Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/02/2024, 14:16
Behavioral task
behavioral1
Sample
a3feca9ceee93eacd57ac33485cadecc.exe
Resource
win7-20240221-en
General
-
Target
a3feca9ceee93eacd57ac33485cadecc.exe
-
Size
11KB
-
MD5
a3feca9ceee93eacd57ac33485cadecc
-
SHA1
8fb9c299de4517ab14165968b891bf117d43c754
-
SHA256
1b8ed464167fe9119209e5184e9206a6783daffb96ced01208d253459016c476
-
SHA512
c6e514b51a1f80012f316bc66e4eca2c10643655473022008f72b2d64ef3edcb5abb144e7b9e3c0c09ca4b178c28ba66ef624c11deceba0566ba210bbc799e35
-
SSDEEP
192:oEQ8aOqy470DLJpcmKwV7yKLpZYTL19xiLJy0hGsW:QeMYDXuhszYX19INhVW
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 3000 attrib.exe 2616 attrib.exe -
resource yara_rule behavioral1/files/0x000c000000012248-14.dat aspack_v212_v242 -
Deletes itself 1 IoCs
pid Process 2736 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2720 v4xqrsma.exe 2468 v4xqrsma.exe -
Loads dropped DLL 7 IoCs
pid Process 2736 cmd.exe 2736 cmd.exe 2764 cmd.exe 2764 cmd.exe 2344 WerFault.exe 2344 WerFault.exe 2344 WerFault.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\v4xqrsma.exe v4xqrsma.exe File opened for modification C:\Windows\SysWOW64\v4xqrsma.exe.bat v4xqrsma.exe File opened for modification C:\Windows\SysWOW64\v4xqrsma.exe.bat attrib.exe File created C:\Windows\SysWOW64\v4xqrsma.exe a3feca9ceee93eacd57ac33485cadecc.exe File opened for modification C:\Windows\SysWOW64\v4xqrsma.exe a3feca9ceee93eacd57ac33485cadecc.exe File created C:\Windows\SysWOW64\v4xqrsma.exe v4xqrsma.exe File created C:\Windows\SysWOW64\v4xqrsma.exe.bat v4xqrsma.exe File opened for modification C:\Windows\SysWOW64\v4xqrsma.exe.bat v4xqrsma.exe File opened for modification C:\Windows\SysWOW64\v4xqrsma.exe.bat attrib.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2344 2468 WerFault.exe 41 -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2588 tasklist.exe 2560 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2588 tasklist.exe Token: SeDebugPrivilege 2560 tasklist.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2736 2080 a3feca9ceee93eacd57ac33485cadecc.exe 28 PID 2080 wrote to memory of 2736 2080 a3feca9ceee93eacd57ac33485cadecc.exe 28 PID 2080 wrote to memory of 2736 2080 a3feca9ceee93eacd57ac33485cadecc.exe 28 PID 2080 wrote to memory of 2736 2080 a3feca9ceee93eacd57ac33485cadecc.exe 28 PID 2736 wrote to memory of 3000 2736 cmd.exe 30 PID 2736 wrote to memory of 3000 2736 cmd.exe 30 PID 2736 wrote to memory of 3000 2736 cmd.exe 30 PID 2736 wrote to memory of 3000 2736 cmd.exe 30 PID 2736 wrote to memory of 2588 2736 cmd.exe 31 PID 2736 wrote to memory of 2588 2736 cmd.exe 31 PID 2736 wrote to memory of 2588 2736 cmd.exe 31 PID 2736 wrote to memory of 2588 2736 cmd.exe 31 PID 2736 wrote to memory of 2576 2736 cmd.exe 32 PID 2736 wrote to memory of 2576 2736 cmd.exe 32 PID 2736 wrote to memory of 2576 2736 cmd.exe 32 PID 2736 wrote to memory of 2576 2736 cmd.exe 32 PID 2736 wrote to memory of 2720 2736 cmd.exe 34 PID 2736 wrote to memory of 2720 2736 cmd.exe 34 PID 2736 wrote to memory of 2720 2736 cmd.exe 34 PID 2736 wrote to memory of 2720 2736 cmd.exe 34 PID 2736 wrote to memory of 1400 2736 cmd.exe 35 PID 2736 wrote to memory of 1400 2736 cmd.exe 35 PID 2736 wrote to memory of 1400 2736 cmd.exe 35 PID 2736 wrote to memory of 1400 2736 cmd.exe 35 PID 2720 wrote to memory of 2764 2720 v4xqrsma.exe 37 PID 2720 wrote to memory of 2764 2720 v4xqrsma.exe 37 PID 2720 wrote to memory of 2764 2720 v4xqrsma.exe 37 PID 2720 wrote to memory of 2764 2720 v4xqrsma.exe 37 PID 2764 wrote to memory of 2616 2764 cmd.exe 38 PID 2764 wrote to memory of 2616 2764 cmd.exe 38 PID 2764 wrote to memory of 2616 2764 cmd.exe 38 PID 2764 wrote