Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
100383282038...bd.exe
windows7-x64
082060e332...76.exe
windows7-x64
101035f1b289...b8.exe
windows7-x64
624592b8814...b9.exe
windows7-x64
331459fd8f4...d2.exe
windows7-x64
103216f3b1bf...ae.exe
windows7-x64
43026556ea...97.exe
windows7-x64
14499426b05...8b.exe
windows7-x64
779271d57c5...61.exe
windows7-x64
7843cd39e4f...29.exe
windows7-x64
10847001fe67...7e.exe
windows7-x64
1902f0cb92e...ad.exe
windows7-x64
1994d023640...94.dll
windows7-x64
1a006d20ea6...6b.exe
windows7-x64
3aaf476e091...d5.exe
windows7-x64
8abb979296b...f1.dll
windows7-x64
7b630f84b45...86.exe
windows7-x64
1bd37f1c8f1...8e.exe
windows7-x64
1c086172b03...77.exe
windows7-x64
10c2a620243b...bb.exe
windows7-x64
1c3705bab83...3b.exe
windows7-x64
1c97d9bbc80...15.exe
windows7-x64
10cad20feffc...5d.exe
windows7-x64
5d01b92a1d7...c4.dll
windows7-x64
6d2a120aa4a...78.exe
windows7-x64
10d9f7e34bf8...f1.exe
windows7-x64
1da45ff208b...95.exe
windows7-x64
dd0d00fec6...c8.exe
windows7-x64
10e8ae1656c2...dc.exe
windows7-x64
5ed09a02045...0d.exe
windows7-x64
7f0c2927859...a6.exe
windows7-x64
9f3771ca98b...50.exe
windows7-x64
8Analysis
-
max time kernel
1793s -
max time network
1565s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/03/2024, 16:54
Behavioral task
behavioral1
Sample
0383282038e4b6b1daa69a9b71bfff42b8091a4004bbe780c98239ada99f77bd.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
082060e3320870d1d576083e0ee65c06a1104913ae866137f8ca45891c059a76.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
1035f1b289e6d88148431da56ed5fb3c3d251b51f38bfd498690537e57a3c8b8.exe
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
24592b881440b004bfcc51692deef734babdfc0cd5719826bd05ae678584bfb9.exe
Resource
win7-20240221-en
Behavioral task
behavioral5
Sample
31459fd8f4ca241e9f2eedcaddf848d8be9eaa76f05102b30872eedbe6c250d2.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
3216f3b1bf985c045c18f16e00abcec112149ce8ecad190c620500f5cefb59ae.exe
Resource
win7-20240221-en
Behavioral task
behavioral7
Sample
43026556eaa76df4544dd37cc1f708eb3df18b7e33969042b343c2b8be4ff697.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
4499426b05f7f17b48d3aa805681c53aed09b5b48e25c9070c08dbfae464698b.exe
Resource
win7-20240319-en
Behavioral task
behavioral9
Sample
79271d57c531c79536bc0be0d71e3a372bed9c10689257a7727475ab41e3e161.exe
Resource
win7-20240319-en
Behavioral task
behavioral10
Sample
843cd39e4f5024ef36fdc142bf2eb9d9dcc05f0b8f7f812d49ddac8a2bf83f29.exe
Resource
win7-20240221-en
Behavioral task
behavioral11
Sample
847001fe67b260c91fdc360297f6758598c41eb78fc4aae6adc4a4e2dd813b7e.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
902f0cb92e46d9d3028a9e5b52975f66142648ac90007032aafa9b1e2b5263ad.exe
Resource
win7-20240221-en
Behavioral task
behavioral13
Sample
994d02364001319f2a3fd9318a2f760c79d7dcfddb177940e22cb60765992094.dll
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
a006d20ea64758a5219d6a8833a593d99b47c2301e17be2e07593c1565de086b.exe
Resource
win7-20240221-en
Behavioral task
behavioral15
Sample
aaf476e09142ae0b67a0696e3c5d202cda7081c9365f352cfb82068a80e265d5.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
abb979296b15798893029044f06c97a2e98f4ec044c0c34ac27a0dd6bb0b0ff1.dll
Resource
win7-20240221-en
Behavioral task
behavioral17
Sample
b630f84b4573831a769170ce7efe73a107b7cd457f499d29fbb622db5c717086.exe
Resource
win7-20240215-en
Behavioral task
behavioral18
Sample
bd37f1c8f1a0b1333df616db123305e9c138eb3331c1fd66907d4e9df93a4a8e.exe
Resource
win7-20240221-en
Behavioral task
behavioral19
Sample
c086172b03dbcdc6a782dfbbbf1b6b7f71551bc0d10e1044fcd3c7e880e83a77.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
c2a620243b8c161336d68aaccbb7972f083b3e8e30e0fcfaaf9413e46bcbf1bb.exe
Resource
win7-20240319-en
Behavioral task
