Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
07/03/2024, 23:23
Static task
static1
Behavioral task
behavioral1
Sample
b9ec5d1263ce730e0be1e8cf64c58cf4.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b9ec5d1263ce730e0be1e8cf64c58cf4.exe
Resource
win10v2004-20240226-en
General
-
Target
b9ec5d1263ce730e0be1e8cf64c58cf4.exe
-
Size
1011KB
-
MD5
b9ec5d1263ce730e0be1e8cf64c58cf4
-
SHA1
d30aab11a419fc105a15b9505dbeaa931d19c735
-
SHA256
d481aeca84f16a3284d4de9af3625eb21024f48298538e03b3ec0921f2831046
-
SHA512
60782d9b3a69403c909e851b353ba93a737a0ea9a17c0b96a472c262a31ef20a37fe5437906396674a8dba0597dac64575d82b03d9361a25714fc4aaff9636b0
-
SSDEEP
24576:d3BPQLBt4p3UAh2vFjr0AFnOC6R/TJiUr2Fu+8Q:kQktvFjrX+Ldk
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2268 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2660 01476826.exe -
Loads dropped DLL 4 IoCs
pid Process 2612 cmd.exe 2612 cmd.exe 2660 01476826.exe 2660 01476826.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\01476826 = "C:\\ProgramData\\01476826\\01476826.exe" b9ec5d1263ce730e0be1e8cf64c58cf4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\01476826 = "C:\\PROGRA~3\\01476826\\01476826.exe" 01476826.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2660 01476826.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 2660 01476826.exe 2660 01476826.exe 2660 01476826.exe 2660 01476826.exe 2660 01476826.exe 2660 01476826.exe 2660 01476826.exe 2660 01476826.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 2660 01476826.exe 2660 01476826.exe 2660 01476826.exe 2660 01476826.exe 2660 01476826.exe 2660 01476826.exe 2660 01476826.exe 2660 01476826.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2268 2104 b9ec5d1263ce730e0be1e8cf64c58cf4.exe 28 PID 2104 wrote to memory of 2268 2104 b9ec5d1263ce730e0be1e8cf64c58cf4.exe 28 PID 2104 wrote to memory of 2268 2104 b9ec5d1263ce730e0be1e8cf64c58cf4.exe 28 PID 2104 wrote to memory of 2268 2104 b9ec5d1263ce730e0be1e8cf64c58cf4.exe 28 PID 2268 wrote to memory of 2612 2268 cmd.exe 30 PID 2268 wrote to memory of 2612 2268 cmd.exe 30 PID 2268 wrote to memory of 2612 2268 cmd.exe 30 PID 2268 wrote to memory of 2612 2268 cmd.exe 30 PID 2612 wrote to memory of 2660 2612 cmd.exe 31 PID 2612 wrote to memory of 2660 2612 cmd.exe 31 PID 2612 wrote to memory of 2660 2612 cmd.exe 31 PID 2612 wrote to memory of 2660 2612 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9ec5d1263ce730e0be1e8cf64c58cf4.exe"C:\Users\Admin\AppData\Local\Temp\b9ec5d1263ce730e0be1e8cf64c58cf4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\ProgramData\01476826\01476826.bat" "2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\cmd.execmd.exe /c start C:\PROGRA~3\01476826\01476826.exe /inst3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\PROGRA~3\01476826\01476826.exeC:\PROGRA~3\01476826\01476826.exe /inst4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2660
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
233B
MD5a9d9eacf45e31eab152a5cba2297eac4
SHA19fb9295c7eca4f9b4487a7be842b164f9c695e9c
SHA2566a220d8e6bcbd9e93c95df2f1895ebeb68275126de045e173fd3a86825ed01f6
SHA512de449ca7632f444fc35dc890b1ba091d15d2ff2d926f9ddd7eb2f9f168d5537566ccec9c73ecfd9c44c2ed86f44adde7066428ee5d3b7e11f8f1914558b84b13
-
Filesize
1011KB
MD5b9ec5d1263ce730e0be1e8cf64c58cf4
SHA1d30aab11a419fc105a15b9505dbeaa931d19c735
SHA256d481aeca84f16a3284d4de9af3625eb21024f48298538e03b3ec0921f2831046
SHA51260782d9b3a69403c909e851b353ba93a737a0ea9a17c0b96a472c262a31ef20a37fe5437906396674a8dba0597dac64575d82b03d9361a25714fc4aaff9636b0