Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
20s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 21:04
Static task
static1
Behavioral task
behavioral1
Sample
Desktop.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Desktop.exe
Resource
win10v2004-20231222-en
General
-
Target
Desktop.exe
-
Size
16.3MB
-
MD5
d0f8a153efa37f3809298a35af4e554b
-
SHA1
03048b1501eaee47dd7e705f99bebf9b3061f04d
-
SHA256
7c71c471a91d678d1ee60d1f2f8058ce2588fba81c3836c952bbcc1e861ee7d6
-
SHA512
31a136bd17426e9e61b54a6098b667e6f551182ef3e910f74499c37428301fb7d524e0ed8cc35a450d5889c7818f0dbb002498e193c8063e4c441618520bbca1
-
SSDEEP
393216:k1lgAxOYy75enI9f03JPPsMsNA/fI2cdxxxOAWO+B8Di:glgy+En0f053QAokTOm
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2416 pic.exe 2868 pic.exe -
Loads dropped DLL 5 IoCs
pid Process 2444 Desktop.exe 2416 pic.exe 2868 pic.exe 1380 Process not Found 1380 Process not Found -
resource yara_rule behavioral1/files/0x000500000001a453-111.dat upx behavioral1/memory/2868-113-0x000007FEF5C10000-0x000007FEF62E0000-memory.dmp upx -
Detects Pyinstaller 8 IoCs
resource yara_rule behavioral1/files/0x000e0000000122c0-8.dat pyinstaller behavioral1/files/0x000e0000000122c0-11.dat pyinstaller behavioral1/files/0x000e0000000122c0-10.dat pyinstaller behavioral1/files/0x000e0000000122c0-12.dat pyinstaller behavioral1/files/0x000e0000000122c0-110.dat pyinstaller behavioral1/files/0x000e0000000122c0-109.dat pyinstaller behavioral1/files/0x000e0000000122c0-115.dat pyinstaller behavioral1/files/0x000e0000000122c0-114.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2660 DllHost.exe 2660 DllHost.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2416 2444 Desktop.exe 31 PID 2444 wrote to memory of 2416 2444 Desktop.exe 31 PID 2444 wrote to memory of 2416 2444 Desktop.exe 31 PID 2444 wrote to memory of 2416 2444 Desktop.exe 31 PID 2416 wrote to memory of 2868 2416 pic.exe 32 PID 2416 wrote to memory of 2868 2416 pic.exe 32 PID 2416 wrote to memory of 2868 2416 pic.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Desktop.exe"C:\Users\Admin\AppData\Local\Temp\Desktop.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\pic.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\pic.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\pic.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\pic.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2868
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:816
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Suspicious use of FindShellTrayWindow
PID:2660
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD57d1fec2d382aef90c310fc7ceea9ca71
SHA175ae0dd822832bd39d13c9e4fa0f9e9ded9d1e16
SHA2565751de39375a6b2bbfda219a16b717d41682f8711f2a083babac1527e361bbf4