behavioral21
Sample
c3705bab837f5e68ab54a026bf6d23b454f9e6273c919f4d9c43db7c9c37a43b.exe
Resource
win7-20240319-en
Behavioral task
behavioral22
Sample
c97d9bbc80b573bdeeda3812f4d00e5183493dd0d5805e2508728f65977dda15.exe
Resource
win7-20240319-en
Behavioral task
behavioral23
Sample
cad20feffc7b67e394cb667c56211449ccc9c474583e4feacb5c2461dd002c5d.exe
Resource
win7-20240319-en
Behavioral task
behavioral24
Sample
d01b92a1d7e00f34549ee537989890699c7ac34c929ea381a4289e49e2d0e4c4.dll
Resource
win7-20240221-en
Behavioral task
behavioral25
Sample
d2a120aa4a8aeb87408828d4e7e0da615cb83e32ca5fccc79eee70bca3ea4d78.exe
Resource
win7-20240220-en
Behavioral task
behavioral26
Sample
d9f7e34bf8a82e137d47849c6397b51a5c127af99c4a843f8f8223687a05daf1.exe
Resource
win7-20240221-en
Behavioral task
behavioral27
Sample
da45ff208be5e193a3da424f6025a3b257dff0c67fab84bd6a9028862fd5cb95.exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
dd0d00fec6564d52ad291e8f8a99e981a31ba5fbb623076e8e2864f4591e9bc8.exe
Resource
win7-20240221-en
Behavioral task
behavioral29
Sample
e8ae1656c225e8de8e57983db87738630d70036aae6cf1c2b486084edb4aa4dc.exe
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
ed09a020459f1b059bba72c76cd00520c119903b0f8b9fe316a83ced5d66ad0d.exe
Resource
win7-20240221-en
Behavioral task
behavioral31
Sample
f0c292785905838d08b27bb99ab260b43fd8de580de80017fdaaab3c3d53d8a6.exe
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
f3771ca98b3a07606cda74128da5d4292572919418f3045196ea245ef63e9150.exe
Resource
win7-20240319-en
General
-
Target
dd0d00fec6564d52ad291e8f8a99e981a31ba5fbb623076e8e2864f4591e9bc8.exe
-
Size
1.7MB
-
MD5
d4b12487470460653459a54769e974e2
-
SHA1
f879a01a2a5d337b97d14c31294e0384bc0ff649
-
SHA256
dd0d00fec6564d52ad291e8f8a99e981a31ba5fbb623076e8e2864f4591e9bc8
-
SHA512
cdf8f5810a3f8c379030bd4a1686afd9bd6adefefce642ff088c7f0330ee6434120fa1ee90070341c2b1b6990b56005134fd2a71bf0fc29559547bc08c38dbc5
-
SSDEEP
49152:nyZOP+5jUgyNvtchcL6yUw4gZ2oe7yUFqm:nyZO0CFHL7Y
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "C:\\Users\\Admin\\AppData\\Roaming\\IQManager\\iqmanager.exe" dd0d00fec6564d52ad291e8f8a99e981a31ba5fbb623076e8e2864f4591e9bc8.exe -
Executes dropped EXE 3 IoCs
pid Process 2660 iqmanager.exe 2580 iqmanager.exe 436 iqmanager.exe -
Loads dropped DLL 4 IoCs
pid Process 2192 dd0d00fec6564d52ad291e8f8a99e981a31ba5fbb623076e8e2864f4591e9bc8.exe 2192 dd0d00fec6564d52ad291e8f8a99e981a31ba5fbb623076e8e2864f4591e9bc8.exe 2660 iqmanager.exe 2660 iqmanager.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Microsoft\Windows\CurrentVersion\Run\iqmanager.exe = "C:\\Users\\Admin\\AppData\\Roaming\\IQManager\\iqmanager.exe silent" dd0d00fec6564d52ad291e8f8a99e981a31ba5fbb623076e8e2864f4591e9bc8.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 27 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: iqmanager.exe File opened (read-only) \??\U: iqmanager.exe File opened (read-only) \??\M: iqmanager.exe File opened (read-only) \??\O: iqmanager.exe File opened (read-only) \??\P: iqmanager.exe File opened (read-only) \??\X: iqmanager.exe File opened (read-only) \??\I: iqmanager.exe File opened (read-only) \??\K: iqmanager.exe File opened (read-only) \??\A: iqmanager.exe File opened (read-only) \??\G: iqmanager.exe File opened (read-only) \??\H: iqmanager.exe File opened (read-only) \??\S: iqmanager.exe File opened (read-only) \??\B: iqmanager.exe File opened (read-only) \??\J: iqmanager.exe File opened (read-only) \??\L: iqmanager.exe File opened (read-only) \??\T: iqmanager.exe File opened (read-only) \??\Z: iqmanager.exe File opened (read-only) \??\B: iqmanager.exe File opened (read-only) \??\N: iqmanager.exe File opened (read-only) \??\Q: iqmanager.exe File opened (read-only) \??\R: iqmanager.exe File opened (read-only) \??\W: iqmanager.exe File opened (read-only) \??\Y: iqmanager.exe File opened (read-only) \??\V: iqmanager.exe File opened (read-only) \??\B: iqmanager.exe File opened (read-only) \??\E: iqmanager.exe File opened (read-only) \??\A: iqmanager.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2660 iqmanager.exe 2580 iqmanager.exe 436 iqmanager.exe -
