Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
4s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/03/2024, 16:50
Static task
static1
Behavioral task
behavioral1
Sample
de7b4c9c5c29ab6cdcf1e30bbe7fc25f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
de7b4c9c5c29ab6cdcf1e30bbe7fc25f.exe
Resource
win10v2004-20240226-en
General
-
Target
de7b4c9c5c29ab6cdcf1e30bbe7fc25f.exe
-
Size
1.2MB
-
MD5
de7b4c9c5c29ab6cdcf1e30bbe7fc25f
-
SHA1
5941c112ffcbe6b197b919803ab81d486625fd82
-
SHA256
ce7b09524d97403326d9d1921decc7091583e257dcb529fd84d538264a9a7221
-
SHA512
aef6c1190b4b65510234150e43b39c808c082759f6cef246bcee430d2984b9ee55a185a0dad17fbd6e9cba19d55eac83d14a46018978f5ddca95dd997f6db341
-
SSDEEP
24576:iLMiACnO3AuyyoSY5ZOA4+Py3aJ3ozQmXmYtfujO:RBIOtpoS7AJPjFoEmX+O
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2768 ¸´¼þ4~1.EXE -
Loads dropped DLL 2 IoCs
pid Process 2264 de7b4c9c5c29ab6cdcf1e30bbe7fc25f.exe 2264 de7b4c9c5c29ab6cdcf1e30bbe7fc25f.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" de7b4c9c5c29ab6cdcf1e30bbe7fc25f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2768 2264 de7b4c9c5c29ab6cdcf1e30bbe7fc25f.exe 28 PID 2264 wrote to memory of 2768 2264 de7b4c9c5c29ab6cdcf1e30bbe7fc25f.exe 28 PID 2264 wrote to memory of 2768 2264 de7b4c9c5c29ab6cdcf1e30bbe7fc25f.exe 28 PID 2264 wrote to memory of 2768 2264 de7b4c9c5c29ab6cdcf1e30bbe7fc25f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\de7b4c9c5c29ab6cdcf1e30bbe7fc25f.exe"C:\Users\Admin\AppData\Local\Temp\de7b4c9c5c29ab6cdcf1e30bbe7fc25f.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\¸´¼þ4~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\¸´¼þ4~1.EXE2⤵
- Executes dropped EXE
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
837KB
MD5cdb5b0b5f855207097d7e3dd85a7510f
SHA1427674a461e5273bbfe40a17c5a6feca32105b9b
SHA256c1f253144d4b16e9e1b2a6fb1e95fd01f7c9f20a0397856e96305ddd26c5ec22
SHA5129d9f302cdb6686ffa2a34824fd50ddd4b0cff566b8d63fab3e60a12928467e79aa364528d699faa86144719ae191ec2f9d95597e8b3b84c6ce1329258c210509