to memory of 2616 2764 cmd.exe 38 PID 2764 wrote to memory of 2560 2764 cmd.exe 39 PID 2764 wrote to memory of 2560 2764 cmd.exe 39 PID 2764 wrote to memory of 2560 2764 cmd.exe 39 PID 2764 wrote to memory of 2560 2764 cmd.exe 39 PID 2764 wrote to memory of 2248 2764 cmd.exe 40 PID 2764 wrote to memory of 2248 2764 cmd.exe 40 PID 2764 wrote to memory of 2248 2764 cmd.exe 40 PID 2764 wrote to memory of 2248 2764 cmd.exe 40 PID 2764 wrote to memory of 2468 2764 cmd.exe 41 PID 2764 wrote to memory of 2468 2764 cmd.exe 41 PID 2764 wrote to memory of 2468 2764 cmd.exe 41 PID 2764 wrote to memory of 2468 2764 cmd.exe 41 PID 2764 wrote to memory of 2524 2764 cmd.exe 43 PID 2764 wrote to memory of 2524 2764 cmd.exe 43 PID 2764 wrote to memory of 2524 2764 cmd.exe 43 PID 2764 wrote to memory of 2524 2764 cmd.exe 43 PID 2468 wrote to memory of 2344 2468 v4xqrsma.exe 42 PID 2468 wrote to memory of 2344 2468 v4xqrsma.exe 42 PID 2468 wrote to memory of 2344 2468 v4xqrsma.exe 42 PID 2468 wrote to memory of 2344 2468 v4xqrsma.exe 42 -
Views/modifies file attributes 1 TTPs 4 IoCs
pid Process 3000 attrib.exe 1400 attrib.exe 2616 attrib.exe 2524 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3feca9ceee93eacd57ac33485cadecc.exe"C:\Users\Admin\AppData\Local\Temp\a3feca9ceee93eacd57ac33485cadecc.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\a3feca9ceee93eacd57ac33485cadecc.exe.bat2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\attrib.exeattrib C:\Users\Admin\AppData\Local\Temp\a3feca9ceee93eacd57ac33485cadecc.exe.bat -r -a +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:3000
-
-
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2588
-
-
C:\Windows\SysWOW64\findstr.exefindstr /i /b "a3feca9ceee93eacd57ac33485cadecc.exe"3⤵PID:2576
-
-
C:\Windows\SysWOW64\v4xqrsma.exeC:\Windows\system32\v4xqrsma.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\SysWOW64\v4xqrsma.exe.bat4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\attrib.exeattrib C:\Windows\SysWOW64\v4xqrsma.exe.bat -r -a +s +h5⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
PID:2616
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
C:\Windows\SysWOW64\findstr.exefindstr /i /b "v4xqrsma.exe"5⤵PID:2248
-
-
C:\Windows\SysWOW64\v4xqrsma.exeC:\Windows\system32\v4xqrsma.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2468 -s 1686⤵
- Loads dropped DLL
- Program crash
PID:2344
-
-
-
C:\Windows\SysWOW64\attrib.exeattrib C:\Windows\SysWOW64\v4xqrsma.exe.bat -r -a -s -h5⤵
- Drops file in System32 directory
- Views/modifies file attributes
PID:2524
-
-
-
-
C:\Windows\SysWOW64\attrib.exeattrib C:\Users\Admin\AppData\Local\Temp\a3feca9ceee93eacd57ac33485cadecc.exe.bat -r -a -s -h3⤵
- Views/modifies file attributes
PID:1400
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
286B
MD5aaa8689f21e0cb13f4ce7330b554cf19
SHA13606374bfdb52b62ec9c83e0c201e31a2caab793
SHA256b0ff782a07dc3e7fe1047941e3364cbae2fc20a724618b7bb7aa74d61cefc186
SHA5127078d7ededce638102ce7ed5b381dace8c9c3b9bfd8f93cacfde2ecf40b222b98a89ba7cf4e3dd63704ed04ebc7e66eddf2e44b51549a0e43db8a31fe6f1209f
-
Filesize
238B
MD5cbc305398dd7f272c7b788e0ce899599
SHA1dc249bf238f78e528ee63634ddcfc0b7203603ba
SHA25633537c3bf02f657a1bd8a21e43c463250468358e04948330d1ce16e1d26b0450
SHA51280707b7ad486b855297f2991f67951d118f053536f81eec2e3d87d36c0185293923edb1be444346b42539424c32f046d6853f85abb2290d602755ea0abed663c
-
Filesize
11KB
MD5a3feca9ceee93eacd57ac33485cadecc
SHA18fb9c299de4517ab14165968b891bf117d43c754
SHA2561b8ed464167fe9119209e5184e9206a6783daffb96ced01208d253459016c476
SHA512c6e514b51a1f80012f316bc66e4eca2c10643655473022008f72b2d64ef3edcb5abb144e7b9e3c0c09ca4b178c28ba66ef624c11deceba0566ba210bbc799e35