Suspicious use of FindShellTrayWindow 11 IoCs
pid Process 2660 iqmanager.exe 2660 iqmanager.exe 2580 iqmanager.exe 2580 iqmanager.exe 436 iqmanager.exe 436 iqmanager.exe 2660 iqmanager.exe 2660 iqmanager.exe 2660 iqmanager.exe 2580 iqmanager.exe 436 iqmanager.exe -
Suspicious use of SendNotifyMessage 11 IoCs
pid Process 2660 iqmanager.exe 2660 iqmanager.exe 2580 iqmanager.exe 2580 iqmanager.exe 436 iqmanager.exe 436 iqmanager.exe 2660 iqmanager.exe 2660 iqmanager.exe 2660 iqmanager.exe 2580 iqmanager.exe 436 iqmanager.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2660 iqmanager.exe 2660 iqmanager.exe 2580 iqmanager.exe 2580 iqmanager.exe 436 iqmanager.exe 436 iqmanager.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2660 2192 dd0d00fec6564d52ad291e8f8a99e981a31ba5fbb623076e8e2864f4591e9bc8.exe 28 PID 2192 wrote to memory of 2660 2192 dd0d00fec6564d52ad291e8f8a99e981a31ba5fbb623076e8e2864f4591e9bc8.exe 28 PID 2192 wrote to memory of 2660 2192 dd0d00fec6564d52ad291e8f8a99e981a31ba5fbb623076e8e2864f4591e9bc8.exe 28 PID 2192 wrote to memory of 2660 2192 dd0d00fec6564d52ad291e8f8a99e981a31ba5fbb623076e8e2864f4591e9bc8.exe 28 PID 2192 wrote to memory of 2660 2192 dd0d00fec6564d52ad291e8f8a99e981a31ba5fbb623076e8e2864f4591e9bc8.exe 28 PID 2192 wrote to memory of 2660 2192 dd0d00fec6564d52ad291e8f8a99e981a31ba5fbb623076e8e2864f4591e9bc8.exe 28 PID 2192 wrote to memory of 2660 2192 dd0d00fec6564d52ad291e8f8a99e981a31ba5fbb623076e8e2864f4591e9bc8.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd0d00fec6564d52ad291e8f8a99e981a31ba5fbb623076e8e2864f4591e9bc8.exe"C:\Users\Admin\AppData\Local\Temp\dd0d00fec6564d52ad291e8f8a99e981a31ba5fbb623076e8e2864f4591e9bc8.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Roaming\IQManager\iqmanager.exeC:\Users\Admin\AppData\Roaming\IQManager\iqmanager.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2660
-
-
C:\Users\Admin\AppData\Roaming\IQManager\iqmanager.exe"C:\Users\Admin\AppData\Roaming\IQManager\iqmanager.exe"1⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2580
-
C:\Users\Admin\AppData\Roaming\IQManager\iqmanager.exe"C:\Users\Admin\AppData\Roaming\IQManager\iqmanager.exe"1⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:436
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD507085de5f288a4af975301d446b5e33b
SHA11bab1af24546e953ef72b3f91ce1703aa3053da3
SHA2565026f9af6ce420f4c30853758d9b5e1b9f0042ded6026a925ee180aea661e872
SHA5121f8e16f22cd88a8acd47cbfd5cec4e8b496194b350b106b97b4147d42ba959894e920a5535ec022ab57b7977c74b6ec9864e0344bfea5bf2e0df95c60fd29e54
-
Filesize
56B
MD530d888d830f8e92e1019ad1e06fb5e49
SHA1300aeb9737a275413859ca571e8c35d06e686ec2
SHA25636e3d68811914bf4053705620069a2d8e4d542aaf71443f7f3e98b14759475e6
SHA512fc40dd13ba030cb101d7f5de96a59b40f9cf386c017dfeb54cef868d25c5730f16c8eb210b6856dedc95bd6a101478471193cd241941d88ded73d122e1fdc301
-
Filesize
108B
MD52f40252e96a1ea2cffc9587a38442203
SHA1c64f86f5ff26c6c950ed18f195dcc527116bc3e6
SHA2560359b5915661b852c226014ec80888185e5e79355344eae78d17beeb3c864f10
SHA512f6c190ec3ebb98625f7b11af1b273df81db5b359699a28f897dd56a0893e23fbbad1a3ae3e6752b0447e90d94e1c8aef3c32a277ca594a89c381f5e0da1125b4
-
Filesize
1.5MB
MD5bca3226cc1cfea416c0bcf488082e5fd
SHA12c1fd0189a9abe856dc8277673500390e1dc2b17
SHA2561301037ea0315e6c4d001a7e4630ed7484e9b3b5d707f65f231e62e4fd117897
SHA5128052d1a0e33c5d3e6f4fbed5edb317c3d888da5a1f3dc956e87c53967f097b22665c87a08e71c5bef3360536e84f01d0bf3542453160143dbc4acab91d54b124