Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
113s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
16/04/2024, 19:01
Static task
static1
Behavioral task
behavioral1
Sample
0e0d3ddefdc1988a36be55ae055ed039f40bc98ba24f17a11b47a1a362c5da82.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0e0d3ddefdc1988a36be55ae055ed039f40bc98ba24f17a11b47a1a362c5da82.exe
Resource
win10v2004-20240412-en
General
-
Target
0e0d3ddefdc1988a36be55ae055ed039f40bc98ba24f17a11b47a1a362c5da82.exe
-
Size
76KB
-
MD5
1588dc7d8a815648d291e3c6f24a3f2c
-
SHA1
99cdd498657f40aa531df08c93e5eeb9cc9f2fef
-
SHA256
0e0d3ddefdc1988a36be55ae055ed039f40bc98ba24f17a11b47a1a362c5da82
-
SHA512
9aa2f0ba85b5a172cf7d40413a221f1ba7c3bd7b1371f79eafd2ae5d575c9fba0cc31544ac0771cd5149d268f89e89d91a81129c49fd9b343d8ea5acc1200059
-
SSDEEP
768:xMIrCOtyLoW0+xOF4/i/BEYkp7P6lweQDhDmpU5GFrrEzWsdSE0d8pUHIkI0Inn8:xJWp3xO+2G40OIkan8
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" zfroz.exe -
Executes dropped EXE 1 IoCs
pid Process 2608 zfroz.exe -
Loads dropped DLL 2 IoCs
pid Process 2192 0e0d3ddefdc1988a36be55ae055ed039f40bc98ba24f17a11b47a1a362c5da82.exe 2192 0e0d3ddefdc1988a36be55ae055ed039f40bc98ba24f17a11b47a1a362c5da82.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\zfroz = "C:\\Users\\Admin\\zfroz.exe" zfroz.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe 2608 zfroz.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2192 0e0d3ddefdc1988a36be55ae055ed039f40bc98ba24f17a11b47a1a362c5da82.exe 2608 zfroz.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2608 2192 0e0d3ddefdc1988a36be55ae055ed039f40bc98ba24f17a11b47a1a362c5da82.exe 30 PID 2192 wrote to memory of 2608 2192 0e0d3ddefdc1988a36be55ae055ed039f40bc98ba24f17a11b47a1a362c5da82.exe 30 PID 2192 wrote to memory of 2608 2192 0e0d3ddefdc1988a36be55ae055ed039f40bc98ba24f17a11b47a1a362c5da82.exe 30 PID 2192 wrote to memory of 2608 2192 0e0d3ddefdc1988a36be55ae055ed039f40bc98ba24f17a11b47a1a362c5da82.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e0d3ddefdc1988a36be55ae055ed039f40bc98ba24f17a11b47a1a362c5da82.exe"C:\Users\Admin\AppData\Local\Temp\0e0d3ddefdc1988a36be55ae055ed039f40bc98ba24f17a11b47a1a362c5da82.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\zfroz.exe"C:\Users\Admin\zfroz.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5194b39199c347b83dad97227f9d29723
SHA18b3908fc592cba47d6adee43fb7acc774744a340
SHA256e4935793e781eb704a45294fb8d5cfaf5c19d31f63432d409f52f9e0636d377b
SHA512e40e5cd2785b8b73bfea98c6cffaa541c325f7f85d0c95da39029ba254529b288deba54314aff4b0029c57992dd57021dedc9052eafcf9a4f06f15826bce0803