SHA512e99209e8e12f061be088e22f87d4cd3dccbe6fb8ee640639f8c0bdaed9d33c2898504304b5dbab638aa629a08553a56debfc557ecfbdd806fcaa31811e55e159
-
Filesize
1.9MB
MD56b6f7f9a73ceda19dce90a406c33468d
SHA1f2dd1c393c0ad5083d224cb70ef5b0511486e1b8
SHA256bcd233cf4e25f763f8c7b012cf9357d24e50bb7a5139de93d7ba875d10e24008
SHA512752e917bcdbd6847e5f1db9f58c4a3e9abb648c5dd8e2d97c54a525f7e9afe20b844c2acf73fbbd0ca07a9dfac3998ef091c576b754167984dc7a671e3cadf94
-
Filesize
4.8MB
MD52149a5632d0df456eda5dbdb6d3b04d8
SHA1feb95b671d2a5d16c4fa29e60aba0b15ae4c0a80
SHA256d3a822537635d1ca95d24ed9b5b666313f064f85bb09bf9603bb7cd9f74c901f
SHA5124c5b74e98c427f4d2a1d46d017c526368ec417087c154fdb8721a5d7cd508fb0bff46cf6b10572f86e7a682cfad771519b375f7f8983f25a62fd54bf84ba0b66
-
Filesize
2.9MB
MD55a9dfd11aa2e635b052644a7afa3c07d
SHA18b14a02e9e2c6789c31fdb707f69dc5532c4ed55
SHA256d523c36525754cb6451c9a987155f4fcc80cdeab8dddc2a5051d27ae555fc0a9
SHA5124d5725a844efd62eb7c127ac8d3e3fdf4161f45aeb251dd087f20faeb073ece6edce261097545e318e92c4b712bd3cfc7c845e4cefa1b3dbe13b7c41c83619a4
-
Filesize
239KB
MD5f9753a1ec5fd2350cdc949d7fc4e9a48
SHA154dae64b8c0cf51a1f0063b517d0f4f1507c25bf
SHA2561c687f9abf9aa6bc6892b080efb028e6327e50dfc176feae873baf4cfff0fefc
SHA5126cd64e1232775693d00a06dd10b6df06a202c30db8451e4b5c27d54252a9b5bfaec87478d10f6d141e4c27e2bb08db38afe46e1bf6f11f6e28ef5541cbf78260
-
Filesize
1.7MB
MD586d9b8b15b0340d6ec235e980c05c3be
SHA1a03bdd45215a0381dcb3b22408dbc1f564661c73
SHA25612dbbcd67015d6cdb680752184107b7deb84e906b0e8e860385f85d33858a5f6
SHA512d360cc3f00d90fd04cbba09d879e2826968df0c1fdc44890c60b8450fe028c3e767450c3543c62d4f284fb7e004a9a33c52538c2279221ee6cbdb1a9485f88b2
-
Filesize
6.1MB
MD59f33508a21920f0059c931ca0cafb801
SHA1348e0981b5784fa654d0c9d09a28ed7bd52f4b27
SHA2568a701300a20ff64c001425a6954f3d1d55c8a6c828c09754849d81552d006583
SHA512f3d246ee2554923d06c9e32393dec29efd82a258b1c2d6506b3c64ed71909099410b6898a9f7c35a5caf8886404eaa9a35247cd8a0e3b6f9443874376f8777cb
-
Filesize
5.0MB
MD5a339ff20cadcba0c4059dfabb70cb975
SHA13c11ce8832d732a9288bece9974f3ede119d1b6e
SHA2565f58d82392f1fd60bb1a4a308e3785bc3904b7cbaabaf2358c437eb108cb3b18
SHA5129f4224c29edff3d2272f4f837b46a82223c477c1c67622d03a2bdb0218a28824a23af714a6a0884c5ecdf8aeb3b2fa6aa0f8165635968a178b57b1dc2fffc808
-
Filesize
3.9MB
MD5f1f590917eab64e9ba86f921b6ad2107
SHA1169fb9a233666659f2c3d5539e36a5cd010a88e9
SHA2565342083fb81bd9c4e48e8511b3d1bc80fdd8ef855927b639772335b7bc90bd7d
SHA5122374af5688272dc901dfbdf2cf537b0693936e230291ebedfaf4e1c898c19ffbdc93b2e6239a42693bd2dcd7e2a7094c18088d8ad021682b4a7d0048cfe593bb
-
Filesize
34KB
MD52f544bc7b40e0184c73edf9b271fd6b6
SHA1e93e68c0417842a25d86cb9c162e380b263e379e
SHA256ff68d6c78c1831c34f3fba009c81383f3f4268f6683e2e49dc98b2adc47ab5b4
SHA5127946830ccea460bc4a4d61aeb0e497a7c9e987a715c2ff8ded347a1851aba0232b8d35651957c240bb9b20fffee821dd8161c7b292a275ff3c0bd3a6917d0851