Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
126s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
13/03/2024, 01:06
Static task
static1
Behavioral task
behavioral1
Sample
c493af444fea7901083153bccac57bbe.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c493af444fea7901083153bccac57bbe.exe
Resource
win10v2004-20240226-en
General
-
Target
c493af444fea7901083153bccac57bbe.exe
-
Size
14KB
-
MD5
c493af444fea7901083153bccac57bbe
-
SHA1
b21bc271d2cb7161d9fb86b1b9ee4c096f511ea6
-
SHA256
417f5fc6e480a496e750ab6b496e824ea2b7a72b86fa9f5a13c605a811468b9d
-
SHA512
e131d2828c5f84fb595241f572a689847b6e9a976621160ac2ac530d7d298714bc93321c6a0f94cfecb83c36f762da824b8ab36cbd3020bad8ffdd0bd234b2fb
-
SSDEEP
384:35kct3Dha/6rjvYYm6V7qiEfwp9yhXBmvu+SAqHjK:36ct3VFjV7yhXBmvu+s
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 804 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\multimediaControls.chl\CLSID\ = "{6BF52A52-394A-11D3-B153-00C04F79FAA6}" c493af444fea7901083153bccac57bbe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\multimediaControls.chl\CLSID c493af444fea7901083153bccac57bbe.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\multimediaControls.chl c493af444fea7901083153bccac57bbe.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2012 2972 c493af444fea7901083153bccac57bbe.exe 28 PID 2972 wrote to memory of 2012 2972 c493af444fea7901083153bccac57bbe.exe 28 PID 2972 wrote to memory of 2012 2972 c493af444fea7901083153bccac57bbe.exe 28 PID 2972 wrote to memory of 2012 2972 c493af444fea7901083153bccac57bbe.exe 28 PID 2972 wrote to memory of 804 2972 c493af444fea7901083153bccac57bbe.exe 32 PID 2972 wrote to memory of 804 2972 c493af444fea7901083153bccac57bbe.exe 32 PID 2972 wrote to memory of 804 2972 c493af444fea7901083153bccac57bbe.exe 32 PID 2972 wrote to memory of 804 2972 c493af444fea7901083153bccac57bbe.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\c493af444fea7901083153bccac57bbe.exe"C:\Users\Admin\AppData\Local\Temp\c493af444fea7901083153bccac57bbe.exe"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\ctfmon.exectfmon.exe2⤵PID:2012
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\awer0.bat" "2⤵
- Deletes itself
PID:804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274B
MD5798df000953e98019e82ad714e466263
SHA1a38a355d05947fe7baa3bfd34d26a2cf4770374a
SHA256f359f26e10e2d04ade7cf2f1426018bcb29f5cd3ea0942281a933e4bd7ae6881
SHA5128ea458f2a17b8501cf4a830530589028984d3cfda1500f5dca9d26c849061546ebb3b1f50b579473e5f0541d9c4b01edb0928407e8ad13f478632e4560870a8c