL2⤵
- Deletes itself
PID:2152
-
-
C:\Users\Admin\sxhost.exe"C:\Users\Admin\sxhost.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c del C:\Users\Admin\sxhost.exe >> NUL3⤵PID:2688
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD57f9feda2c0547e62a4031e87884f894a
SHA101cca3006f60fe9b8c7f93d190fe30b1349f3193
SHA2567887c75b53fd530c8e9ff62984862c8999fcc0c1d2938076a803f8b5acf24200
SHA5123c6b403e7b12b7a87ae2d122974385e7f864dcfa734481cac5f82f1b150c76f138df92680b7e5b2549c75d7218ee6e5b4663dfaa1c66686cfe3e6b62e189c823