Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/03/2024, 02:08
Behavioral task
behavioral1
Sample
faf8001c7679f40182e3cd6acafa0a60733df27eef2a80fd531363aa1727b6f8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
faf8001c7679f40182e3cd6acafa0a60733df27eef2a80fd531363aa1727b6f8.exe
Resource
win10v2004-20240226-en
General
-
Target
faf8001c7679f40182e3cd6acafa0a60733df27eef2a80fd531363aa1727b6f8.exe
-
Size
28KB
-
MD5
9362c19bf7f0e306efe1efb35976de7e
-
SHA1
f6b529230f138faf1b785d6e203c1996e92dab9e
-
SHA256
faf8001c7679f40182e3cd6acafa0a60733df27eef2a80fd531363aa1727b6f8
-
SHA512
636ffe6e35ad45d9876a802735a9118393f84ec381ece3f5173c1f60d3407a87bbb52bd00ef4a7290ef5b3798f59081371d4296d59d6c8e197e565437b4f4932
-
SSDEEP
384:1vxBbK26lj5Id8SpHx9jLhsznnVxA1WmP5w7GGCJlqqwMyNrE8Cz:Dv8IRRdsxq1DjJcqfeER
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 848 services.exe -
resource yara_rule behavioral1/memory/1556-0-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/files/0x0009000000016c90-6.dat upx behavioral1/memory/848-12-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1556-17-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/848-18-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/848-23-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1556-24-0x0000000000220000-0x0000000000228000-memory.dmp upx behavioral1/memory/848-30-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/848-32-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/848-37-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/848-42-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/848-44-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/848-49-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/848-54-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1556-55-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/848-56-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/848-61-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x001000000000f680-71.dat upx behavioral1/memory/1556-81-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/848-82-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1556-83-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/848-84-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1556-88-0x0000000000500000-0x0000000000510000-memory.dmp upx behavioral1/memory/848-89-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" faf8001c7679f40182e3cd6acafa0a60733df27eef2a80fd531363aa1727b6f8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe faf8001c7679f40182e3cd6acafa0a60733df27eef2a80fd531363aa1727b6f8.exe File opened for modification C:\Windows\java.exe faf8001c7679f40182e3cd6acafa0a60733df27eef2a80fd531363aa1727b6f8.exe File created C:\Windows\java.exe faf8001c7679f40182e3cd6acafa0a60733df27eef2a80fd531363aa1727b6f8.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1556 wrote to memory of 848 1556 faf8001c7679f40182e3cd6acafa0a60733df27eef2a80fd531363aa1727b6f8.exe 28 PID 1556 wrote to memory of 848 1556 faf8001c7679f40182e3cd6acafa0a60733df27eef2a80fd531363aa1727b6f8.exe 28 PID 1556 wrote to memory of 848 1556 faf8001c7679f40182e3cd6acafa0a60733df27eef2a80fd531363aa1727b6f8.exe 28 PID 1556 wrote to memory of 848 1556 faf8001c7679f40182e3cd6acafa0a60733df27eef2a80fd531363aa1727b6f8.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\faf8001c7679f40182e3cd6acafa0a60733df27eef2a80fd531363aa1727b6f8.exe"C:\Users\Admin\AppData\Local\Temp\faf8001c7679f40182e3cd6acafa0a60733df27eef2a80fd531363aa1727b6f8.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:848
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5d6a72486696c576a1896cb73b8f0336b
SHA18319ca8a518e1c6679bd1c9739ebdcb7b6bea964
SHA2568b38b345ffe98f83e7f1c678e6fc97faf9c074986fe7147c0569d040c1775d25
SHA5122e5e7d243aee5a23d265104570412e416af20ca4515f8b8287996f81df224fbe42c8e10b836d6deeceb1aa965634378509992b925363face8f8a574010182087
-
Filesize
1KB
MD5e5e00a10fc8da191a4fd05726715e331
SHA1e6d66859cf1dd7b59f343c70f781e9d306c80c87
SHA256a29214cd77a5ffa005f4d776607f416f00a00cb5c7b8ba67d44080a8c2f30c8c
SHA512e2bb1afac4c12ad902311932c91156d470fe35693a351a9ddeca344fe47458f256805ce393ae9cdf90281c798a82c623bf0d718148193c0d02c1b061ebac1ce5
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2