Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/03/2024, 10:03
Static task
static1
Behavioral task
behavioral1
Sample
b72641e0527ebee19a3899e465524035.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b72641e0527ebee19a3899e465524035.exe
Resource
win10v2004-20240226-en
General
-
Target
b72641e0527ebee19a3899e465524035.exe
-
Size
48KB
-
MD5
b72641e0527ebee19a3899e465524035
-
SHA1
4f9a204957ee12c09cd95863c427fb44b182287a
-
SHA256
36b8315074a8393334744bc03cca0498b7483b7f2344ac79ff1aa7a7127510c7
-
SHA512
8c5734571fd33eb81252011bb4ace04dd4bafe311aea79b345d4c2206559e6ad2cad77e1311abebf7ab881f9aa6be89ba857cf720e74e0e5769089b9239bc0cc
-
SSDEEP
768:LY14ZgXRJHZZ619nzw1veq2ryvlfhM51CjScMJspgoSv2XzJNP4Xh9Gzs6L:E14u4nzwo1yvla59s59g9GzZL
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\97A48D84\ImagePath = "C:\\Windows\\system32\\D0308859.EXE -97A48D84" b72641e0527ebee19a3899e465524035.exe -
Deletes itself 1 IoCs
pid Process 2724 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2576 D0308859.EXE -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\D0308859.EXE b72641e0527ebee19a3899e465524035.exe File opened for modification C:\Windows\SysWOW64\D0308859.EXE b72641e0527ebee19a3899e465524035.exe File created C:\Windows\SysWOW64\D0308859.EXE D0308859.EXE File created C:\Windows\SysWOW64\64D338F2.DLL D0308859.EXE File created C:\Windows\SysWOW64\delme.bat b72641e0527ebee19a3899e465524035.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2576 D0308859.EXE 2576 D0308859.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSystemtimePrivilege 2936 b72641e0527ebee19a3899e465524035.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2724 2936 b72641e0527ebee19a3899e465524035.exe 31 PID 2936 wrote to memory of 2724 2936 b72641e0527ebee19a3899e465524035.exe 31 PID 2936 wrote to memory of 2724 2936 b72641e0527ebee19a3899e465524035.exe 31 PID 2936 wrote to memory of 2724 2936 b72641e0527ebee19a3899e465524035.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b72641e0527ebee19a3899e465524035.exe"C:\Users\Admin\AppData\Local\Temp\b72641e0527ebee19a3899e465524035.exe"1⤵
- Sets service image path in registry
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\delme.bat2⤵
- Deletes itself
PID:2724
-
-
C:\Windows\SysWOW64\D0308859.EXEC:\Windows\SysWOW64\D0308859.EXE -97A48D841⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5b72641e0527ebee19a3899e465524035
SHA14f9a204957ee12c09cd95863c427fb44b182287a
SHA25636b8315074a8393334744bc03cca0498b7483b7f2344ac79ff1aa7a7127510c7
SHA5128c5734571fd33eb81252011bb4ace04dd4bafe311aea79b345d4c2206559e6ad2cad77e1311abebf7ab881f9aa6be89ba857cf720e74e0e5769089b9239bc0cc
-
Filesize
211B
MD5e2398d5c03bbb0587cec4089caa9d96f
SHA1beb3be23b32e8acee4267400a9ac3a42fab58cb1
SHA256cf0d575bf87e1d2397e3bea66216a7af5303894ef1965a87baf9a27170ac5e78
SHA5120beae07367d24dab3504d7c22810313e1d26f898dfe5e470fc8a9b58962e6929f4390f735a31d93f5f5afe3359982d335b50296ddf2a1f15bf5ffaae79d49d8f