Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/01/2024, 16:14
Static task
static1
Behavioral task
behavioral1
Sample
80480df20528a22dee4ff724e155e4f0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
80480df20528a22dee4ff724e155e4f0.exe
Resource
win10v2004-20231215-en
General
-
Target
80480df20528a22dee4ff724e155e4f0.exe
-
Size
706KB
-
MD5
80480df20528a22dee4ff724e155e4f0
-
SHA1
f8d53c2693c7b0a7ec57804cfe73d518d5f858c9
-
SHA256
7c0c2c2ac8bb363c372b015c46e2bc8e57b895b0e61a7728622c0134f476cff0
-
SHA512
1a9c711da9cdf2ac26fccce16828dbf91f4c4d664c25547a462b800df005abd97f613f8950e562ce0d9ae6600773782ce69a26e10070971bfe7ce3bfbf48f82f
-
SSDEEP
12288:gp/iN/mlVdtvrYeyZJf7kPK+iqBZn+D73iKHeGsptI7FNtWS0Oam:gpQ/6trYlvYPK+lqD73TeGsptIpDWPm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2724 ScrBlaze.scr -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\s18273659 80480df20528a22dee4ff724e155e4f0.exe File opened for modification C:\Windows\s18273659 80480df20528a22dee4ff724e155e4f0.exe File created C:\Windows\ScrBlaze.scr 80480df20528a22dee4ff724e155e4f0.exe File created C:\Windows\s18273659 ScrBlaze.scr File opened for modification C:\Windows\s18273659 ScrBlaze.scr -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Control Panel\Desktop 80480df20528a22dee4ff724e155e4f0.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\ScrBlaze.scr" 80480df20528a22dee4ff724e155e4f0.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main ScrBlaze.scr -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2880 80480df20528a22dee4ff724e155e4f0.exe 2880 80480df20528a22dee4ff724e155e4f0.exe 2724 ScrBlaze.scr 2724 ScrBlaze.scr -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2724 2880 80480df20528a22dee4ff724e155e4f0.exe 29 PID 2880 wrote to memory of 2724 2880 80480df20528a22dee4ff724e155e4f0.exe 29 PID 2880 wrote to memory of 2724 2880 80480df20528a22dee4ff724e155e4f0.exe 29 PID 2880 wrote to memory of 2724 2880 80480df20528a22dee4ff724e155e4f0.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\80480df20528a22dee4ff724e155e4f0.exe"C:\Users\Admin\AppData\Local\Temp\80480df20528a22dee4ff724e155e4f0.exe"1⤵
- Drops file in Windows directory
- Modifies Control Panel
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\ScrBlaze.scr"C:\Windows\ScrBlaze.scr" /S2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73B
MD5cc72ae9fad187d5f386609980c6482d7
SHA128cb399a98d18b200a5c12f700e9e7a558286da2
SHA2560c71f7bff22cbde479407ae4b7268362a1e535de137e1b03cb548c002d6b0763
SHA5129af0e784a06e381b2e187b025e5f1fea2965ee9694cbbe3bd1a5f55897af6c0c9b1a33151c3c7722b806654d20b74940a22e28eb11ce82d560d96f08f1878435
-
Filesize
706KB
MD580480df20528a22dee4ff724e155e4f0
SHA1f8d53c2693c7b0a7ec57804cfe73d518d5f858c9
SHA2567c0c2c2ac8bb363c372b015c46e2bc8e57b895b0e61a7728622c0134f476cff0
SHA5121a9c711da9cdf2ac26fccce16828dbf91f4c4d664c25547a462b800df005abd97f613f8950e562ce0d9ae6600773782ce69a26e10070971bfe7ce3bfbf48f82f
-
Filesize
825B
MD5d65166943fba3032efadd102a502b056
SHA1a9834d819fdd3f4ed02fc43d684b6ad1e525ff08
SHA2560f2a908a50479089064985a0c3f1232142882d23ff8c491dfe18d2bd07eb27dc
SHA512aa80b32bef8eec415337c7811525ebe9f2ee76916142377c17f958487e7f5865cad05f5c348fbecb9d9cad460e0db90dab07ed27d9f414e847dd9f2cf0ab0f00