Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 21:08
Static task
static1
Behavioral task
behavioral1
Sample
1aa76587588dc3a0643733b8930176eedd9732ed31dafafdf545ead4741200e7.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
1aa76587588dc3a0643733b8930176eedd9732ed31dafafdf545ead4741200e7.exe
Resource
win10v2004-20240226-en
General
-
Target
1aa76587588dc3a0643733b8930176eedd9732ed31dafafdf545ead4741200e7.exe
-
Size
448KB
-
MD5
411c8fa7d7b71729231ec23e62e023f9
-
SHA1
233eb141b5b030a4512962ad8ed6ef2bd458f0af
-
SHA256
1aa76587588dc3a0643733b8930176eedd9732ed31dafafdf545ead4741200e7
-
SHA512
5b61f8132560162e7660d9cb1e04c3481489927916d16cd03879f1b4781d2b7dd3270864bb0a9cecc36cb8f5bbffbc725d04037c1954077eece21e446510ec5d
-
SSDEEP
6144:n+GxFNcONazpuImOeqwsMV0f2ukEjWbjcSbcY+CaQdaFOY4iGFYtR:nbFwilukFbz+xt4vF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2564 WKTBJ.exe -
Loads dropped DLL 2 IoCs
pid Process 1904 cmd.exe 1904 cmd.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\windows\SysWOW64\WKTBJ.exe 1aa76587588dc3a0643733b8930176eedd9732ed31dafafdf545ead4741200e7.exe File opened for modification C:\windows\SysWOW64\WKTBJ.exe 1aa76587588dc3a0643733b8930176eedd9732ed31dafafdf545ead4741200e7.exe File created C:\windows\SysWOW64\WKTBJ.exe.bat 1aa76587588dc3a0643733b8930176eedd9732ed31dafafdf545ead4741200e7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3012 1aa76587588dc3a0643733b8930176eedd9732ed31dafafdf545ead4741200e7.exe 2564 WKTBJ.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3012 1aa76587588dc3a0643733b8930176eedd9732ed31dafafdf545ead4741200e7.exe 3012 1aa76587588dc3a0643733b8930176eedd9732ed31dafafdf545ead4741200e7.exe 2564 WKTBJ.exe 2564 WKTBJ.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3012 wrote to memory of 1904 3012 1aa76587588dc3a0643733b8930176eedd9732ed31dafafdf545ead4741200e7.exe 28 PID 3012 wrote to memory of 1904 3012 1aa76587588dc3a0643733b8930176eedd9732ed31dafafdf545ead4741200e7.exe 28 PID 3012 wrote to memory of 1904 3012 1aa76587588dc3a0643733b8930176eedd9732ed31dafafdf545ead4741200e7.exe 28 PID 3012 wrote to memory of 1904 3012 1aa76587588dc3a0643733b8930176eedd9732ed31dafafdf545ead4741200e7.exe 28 PID 1904 wrote to memory of 2564 1904 cmd.exe 30 PID 1904 wrote to memory of 2564 1904 cmd.exe 30 PID 1904 wrote to memory of 2564 1904 cmd.exe 30 PID 1904 wrote to memory of 2564 1904 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1aa76587588dc3a0643733b8930176eedd9732ed31dafafdf545ead4741200e7.exe"C:\Users\Admin\AppData\Local\Temp\1aa76587588dc3a0643733b8930176eedd9732ed31dafafdf545ead4741200e7.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\windows\system32\WKTBJ.exe.bat" "2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\windows\SysWOW64\WKTBJ.exeC:\windows\system32\WKTBJ.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2564
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74B
MD5783c4cbcc220360b1275bb54f8af9172
SHA1b8b86fb5290b819bd700220ecf267678dafbc49e
SHA256e36c43798fff7a9a17c9ab0c1d227fc9a049e220d8ee33f93ce87600d4477fbc
SHA51206637389b47d07894e9aaa1ae16e1ab58516a6f404e914e1d41e666b26cec8431823105e51bea9896a79b698b9a7ee2fb276411a8ce7697b9e45694d77b285ba
-
Filesize
448KB
MD52b444b6a71d63533d0e1090a2dfd9f68
SHA16286d9dc785df4d9dc7bf344e4770148289beece
SHA2564e8493fdb17118073080ac7916909c57cf5faf1eba2df8f4aee24aa422ff10cf
SHA512961a8c14499f835da350bee30f4befcfe68bed52a9aed16c1dfaf805f9949558e8403bd4362ff5635bb3eedef4e7ee93bcf04cd132d0c177e8ce1c44ab67009f