Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 04:53
Static task
static1
Behavioral task
behavioral1
Sample
98860f7832d3533ce050b81aac42e2bc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
98860f7832d3533ce050b81aac42e2bc.exe
Resource
win10v2004-20231222-en
General
-
Target
98860f7832d3533ce050b81aac42e2bc.exe
-
Size
253KB
-
MD5
98860f7832d3533ce050b81aac42e2bc
-
SHA1
55b08d28bcbaa53cf3b7508dca9f4e3cdd18eeda
-
SHA256
527771d7d660fa0fcdb51d4d19602d8c60c420f8a594f0d9b9aa00670105f0d7
-
SHA512
27bf828beb5d2cf3edffcb2b20729ce7ef0a9151fde2efe722ed20e3a940b36b60e86ce03e44e1c37a0f8065aa8e9c0a4ef4bfe23f85bef6acb93cacd2ecf7d9
-
SSDEEP
6144:o68i3odBiTl2+TCU/BtkqxrqLck9k8KfI:TNodBiTI+TpBDrVk9AI
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft I Service = "C:\\Windows\\winhash_up.exe /REGstart" 98860f7832d3533ce050b81aac42e2bc.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\SHARE_TEMP\Icon7.ico 98860f7832d3533ce050b81aac42e2bc.exe File created C:\Windows\SHARE_TEMP\Icon13.ico 98860f7832d3533ce050b81aac42e2bc.exe File created C:\Windows\winhash_up.exe 98860f7832d3533ce050b81aac42e2bc.exe File created C:\Windows\SHARE_TEMP\Icon6.ico 98860f7832d3533ce050b81aac42e2bc.exe File created C:\Windows\SHARE_TEMP\Icon12.ico 98860f7832d3533ce050b81aac42e2bc.exe File opened for modification C:\Windows\winhash_up.exez 98860f7832d3533ce050b81aac42e2bc.exe File created C:\Windows\SHARE_TEMP\Icon3.ico 98860f7832d3533ce050b81aac42e2bc.exe File created C:\Windows\SHARE_TEMP\Icon14.ico 98860f7832d3533ce050b81aac42e2bc.exe File created C:\Windows\bugMAKER.bat 98860f7832d3533ce050b81aac42e2bc.exe File created C:\Windows\SHARE_TEMP\Icon2.ico 98860f7832d3533ce050b81aac42e2bc.exe File created C:\Windows\SHARE_TEMP\Icon5.ico 98860f7832d3533ce050b81aac42e2bc.exe File created C:\Windows\winhash_up.exez 98860f7832d3533ce050b81aac42e2bc.exe File created C:\Windows\SHARE_TEMP\Icon10.ico 98860f7832d3533ce050b81aac42e2bc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1744 wrote to memory of 2020 1744 98860f7832d3533ce050b81aac42e2bc.exe 28 PID 1744 wrote to memory of 2020 1744 98860f7832d3533ce050b81aac42e2bc.exe 28 PID 1744 wrote to memory of 2020 1744 98860f7832d3533ce050b81aac42e2bc.exe 28 PID 1744 wrote to memory of 2020 1744 98860f7832d3533ce050b81aac42e2bc.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\98860f7832d3533ce050b81aac42e2bc.exe"C:\Users\Admin\AppData\Local\Temp\98860f7832d3533ce050b81aac42e2bc.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\bugMAKER.bat2⤵PID:2020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76B
MD5c58cc61ce3e624c99d05bd5bec580b32
SHA1651e7b2c9c0fc550fe3244230c0c105bf1d91d15
SHA256b888a6bec437291b8fa3a29b79ca4044c58dd7897482ad7a9458eaee2bb5be3a
SHA5127c2c9716051c6a751a4cdfd904b5fa2f7c0996096b332016da9aecb7cc341c55fbfb0d25707e4f3f3227471719fcf620f7a3d493b95773a3af7ca8cfb37b1c46