Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06/03/2024, 12:36
Behavioral task
behavioral1
Sample
b76a616ed9cf00389762b18798660574.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b76a616ed9cf00389762b18798660574.exe
Resource
win10v2004-20240226-en
General
-
Target
b76a616ed9cf00389762b18798660574.exe
-
Size
945KB
-
MD5
b76a616ed9cf00389762b18798660574
-
SHA1
22f98626bfaf427513f6dc9fc500637baec64544
-
SHA256
2a514adb2304c99dc83541c167b3a3af3dc0f0e9615ed6c0726634f6bcd8280a
-
SHA512
6f4b43d62838f01e528afc7a054e406a464fc157da00b47f3466af9d76fa21c4fb861dbece14c544c7c888ced3505e16f0f0408e3954fdd1b344bc76e2cc83ab
-
SSDEEP
24576:l+r0o5VtMwpcxlst4C62X+EFKb51XbTk:lg0t4t4j2uiKbPnk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2472 defender.exe -
Loads dropped DLL 2 IoCs
pid Process 2892 b76a616ed9cf00389762b18798660574.exe 2892 b76a616ed9cf00389762b18798660574.exe -
resource yara_rule behavioral1/memory/2892-0-0x0000000000400000-0x00000000006DE000-memory.dmp upx behavioral1/files/0x000d000000014698-10.dat upx behavioral1/memory/2472-19-0x0000000000400000-0x0000000000A0F000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\Malware Protection = "C:\\ProgramData\\defender.exe" defender.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: defender.exe File opened (read-only) \??\O: defender.exe File opened (read-only) \??\W: defender.exe File opened (read-only) \??\X: defender.exe File opened (read-only) \??\Y: defender.exe File opened (read-only) \??\E: defender.exe File opened (read-only) \??\G: defender.exe File opened (read-only) \??\T: defender.exe File opened (read-only) \??\J: defender.exe File opened (read-only) \??\Q: defender.exe File opened (read-only) \??\R: defender.exe File opened (read-only) \??\U: defender.exe File opened (read-only) \??\V: defender.exe File opened (read-only) \??\Z: defender.exe File opened (read-only) \??\I: defender.exe File opened (read-only) \??\K: defender.exe File opened (read-only) \??\L: defender.exe File opened (read-only) \??\M: defender.exe File opened (read-only) \??\N: defender.exe File opened (read-only) \??\P: defender.exe File opened (read-only) \??\S: defender.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 defender.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2892 b76a616ed9cf00389762b18798660574.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2892 b76a616ed9cf00389762b18798660574.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe 2472 defender.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2472 defender.exe 2472 defender.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2892 wrote to memory of 2472 2892 b76a616ed9cf00389762b18798660574.exe 28 PID 2892 wrote to memory of 2472 2892 b76a616ed9cf00389762b18798660574.exe 28 PID 2892 wrote to memory of 2472 2892 b76a616ed9cf00389762b18798660574.exe 28 PID 2892 wrote to memory of 2472 2892 b76a616ed9cf00389762b18798660574.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b76a616ed9cf00389762b18798660574.exe"C:\Users\Admin\AppData\Local\Temp\b76a616ed9cf00389762b18798660574.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\ProgramData\defender.exeC:\ProgramData\defender.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2472
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
863KB
MD59162e03de49e577ace655d03521082c1
SHA1b22f0f0262bc5781743a6d815943d596ce9abc0d
SHA256854b68869d1967f6bc0a7876f34ef109eb7fa239fb57f682ead0291ced5a0b38
SHA51203c6c77ecd5c251b853b9c6ed35a12a12df84a72ab321cd6c707b11d42abb222b519b3a8c93f23d610710a51952d418638907ea982cd30c0f64f7af4cc25e9a5