Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/02/2024, 23:51
Behavioral task
behavioral1
Sample
a0aad14b7596a1900ef283c9525cf87c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a0aad14b7596a1900ef283c9525cf87c.exe
Resource
win10v2004-20240221-en
General
-
Target
a0aad14b7596a1900ef283c9525cf87c.exe
-
Size
27KB
-
MD5
a0aad14b7596a1900ef283c9525cf87c
-
SHA1
af2e46ef0e650a6a47522b64b5c3e75084a046bb
-
SHA256
afd479085a58d4179763830dbfcfebcf39461ad7a7589bbba43417859d2c61c9
-
SHA512
0ea39663755d5cc9fad90b56d958f0bb0c015797d4b13f00244c8d7f4599800d706dea75a70eff6ba12486e03202d10574cc889f4a5f1b86975380ad1224cb13
-
SSDEEP
768:VQjrjH4zBH2lC4CrleNlBk1OG/Tdk24t6:VQjrL2BmCjhuLKObA
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2480 gbvgbv16.exe -
Executes dropped EXE 2 IoCs
pid Process 2480 gbvgbv16.exe 2800 gbvgbv16.exe -
Loads dropped DLL 5 IoCs
pid Process 1908 a0aad14b7596a1900ef283c9525cf87c.exe 1908 a0aad14b7596a1900ef283c9525cf87c.exe 2480 gbvgbv16.exe 2800 gbvgbv16.exe 2800 gbvgbv16.exe -
resource yara_rule behavioral1/memory/1908-0-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1908-16-0x0000000000400000-0x0000000000414000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\gbvgbv16.exe a0aad14b7596a1900ef283c9525cf87c.exe File created C:\Windows\SysWOW64\gbvgbv16.exe a0aad14b7596a1900ef283c9525cf87c.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\fonts\dbr16031.ttf a0aad14b7596a1900ef283c9525cf87c.exe File created C:\Windows\fonts\dbr16031.ttf a0aad14b7596a1900ef283c9525cf87c.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1908 a0aad14b7596a1900ef283c9525cf87c.exe 2480 gbvgbv16.exe 2480 gbvgbv16.exe 2480 gbvgbv16.exe 2480 gbvgbv16.exe 2480 gbvgbv16.exe 2480 gbvgbv16.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1908 wrote to memory of 1192 1908 a0aad14b7596a1900ef283c9525cf87c.exe 11 PID 1908 wrote to memory of 2480 1908 a0aad14b7596a1900ef283c9525cf87c.exe 28 PID 1908 wrote to memory of 2480 1908 a0aad14b7596a1900ef283c9525cf87c.exe 28 PID 1908 wrote to memory of 2480 1908 a0aad14b7596a1900ef283c9525cf87c.exe 28 PID 1908 wrote to memory of 2480 1908 a0aad14b7596a1900ef283c9525cf87c.exe 28 PID 1908 wrote to memory of 2800 1908 a0aad14b7596a1900ef283c9525cf87c.exe 29 PID 1908 wrote to memory of 2800 1908 a0aad14b7596a1900ef283c9525cf87c.exe 29 PID 1908 wrote to memory of 2800 1908 a0aad14b7596a1900ef283c9525cf87c.exe 29 PID 1908 wrote to memory of 2800 1908 a0aad14b7596a1900ef283c9525cf87c.exe 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\a0aad14b7596a1900ef283c9525cf87c.exe"C:\Users\Admin\AppData\Local\Temp\a0aad14b7596a1900ef283c9525cf87c.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\gbvgbv16.exeC:\Windows\system32\gbvgbv16.exe C:\Windows\system32\dbr16031.ocx pfjaoidjglkajd C:\Users\Admin\AppData\Local\Temp\a0aad14b7596a1900ef283c9525cf87c.exe3⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2480
-
-
C:\Windows\SysWOW64\gbvgbv16.exeC:\Windows\system32\gbvgbv16.exe C:\Windows\system32\dbr99008.ocx pfjieaoidjglkajd3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2800
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD52a155689fa463358b119857ec18ca543
SHA1c513e9d38509907aec6100d1eba50fb6305de94b
SHA256136437ff874e787cf4aa72b6c482fe3fc3953f236a3c63689d62ad97b8689808
SHA512daa8f9c328ff1de15ecf91f45a421175dc621a4807eb4585876dbd12a8b3d6452c82acaded0f40dd37bcf8337f8c7f0ccabc6ee0823e1433c88b8cf0e2fa35fc
-
Filesize
412B
MD51f96869255c8eba5cbee01357fae92d0
SHA182b07a0530b4be08527c12f25b895bf0b6351647
SHA256b73ce11f8da3af5a0e6b5fe4427da64f27145eaef031d3cb2e3ea33ef4baa4cb
SHA5129504fd415d26ac90081a0b8662888d84b29c7dd02ad0aee099d422e3616376a7b23bd778506720733b0e9d0f4a62e74d0c5d1f66825506b402d29db1fe082b05
-
Filesize
11KB
MD5fe939fed997e8a51f7969178953f8c51
SHA1998b7aad9252a20f340bac68acc6ab719d20ad62
SHA256306d8061b2ed790624c81ba9a2cd83fafb39e490ba5aa74fa76d3f2fd30c052d
SHA5125b643c48fdb5df297a5c70cde6963ef3a9b041e40cae08161832b863d690d15390b936e667535df4a87168f918f3d60f2b1e28457a095c6f710355580f1e1fb4
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d