Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 15:16
Static task
static1
Behavioral task
behavioral1
Sample
518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe
Resource
win10v2004-20240412-en
General
-
Target
518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe
-
Size
26KB
-
MD5
e3f280f5f1bc79bef4b4fe84d834c138
-
SHA1
8e440da2e506d3c848679d234706077d7ea99bab
-
SHA256
518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1
-
SHA512
d564d97f8b0c05a988423231647769551e847da6ffe204d004b50af4a1bcab8736bdd76dd0b7d5a6e02d2e0d819fab35f20cb797cca4c464564df4ee74129928
-
SSDEEP
768:fFt1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoL:ZfgLdQAQfcfymN
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened (read-only) \??\R: 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened (read-only) \??\P: 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened (read-only) \??\O: 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened (read-only) \??\J: 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened (read-only) \??\Z: 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened (read-only) \??\X: 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened (read-only) \??\Q: 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened (read-only) \??\K: 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened (read-only) \??\H: 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened (read-only) \??\T: 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened (read-only) \??\M: 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened (read-only) \??\L: 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened (read-only) \??\I: 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened (read-only) \??\G: 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened (read-only) \??\Y: 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened (read-only) \??\W: 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened (read-only) \??\V: 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened (read-only) \??\S: 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened (read-only) \??\N: 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened (read-only) \??\E: 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\js\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Biscay\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Stationery\1033\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File created C:\Program Files\VideoLAN\VLC\locale\ga\LC_MESSAGES\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\cgg\LC_MESSAGES\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\1033\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\css\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\GrayCheck\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\js\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ka\LC_MESSAGES\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nn\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sl\LC_MESSAGES\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\1028\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\QUAD\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\js\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File created C:\Program Files (x86)\Windows Sidebar\it-IT\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Javascripts\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveDocumentReview\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\ResizingPanels\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\Bibliography\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File created C:\Program Files (x86)\Windows Sidebar\de-DE\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File created C:\Program Files\VideoLAN\VLC\locale\nn\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File created C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\es-ES\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\js\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\QuickStyles\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\bin\server\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File created C:\Program Files\Java\jre7\lib\ext\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Legal\ENU\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\SC_Reader.exe 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SATIN\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File created C:\Program Files\Microsoft Games\Minesweeper\ja-JP\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened for modification C:\Program Files\Microsoft Games\More Games\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File created C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened for modification C:\Program Files (x86)\Windows Mail\WinMail.exe 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\pt_PT\LC_MESSAGES\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\css\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\de-DE\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\CAPSULES\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\1033\14\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\2052\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\dropins\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zh_TW\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\js\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\Pipeline.v10.0\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\_platform_specific\win_x64\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\es-ES\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File created C:\Program Files\Microsoft Games\Solitaire\es-ES\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Triedit\en-US\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\policytool.exe 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BrightYellow\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\images\_desktop.ini 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\rundl132.exe 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1048 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe 1048 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe 1048 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe 1048 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe 1048 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe 1048 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe 1048 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe 1048 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe 1048 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe 1048 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1048 wrote to memory of 2488 1048 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe 28 PID 1048 wrote to memory of 2488 1048 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe 28 PID 1048 wrote to memory of 2488 1048 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe 28 PID 1048 wrote to memory of 2488 1048 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe 28 PID 2488 wrote to memory of 2496 2488 net.exe 30 PID 2488 wrote to memory of 2496 2488 net.exe 30 PID 2488 wrote to memory of 2496 2488 net.exe 30 PID 2488 wrote to memory of 2496 2488 net.exe 30 PID 1048 wrote to memory of 1236 1048 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe 21 PID 1048 wrote to memory of 1236 1048 518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe"C:\Users\Admin\AppData\Local\Temp\518abf287f38a764871135833d12ca24071c6c53520f4d4c2890d57df92224a1.exe"2⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2496
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5aaf53448461a7c8b7976b6a75a516575
SHA170534333f181a5e2282caa6e157c197da16a7710
SHA256aaf4cf524ae460387e8a44c108828b059e109a2fbcac145787a4c8a56500cb90
SHA512c2b4a654371aef8ea6d17aa8747cedaf7d8cfdc1edb1f27b87d24eb265bb438043e08b9c366f4c0c3054e654dc2c069136038079a0c605f185dddc82a9c87658
-
Filesize
956KB
MD5f2170791ff97f5dc2a64cae7529504a0
SHA14dbcec35224f10b6f61835a1568a5d4f9fe4b359
SHA256a08eb4444e8ce8c3c3be5545a1556851b4541147b18944b3e108b91a9e385550
SHA5120fa29ccc8ddbd4d0ed7a70fbdc65e76d7d4c2636c6e891ba467dbc1766a4bf6c225c2ad3f20adb89cb648e8c93cba43b34c9549ea114c17c0806b1ca8a150975
-
Filesize
471KB
MD54cfdb20b04aa239d6f9e83084d5d0a77
SHA1f22863e04cc1fd4435f785993ede165bd8245ac6
SHA25630ed17ca6ae530e8bf002bcef6048f94dba4b3b10252308147031f5c86ace1b9
SHA51235b4c2f68a7caa45f2bb14b168947e06831f358e191478a6659b49f30ca6f538dc910fe6067448d5d8af4cb8558825d70f94d4bd67709aee414b2be37d49be86
-
Filesize
9B
MD52be02af4dacf3254e321ffba77f0b1c6
SHA1d8349307ec08d45f2db9c9735bde8f13e27a551d
SHA256766fe9c47ca710d9a00c08965550ee7de9cba2d32d67e4901e8cec7e33151d16
SHA51257f61e1b939ed98e6db460ccdbc36a1460b727a99baac0e3b041666dedcef11fcd72a486d91ec7f0ee6e1aec40465719a6a5c22820c28be1066fe12fcd47ddd0