Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/02/2024, 19:34
Static task
static1
Behavioral task
behavioral1
Sample
a9fc6d262d5ef5d3a54a4ed2b0aa76f8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a9fc6d262d5ef5d3a54a4ed2b0aa76f8.exe
Resource
win10v2004-20240226-en
General
-
Target
a9fc6d262d5ef5d3a54a4ed2b0aa76f8.exe
-
Size
9KB
-
MD5
a9fc6d262d5ef5d3a54a4ed2b0aa76f8
-
SHA1
35a0649e7e1e00d26c43bc0be957d3c342c64d64
-
SHA256
3d57a2a4cba8b9512d7bbcbc9bcb7a6f96d9e43523ca225a1b036ddfa1b935f7
-
SHA512
ba1045f4ce160c2f50dbbc1bd2676c86cbe1fd911b347141302866ab372eb5b2b26aff03a37e2b2ebb67f0c12c521a8f531799c692493b3b762d65e0e71d1dee
-
SSDEEP
192:iqJ4fwR382LQ9gfXdWYLlZa9nwTj6buTkdIaYpkP45n6uJij4BWrJL:iDwR382LQ98XdhLls9wTj+2dpD56bj40
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1032 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2316 svcore.exe -
Loads dropped DLL 2 IoCs
pid Process 2164 a9fc6d262d5ef5d3a54a4ed2b0aa76f8.exe 2164 a9fc6d262d5ef5d3a54a4ed2b0aa76f8.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Protocol = "SADS:\\Boot.ini" svcore.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\System\svcore.exe a9fc6d262d5ef5d3a54a4ed2b0aa76f8.exe File created C:\Program Files (x86)\Common Files\System\svcore.exe a9fc6d262d5ef5d3a54a4ed2b0aa76f8.exe -
Modifies registry class 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SADS\shell\open\command\ = "Rundll32 shell32.dll,ShellExec_RunDLLA \"C:\\Program Files (x86)\\Common Files\\System\\svcore.exe\"" svcore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SADS svcore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SADS\URL Protocol svcore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SADS\shell\open\command svcore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SADS\shell svcore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SADS\shell\open svcore.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2684 PING.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2316 2164 a9fc6d262d5ef5d3a54a4ed2b0aa76f8.exe 28 PID 2164 wrote to memory of 2316 2164 a9fc6d262d5ef5d3a54a4ed2b0aa76f8.exe 28 PID 2164 wrote to memory of 2316 2164 a9fc6d262d5ef5d3a54a4ed2b0aa76f8.exe 28 PID 2164 wrote to memory of 2316 2164 a9fc6d262d5ef5d3a54a4ed2b0aa76f8.exe 28 PID 2164 wrote to memory of 1032 2164 a9fc6d262d5ef5d3a54a4ed2b0aa76f8.exe 29 PID 2164 wrote to memory of 1032 2164 a9fc6d262d5ef5d3a54a4ed2b0aa76f8.exe 29 PID 2164 wrote to memory of 1032 2164 a9fc6d262d5ef5d3a54a4ed2b0aa76f8.exe 29 PID 2164 wrote to memory of 1032 2164 a9fc6d262d5ef5d3a54a4ed2b0aa76f8.exe 29 PID 1032 wrote to memory of 2684 1032 cmd.exe 31 PID 1032 wrote to memory of 2684 1032 cmd.exe 31 PID 1032 wrote to memory of 2684 1032 cmd.exe 31 PID 1032 wrote to memory of 2684 1032 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9fc6d262d5ef5d3a54a4ed2b0aa76f8.exe"C:\Users\Admin\AppData\Local\Temp\a9fc6d262d5ef5d3a54a4ed2b0aa76f8.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Program Files (x86)\Common Files\System\svcore.exe"C:\Program Files (x86)\Common Files\System\svcore.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:2316
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping 127.1 -n 1 & erase /F "C:\Users\Admin\AppData\Local\Temp\a9fc6d262d5ef5d3a54a4ed2b0aa76f8.exe" > nul2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\PING.EXEping 127.1 -n 13⤵
- Runs ping.exe
PID:2684
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5a9fc6d262d5ef5d3a54a4ed2b0aa76f8
SHA135a0649e7e1e00d26c43bc0be957d3c342c64d64
SHA2563d57a2a4cba8b9512d7bbcbc9bcb7a6f96d9e43523ca225a1b036ddfa1b935f7
SHA512ba1045f4ce160c2f50dbbc1bd2676c86cbe1fd911b347141302866ab372eb5b2b26aff03a37e2b2ebb67f0c12c521a8f531799c692493b3b762d65e0e71d1dee