Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/03/2024, 22:57
Static task
static1
Behavioral task
behavioral1
Sample
909d4ea0d35b7f78f6b01ec71197d2043405960eae13498bc4f029936a75e1b6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
909d4ea0d35b7f78f6b01ec71197d2043405960eae13498bc4f029936a75e1b6.exe
Resource
win10v2004-20240226-en
General
-
Target
909d4ea0d35b7f78f6b01ec71197d2043405960eae13498bc4f029936a75e1b6.exe
-
Size
94KB
-
MD5
bf3ed8613aa1f81316fb516c0bfe2fe5
-
SHA1
e5d829d2fca465db0cf96ed879aa3b9955c9d1c1
-
SHA256
909d4ea0d35b7f78f6b01ec71197d2043405960eae13498bc4f029936a75e1b6
-
SHA512
1e942cc9f8107a98b16f554e8da5c5f6732411bea2b8eac7bd9f8962b64e6c97829f0bbac192726bfc3f7753418b9e33f7f35da97c4217bcaf52793237e574f7
-
SSDEEP
1536:Sdyql1M7wIIEuti7rEYivykYkpaWj0OlgG7mJAm/lGb3clsH:SdV1Z1i3QKqlgGCJr/lAH
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2504 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2944 sppsrv.exe -
Loads dropped DLL 2 IoCs
pid Process 2944 sppsrv.exe 2944 sppsrv.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\xpwunp.dat 909d4ea0d35b7f78f6b01ec71197d2043405960eae13498bc4f029936a75e1b6.exe File created C:\Windows\SysWOW64\sppsrv.exe 909d4ea0d35b7f78f6b01ec71197d2043405960eae13498bc4f029936a75e1b6.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1336 wrote to memory of 2504 1336 909d4ea0d35b7f78f6b01ec71197d2043405960eae13498bc4f029936a75e1b6.exe 29 PID 1336 wrote to memory of 2504 1336 909d4ea0d35b7f78f6b01ec71197d2043405960eae13498bc4f029936a75e1b6.exe 29 PID 1336 wrote to memory of 2504 1336 909d4ea0d35b7f78f6b01ec71197d2043405960eae13498bc4f029936a75e1b6.exe 29 PID 1336 wrote to memory of 2504 1336 909d4ea0d35b7f78f6b01ec71197d2043405960eae13498bc4f029936a75e1b6.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\909d4ea0d35b7f78f6b01ec71197d2043405960eae13498bc4f029936a75e1b6.exe"C:\Users\Admin\AppData\Local\Temp\909d4ea0d35b7f78f6b01ec71197d2043405960eae13498bc4f029936a75e1b6.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\_del.bat2⤵
- Deletes itself
PID:2504
-
-
C:\Windows\SysWOW64\sppsrv.exeC:\Windows\SysWOW64\sppsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2944
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
294B
MD5d8574e18218b262fa731397474b5e4e1
SHA148ba99ab79a884ffd6fc2b6a3bd8cbdfdd260247
SHA2567a4fbd296ea93fdb713787c3583285a6d621cdd0d5fbc720069b9028f01f9659
SHA512133674179ba050fe00cd23ea5e236daf6bfa2e6247b39b5ada2e3c1aa78ba85d011debb61622f89a9436ded45028ab5e0f0a01ef7ef70533cb4410e04bfe86bb
-
Filesize
94KB
MD596dd3384c8ab2628a53f99d6ed3b2c5d
SHA109ecffe58c4327247e98cb57e36b8b7fe1f537e0
SHA256b5960daa3f84329e047bcb0402000c332d26d80fabe53de0ea0834b38c46282f
SHA5124b225653f22a4655d79cfe2220f8d18b89f1fb06f184befb285e51587515b5ebfaa31d60e2a4389cdb61d5dc9b2f67199116e23f7f8ac733554f30aec82c1a6e
-
Filesize
740B
MD5c98d47ed9bac1d6b52acca1f68224801
SHA140c98ce2780eb32ed71feb2fc94545e4e619b381
SHA256721fe9f07591731ee8aa17605714aa7119ed1a9807b4f3d0aeabcee622501433
SHA5129fffdf1343d81e6df3cfffc05a9210e48cefbc784ca939ff4efbe94e839a4efff8291fce8e4c14b4630ba3d8e1eb5a506f5560df4001ce9130221d2209e68323