Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/03/2024, 17:50
Behavioral task
behavioral1
Sample
2a8a678f8da52aaf164d6cd177ccb29693d1c1b1f32bc0de701a5ec98944a316.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2a8a678f8da52aaf164d6cd177ccb29693d1c1b1f32bc0de701a5ec98944a316.exe
Resource
win10v2004-20231215-en
General
-
Target
2a8a678f8da52aaf164d6cd177ccb29693d1c1b1f32bc0de701a5ec98944a316.exe
-
Size
453KB
-
MD5
6e78ddea5e9b567e9afc0511f6fdd0ab
-
SHA1
3f0cb1a90c76a12536277af1f936a14a62fcfe2a
-
SHA256
2a8a678f8da52aaf164d6cd177ccb29693d1c1b1f32bc0de701a5ec98944a316
-
SHA512
f582e68ed23ba3a620174c281710bf982f48600c1b7ff42e9cb30cec26491a85f799496a3ebad708c0d5504faecbc658919f0b80d32528ac85bf81aa56ebdfbd
-
SSDEEP
6144:8kLYyvZFsjpHQvXrlHyJzVJot3aERiLTwEYYxNdZ:8kLYyourOWaE0TGY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2156 sysctl.exe -
Loads dropped DLL 2 IoCs
pid Process 2488 2a8a678f8da52aaf164d6cd177ccb29693d1c1b1f32bc0de701a5ec98944a316.exe 2488 2a8a678f8da52aaf164d6cd177ccb29693d1c1b1f32bc0de701a5ec98944a316.exe -
Modifies system executable filetype association 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\realex.exe \"%1\" %*" 2a8a678f8da52aaf164d6cd177ccb29693d1c1b1f32bc0de701a5ec98944a316.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command sysctl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\realex.exe \"%1\" %*" sysctl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 2a8a678f8da52aaf164d6cd177ccb29693d1c1b1f32bc0de701a5ec98944a316.exe -
resource yara_rule behavioral1/memory/2488-0-0x0000000000400000-0x0000000000461000-memory.dmp upx behavioral1/files/0x000b00000001222b-4.dat upx behavioral1/memory/2488-5-0x0000000001E40000-0x0000000001EA1000-memory.dmp upx behavioral1/memory/2156-13-0x0000000000400000-0x0000000000461000-memory.dmp upx behavioral1/memory/2488-15-0x0000000000400000-0x0000000000461000-memory.dmp upx behavioral1/memory/2156-16-0x0000000000400000-0x0000000000461000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\sysctl.exe = "C:\\Windows\\system32\\sysctl.exe" 2a8a678f8da52aaf164d6cd177ccb29693d1c1b1f32bc0de701a5ec98944a316.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\sysctl.exe 2a8a678f8da52aaf164d6cd177ccb29693d1c1b1f32bc0de701a5ec98944a316.exe File created C:\Windows\SysWOW64\realex.exe 2a8a678f8da52aaf164d6cd177ccb29693d1c1b1f32bc0de701a5ec98944a316.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command 2a8a678f8da52aaf164d6cd177ccb29693d1c1b1f32bc0de701a5ec98944a316.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\realex.exe \"%1\" %*" 2a8a678f8da52aaf164d6cd177ccb29693d1c1b1f32bc0de701a5ec98944a316.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command sysctl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\realex.exe \"%1\" %*" sysctl.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2156 sysctl.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2488 wrote to memory of 2156 2488 2a8a678f8da52aaf164d6cd177ccb29693d1c1b1f32bc0de701a5ec98944a316.exe 28 PID 2488 wrote to memory of 2156 2488 2a8a678f8da52aaf164d6cd177ccb29693d1c1b1f32bc0de701a5ec98944a316.exe 28 PID 2488 wrote to memory of 2156 2488 2a8a678f8da52aaf164d6cd177ccb29693d1c1b1f32bc0de701a5ec98944a316.exe 28 PID 2488 wrote to memory of 2156 2488 2a8a678f8da52aaf164d6cd177ccb29693d1c1b1f32bc0de701a5ec98944a316.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a8a678f8da52aaf164d6cd177ccb29693d1c1b1f32bc0de701a5ec98944a316.exe"C:\Users\Admin\AppData\Local\Temp\2a8a678f8da52aaf164d6cd177ccb29693d1c1b1f32bc0de701a5ec98944a316.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\sysctl.exeC:\Windows\system32\sysctl.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:2156
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
454KB
MD525efd80ca212a431d4da611085291c37
SHA15807ca3ffd5496c8fdc2bb9fff8a4d45767490f9
SHA25665535bf80c2cb9d399064b0dc5fa0c47a1b65e8f0917ceca2e0727a5b0c08183
SHA512b6b2a576e00b4e198a1b94307ed7e5818c33b5b4be1be95c0e95e8d4aa73c3dd88ddddc0beb1d46d97107fcf6d12bc3e8be15a1f2268acc9717e289f7b28f674