Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/03/2024, 06:28
Static task
static1
Behavioral task
behavioral1
Sample
c2ae41799abd0aec2f314e0bd87bb133.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c2ae41799abd0aec2f314e0bd87bb133.exe
Resource
win10v2004-20231215-en
General
-
Target
c2ae41799abd0aec2f314e0bd87bb133.exe
-
Size
32KB
-
MD5
c2ae41799abd0aec2f314e0bd87bb133
-
SHA1
65d79365725ff9db88dc0a805af3043a345d5527
-
SHA256
9c30af80b1157a7b58928f68d1953b682e1a86cc517dd2d9a5c2e24b0138ffa8
-
SHA512
2058d0f835fc08b692127212d5096997095af700f589a3b5eddca45e0b7ad617172e3ed818ec32c7790fc395f15363f014d15882c87e4b16a94d34032a15ae26
-
SSDEEP
768:0gle1KJVkUyy0zjKLWYuCHyujGbtdekYaAnbcuyD7Ue5J:dM1KJFyy0PKLWYuAyuqbD8nouy8eX
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2220 c2ae41799abd0aec2f314e0bd87bb133.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\259405700.TMP c2ae41799abd0aec2f314e0bd87bb133.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\realteck\geoidq.pif c2ae41799abd0aec2f314e0bd87bb133.exe File opened for modification C:\Program Files (x86)\Common Files\realteck\geoidq.pif c2ae41799abd0aec2f314e0bd87bb133.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 2220 c2ae41799abd0aec2f314e0bd87bb133.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2220 c2ae41799abd0aec2f314e0bd87bb133.exe Token: SeDebugPrivilege 2220 c2ae41799abd0aec2f314e0bd87bb133.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2668 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 28 PID 2220 wrote to memory of 2668 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 28 PID 2220 wrote to memory of 2668 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 28 PID 2220 wrote to memory of 2668 2220 c2ae41799abd0aec2f314e0bd87bb133.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2ae41799abd0aec2f314e0bd87bb133.exe"C:\Users\Admin\AppData\Local\Temp\c2ae41799abd0aec2f314e0bd87bb133.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe"2⤵PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.2MB
MD5bf83eacedf518e5fdb0d5a6a4e6f3c5b
SHA10299af0dd327a53a4d789674d550b6531a93b9dc
SHA256a2ff82aa1fb39b52f7b832e18863f274ed81b044c5362fca28fd7bb15c8f6c5f
SHA512aea511fdca03d13924def1b3099fa2663f7f012bee7c741b35aca332d2324ead8b1eb7121f165c1a46d50bd7764e12bec8bd0bdec9029742d9f5340173fad718