Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 07:08
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20231215-en
General
-
Target
tmp.exe
-
Size
3.1MB
-
MD5
ec30099424ac591d412d7af70500cd27
-
SHA1
053e567d81dba4ce07efad343193bae917cdf117
-
SHA256
d678c16ddfed96314e5c5a16751efbfa2136ce70f81a780273e1f3706981f70d
-
SHA512
4eb3902fa7b0a8b2f7a16e33b284717e4465146e64c0d8968699abf947d603aad7d971a7b73aa6ed70e3a9b9bf21812508a9e209a1c8dcf6da849e7f7df73fba
-
SSDEEP
98304:E/5TvaInDQBJ+kASYRpHvAhF8VJV64wxa:E/xvaInDeJXASYRpPcF8VJg4wE
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 2552 7z.exe 2652 7z.exe 2712 7z.exe 1956 7z.exe 2696 Installer.exe -
Loads dropped DLL 9 IoCs
pid Process 2120 cmd.exe 2552 7z.exe 2120 cmd.exe 2652 7z.exe 2120 cmd.exe 2712 7z.exe 2120 cmd.exe 1956 7z.exe 2120 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2696 Installer.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeRestorePrivilege 2552 7z.exe Token: 35 2552 7z.exe Token: SeSecurityPrivilege 2552 7z.exe Token: SeSecurityPrivilege 2552 7z.exe Token: SeRestorePrivilege 2652 7z.exe Token: 35 2652 7z.exe Token: SeSecurityPrivilege 2652 7z.exe Token: SeSecurityPrivilege 2652 7z.exe Token: SeRestorePrivilege 2712 7z.exe Token: 35 2712 7z.exe Token: SeSecurityPrivilege 2712 7z.exe Token: SeSecurityPrivilege 2712 7z.exe Token: SeRestorePrivilege 1956 7z.exe Token: 35 1956 7z.exe Token: SeSecurityPrivilege 1956 7z.exe Token: SeSecurityPrivilege 1956 7z.exe Token: SeDebugPrivilege 2696 Installer.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1540 wrote to memory of 2120 1540 tmp.exe 28 PID 1540 wrote to memory of 2120 1540 tmp.exe 28 PID 1540 wrote to memory of 2120 1540 tmp.exe 28 PID 1540 wrote to memory of 2120 1540 tmp.exe 28 PID 2120 wrote to memory of 2984 2120 cmd.exe 30 PID 2120 wrote to memory of 2984 2120 cmd.exe 30 PID 2120 wrote to memory of 2984 2120 cmd.exe 30 PID 2120 wrote to memory of 2552 2120 cmd.exe 31 PID 2120 wrote to memory of 2552 2120 cmd.exe 31 PID 2120 wrote to memory of 2552 2120 cmd.exe 31 PID 2120 wrote to memory of 2652 2120 cmd.exe 32 PID 2120 wrote to memory of 2652 2120 cmd.exe 32 PID 2120 wrote to memory of 2652 2120 cmd.exe 32 PID 2120 wrote to memory of 2712 2120 cmd.exe 33 PID 2120 wrote to memory of 2712 2120 cmd.exe 33 PID 2120 wrote to memory of 2712 2120 cmd.exe 33 PID 2120 wrote to memory of 1956 2120 cmd.exe 34 PID 2120 wrote to memory of 1956 2120 cmd.exe 34 PID 2120 wrote to memory of 1956 2120 cmd.exe 34 PID 2120 wrote to memory of 2556 2120 cmd.exe 35 PID 2120 wrote to memory of 2556 2120 cmd.exe 35 PID 2120 wrote to memory of 2556 2120 cmd.exe 35 PID 2120 wrote to memory of 2696 2120 cmd.exe 36 PID 2120 wrote to memory of 2696 2120 cmd.exe 36 PID 2120 wrote to memory of 2696 2120 cmd.exe 36 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2556 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /s"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\system32\mode.commode 65,103⤵PID:2984
