Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02/02/2024, 21:12
Static task
static1
Behavioral task
behavioral1
Sample
8a8b27cd30eca23ce2f317522db415ee.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8a8b27cd30eca23ce2f317522db415ee.exe
Resource
win10v2004-20231222-en
General
-
Target
8a8b27cd30eca23ce2f317522db415ee.exe
-
Size
234KB
-
MD5
8a8b27cd30eca23ce2f317522db415ee
-
SHA1
23beb661ebe0fcb4a670220e2de75c916170b88a
-
SHA256
dc1cd6e7cb3b717a9f4958777cbab775ec118cb2b326191d655c455f2bfc2169
-
SHA512
7cd95ec1f932846a8cdf3ce60b11b4d5b37b3f239ff99210c5356c9b78737b82f2b54e37c41d22a22aebe0414f1fc1db4f67fac29d8a6653bf63a352e65deb18
-
SSDEEP
6144:o68i3odBiTl2+TCU/89/tkqxrqLckP+xR:TNodBiTI+TpQ/DrVkP+xR
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 8a8b27cd30eca23ce2f317522db415ee.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\winhash_up.exez 8a8b27cd30eca23ce2f317522db415ee.exe File opened for modification C:\Windows\winhash_up.exez 8a8b27cd30eca23ce2f317522db415ee.exe File created C:\Windows\winhash_up.exe 8a8b27cd30eca23ce2f317522db415ee.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 8a8b27cd30eca23ce2f317522db415ee.exe File created C:\Windows\SHARE_TEMP\Icon13.ico 8a8b27cd30eca23ce2f317522db415ee.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 8a8b27cd30eca23ce2f317522db415ee.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 8a8b27cd30eca23ce2f317522db415ee.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 8a8b27cd30eca23ce2f317522db415ee.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 8a8b27cd30eca23ce2f317522db415ee.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 8a8b27cd30eca23ce2f317522db415ee.exe File created C:\Windows\SHARE_TEMP\Icon7.ico 8a8b27cd30eca23ce2f317522db415ee.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 8a8b27cd30eca23ce2f317522db415ee.exe File created C:\Windows\bugMAKER.bat 8a8b27cd30eca23ce2f317522db415ee.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2428 2856 8a8b27cd30eca23ce2f317522db415ee.exe 28 PID 2856 wrote to memory of 2428 2856 8a8b27cd30eca23ce2f317522db415ee.exe 28 PID 2856 wrote to memory of 2428 2856 8a8b27cd30eca23ce2f317522db415ee.exe 28 PID 2856 wrote to memory of 2428 2856 8a8b27cd30eca23ce2f317522db415ee.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8a8b27cd30eca23ce2f317522db415ee.exe"C:\Users\Admin\AppData\Local\Temp\8a8b27cd30eca23ce2f317522db415ee.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD5e94914bcf5c8e680b4ff075485c5603d
SHA1c7ffcad96dc16a2b0cbfaf8310ea086a8814d1d0
SHA256317239c5c187c6d80fcbc3aea5e586328f164f05a000c0f4c6b1541e6e24bdff
SHA512cd15c279c1ed2eb33b63f199b3894f9dbccb78a1d4478e3448316638cea6dec05b76c25e24682734a24b60efde9d1d24be4befae3cba2d810bcb36f5a9968cb1