Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/03/2024, 21:54
Behavioral task
behavioral1
Sample
d732dd0b4d4737902615cb087439d752.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d732dd0b4d4737902615cb087439d752.exe
Resource
win10v2004-20240226-en
General
-
Target
d732dd0b4d4737902615cb087439d752.exe
-
Size
22KB
-
MD5
d732dd0b4d4737902615cb087439d752
-
SHA1
137b2d0e7f7cde811443241df4d12bb0c59dee56
-
SHA256
8901baa34991288cda9c10737d45af9058c9e3c37317fc7d4a9d6cc9aad38e5f
-
SHA512
fa9ce1461af11bf04c3034a82354fdbb6db937202207eaa3e8aa6ae588b0012e5318218c0ecc1617ced1cd8cc2af2033d8abf6801ff32349893810e988153612
-
SSDEEP
384:StwGeGOtDUZcXG4R8x06g+HPrAT8L7dCKYwaRCBN3n90qvDJ:7YZcXG4R0zvrD78CasBdX7
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2832 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1084 ucnsvc.exe -
Loads dropped DLL 2 IoCs
pid Process 2972 d732dd0b4d4737902615cb087439d752.exe 2972 d732dd0b4d4737902615cb087439d752.exe -
resource yara_rule behavioral1/memory/2972-0-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/files/0x0009000000012266-3.dat upx behavioral1/memory/2972-4-0x0000000000230000-0x0000000000240000-memory.dmp upx behavioral1/memory/2972-13-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1084-14-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1084-17-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1084-18-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1084-20-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1084-24-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1084-25-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1084-26-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1084-27-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1084-28-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1084-29-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1084-30-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1084-31-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1084-32-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1084-33-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/1084-34-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ucnsvc.exe d732dd0b4d4737902615cb087439d752.exe File opened for modification C:\Windows\SysWOW64\ucnsvc.exe ucnsvc.exe File created C:\Windows\SysWOW64\ucnsvc.exe d732dd0b4d4737902615cb087439d752.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2972 wrote to memory of 1084 2972 d732dd0b4d4737902615cb087439d752.exe 28 PID 2972 wrote to memory of 1084 2972 d732dd0b4d4737902615cb087439d752.exe 28 PID 2972 wrote to memory of 1084 2972 d732dd0b4d4737902615cb087439d752.exe 28 PID 2972 wrote to memory of 1084 2972 d732dd0b4d4737902615cb087439d752.exe 28 PID 2972 wrote to memory of 2832 2972 d732dd0b4d4737902615cb087439d752.exe 29 PID 2972 wrote to memory of 2832 2972 d732dd0b4d4737902615cb087439d752.exe 29 PID 2972 wrote to memory of 2832 2972 d732dd0b4d4737902615cb087439d752.exe 29 PID 2972 wrote to memory of 2832 2972 d732dd0b4d4737902615cb087439d752.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d732dd0b4d4737902615cb087439d752.exe"C:\Users\Admin\AppData\Local\Temp\d732dd0b4d4737902615cb087439d752.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\ucnsvc.exeC:\Windows\system32\ucnsvc.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1084
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\.bat C:\Users\Admin\AppData\Local\Temp\d732dd0b4d4737902615cb087439d752.exe C:\Users\Admin\AppData\Local\Temp\.bat2⤵
- Deletes itself
PID:2832
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105B
MD5baa7e02670be801bbc88053906cd3cfd
SHA177e6ba7c88e537d4a429d158b32556b029992061
SHA256ed9ca56eb043077229e56d79dc1f6863037607bf7eb10a368af8c0aea5680da2
SHA512c7692ca0f30bee7cfe8e937bc9cf0e329d666e5fae844df693121f2678c224a85016eaf7a19e22ebbdf3b14e88bb1d7f1b86e944afdb2fd52cab7ad8aed2303f
-
Filesize
22KB
MD5d732dd0b4d4737902615cb087439d752
SHA1137b2d0e7f7cde811443241df4d12bb0c59dee56
SHA2568901baa34991288cda9c10737d45af9058c9e3c37317fc7d4a9d6cc9aad38e5f
SHA512fa9ce1461af11bf04c3034a82354fdbb6db937202207eaa3e8aa6ae588b0012e5318218c0ecc1617ced1cd8cc2af2033d8abf6801ff32349893810e988153612