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e file.zip -p203191166116007172592330639 -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_3.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2652
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_2.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_1.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
C:\Windows\system32\attrib.exeattrib +H "Installer.exe"3⤵
- Views/modifies file attributes
PID:2556
-
-
C:\Users\Admin\AppData\Local\Temp\main\Installer.exe"Installer.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
2.2MB
MD5ba9fc86780e989528708e6b185c4203f
SHA114d0a15b880e74d471cce2e954ff9c28f618eef4
SHA256fd27d02aecfcae2c6f907caaf48c9910af176fe14e020f525ea49dc4a1aa3046
SHA512d471c0c0eb3d84b403d946c43848088942b5022c100c93024752ca1ba0312d4b661b2fe33125d1f0049a1ff3894c207f47a5a46dc08da799103334a470274467
-
Filesize
1.5MB
MD546bcf257155884c0686af49327800bcb
SHA1000b2238f6c32d2ff2440d499e52ef47a73a65bc
SHA2561cf0e368731371f5f0af0aa6932b3cc26a5c54102b3dbaee2371436cdaaf6b74
SHA5128a89f27d9feb5ae40a4fa23f5e95a595924fc73915d7b3ac7900a3123cef97250410a0258593819ef1d94cb04d9d0558e6e9e3ba36f5ff8ac1bc2c5b7d893e0b
-
Filesize
629KB
MD519bd7bd6369541ba3180e6a59af9f75c
SHA17b0423ff4f24aacd9bb1e107fb24f0d0c333151a
SHA256513c16d3b97ecbf17613d97c2dbf98a424bf2a83444388e7d0a976c6808db955
SHA51294d7ce55033ba3bae8fc916d674d060da12dd062204a9f8411b154f2d33f08517c7b0394b17165c61c52e807cfac2e9ff7f1e0cd14d12a5599d5da1efab6ae82
-
Filesize
613KB
MD51bc8ac23f8be534702fdde2c8969770e
SHA17831ecd51b1ca7e6a3818923dc7bbe9b140415d5
SHA256b809e1ea42b7521d2e868ef41d5300dd62957458b5db828980f1a91224d59d66
SHA51260bb61c03a8c4fca6146884569606a4b9685ff704e24a3c6ceb9aa93559ad95f296aff145ef5e2d5c8089fd456930616ea634bb9a25e445f0d1f224a63d340e5
-
Filesize
2.2MB
MD54d2a676b984b8a4cc34eee6869c0f42a
SHA1bed6423862f9bb039cf7471554b05290b4250d56
SHA2564e02f1cfc7602eb797f9fab90499bbca5be464b70e0c6ea205b0e9d69ae45217
SHA5124936d631c7c855e59dffdd52d91ee91998b2c152640325ff9aa4236213d22d4e26bbada1d90a5e97fb7d3af1a76612ea53257c8ddc41eb7db970b0fcc552aa7b
-
Filesize
2.2MB
MD5420d6d1e39f209d0933eec13102ba60a
SHA11e6f56a27ba2364d994c8a5f2c8e5a44af05e8c8
SHA2562abf81d7074d3b461c39aaa136a0e12168cd886bdc8acea1a5eb1733fa5bd240
SHA512a18754eabd54dc32269f247bd32be755fd7fdac671dace2ba1ff78aad2d6f04798f07b5056abdd5384349c4591cac018cc18e68e9efd9641f9687d3acdab60cf
-
Filesize
473B
MD5cd755c700e3ebf048750493716b2183f
SHA13c90169fc007634bcef04619673126d110da5f03
SHA256b4a6603abc6445d9287d00bcf2ab6165ab06ec8d9226fb1ffbd6d3a40d561d52
SHA5125597c08646380d8db7c3de25e73eee9139fc96a9cb024105a6d92bb1df9db58048d79e9faffc56f16bceb6977fd69ee90ac3e95d2b5bfff54771f5546ec66abb