Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
166s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
28/02/2024, 04:53
Static task
static1
Behavioral task
behavioral1
Sample
9de4e64928cd34bd3ee257647bcc17d3f836331a9d43d5209732d467c2bdb32e.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
9de4e64928cd34bd3ee257647bcc17d3f836331a9d43d5209732d467c2bdb32e.exe
Resource
win10-20240221-en
General
-
Target
9de4e64928cd34bd3ee257647bcc17d3f836331a9d43d5209732d467c2bdb32e.exe
-
Size
2.2MB
-
MD5
c7479887c886ef76ed7b8575af13a195
-
SHA1
c22469922530d32d2bdcead0893e47dfaad450c4
-
SHA256
9de4e64928cd34bd3ee257647bcc17d3f836331a9d43d5209732d467c2bdb32e
-
SHA512
eff2e134ddcec6c8870d33f347d8ecef7681284ab4f4acde340fb60be944a495297d876476ce1dc22d991116fdb126e31e356b11f639d2094e9c8da19f5eece6
-
SSDEEP
49152:anGImUMrowwcBcU/ONGXQdGv+so3KVNTK/XBimV+8YKip+iAn3emc:aGIwobbU/OsXQdGWeNTK/Rima1mc
Malware Config
Signatures
-
Loads dropped DLL 8 IoCs
pid Process 2884 rundll32.exe 2884 rundll32.exe 2884 rundll32.exe 2884 rundll32.exe 1324 rundll32.exe 1324 rundll32.exe 1324 rundll32.exe 1324 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1656 wrote to memory of 1924 1656 9de4e64928cd34bd3ee257647bcc17d3f836331a9d43d5209732d467c2bdb32e.exe 28 PID 1656 wrote to memory of 1924 1656 9de4e64928cd34bd3ee257647bcc17d3f836331a9d43d5209732d467c2bdb32e.exe 28 PID 1656 wrote to memory of 1924 1656 9de4e64928cd34bd3ee257647bcc17d3f836331a9d43d5209732d467c2bdb32e.exe 28 PID 1656 wrote to memory of 1924 1656 9de4e64928cd34bd3ee257647bcc17d3f836331a9d43d5209732d467c2bdb32e.exe 28 PID 1924 wrote to memory of 2884 1924 control.exe 29 PID 1924 wrote to memory of 2884 1924 control.exe 29 PID 1924 wrote to memory of 2884 1924 control.exe 29 PID 1924 wrote to memory of 2884 1924 control.exe 29 PID 1924 wrote to memory of 2884 1924 control.exe 29 PID 1924 wrote to memory of 2884 1924 control.exe 29 PID 1924 wrote to memory of 2884 1924 control.exe 29 PID 2884 wrote to memory of 1364 2884 rundll32.exe 32 PID 2884 wrote to memory of 1364 2884 rundll32.exe 32 PID 2884 wrote to memory of 1364 2884 rundll32.exe 32 PID 2884 wrote to memory of 1364 2884 rundll32.exe 32 PID 1364 wrote to memory of 1324 1364 RunDll32.exe 33 PID 1364 wrote to memory of 1324 1364 RunDll32.exe 33 PID 1364 wrote to memory of 1324 1364 RunDll32.exe 33 PID 1364 wrote to memory of 1324 1364 RunDll32.exe 33 PID 1364 wrote to memory of 1324 1364 RunDll32.exe 33 PID 1364 wrote to memory of 1324 1364 RunDll32.exe 33 PID 1364 wrote to memory of 1324 1364 RunDll32.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\9de4e64928cd34bd3ee257647bcc17d3f836331a9d43d5209732d467c2bdb32e.exe"C:\Users\Admin\AppData\Local\Temp\9de4e64928cd34bd3ee257647bcc17d3f836331a9d43d5209732d467c2bdb32e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\FJ9p.CpL",2⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\FJ9p.CpL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\FJ9p.CpL",4⤵
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\FJ9p.CpL",5⤵
- Loads dropped DLL
PID:1324
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5263a94488b0ebebf4e5ff3c273e837fe
SHA1ccd165f60dd8abc1955f48935f318ec0ac822c12
SHA25677577bdfdd9141cfdbc7d35af51e8754c426940b1aa12594ae3f443971b436a5
SHA51234fc40e4b2308525dcd45b31265fa5c36b649947e3a1245a468e5f4463437acc73dbaf8954ed1fb1a0031e93c357f5e344482a6db60ddf45992ef65af4ff3410