Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/04/2024, 14:14
Static task
static1
Behavioral task
behavioral1
Sample
a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe
Resource
win10v2004-20240412-en
General
-
Target
a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe
-
Size
26KB
-
MD5
f6bc7ff37e4968ed377720ee5e275f9f
-
SHA1
2ac8d03270bd7acf83191669d7e60f4e640452a7
-
SHA256
a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730
-
SHA512
7495c95835c25472b619cea2f303c3a66be88e0967a715df151379f31a30bda2c4392c845bba78eaed939197e080d70decf01222c58ed0ab6fe4c2dd62bf95db
-
SSDEEP
768:y1ODKAaDMG8H92RwZNQSwcfymNBg+g61GoGwXnKx:UfgLdQAQfcfymNG+Kx
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\U: a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened (read-only) \??\O: a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened (read-only) \??\L: a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened (read-only) \??\K: a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened (read-only) \??\I: a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened (read-only) \??\H: a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened (read-only) \??\X: a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened (read-only) \??\R: a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened (read-only) \??\N: a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened (read-only) \??\M: a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened (read-only) \??\S: a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened (read-only) \??\G: a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened (read-only) \??\Z: a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened (read-only) \??\Y: a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened (read-only) \??\W: a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened (read-only) \??\V: a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened (read-only) \??\E: a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened (read-only) \??\T: a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened (read-only) \??\Q: a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened (read-only) \??\P: a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened (read-only) \??\J: a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\de-DE\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\VBA\VBA6\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\es\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File created C:\Program Files\VideoLAN\VLC\locale\nl\LC_MESSAGES\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\js\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmid.exe a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\include\win32\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File created C:\Program Files (x86)\Microsoft Office\Office14\AccessWeb\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File created C:\Program Files (x86)\Windows NT\TableTextService\es-ES\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File created C:\Program Files (x86)\Microsoft Analysis Services\AS OLEDB\10\Resources\1033\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\OneNote.en-us\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BrightOrange\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\RedistList\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File created C:\Program Files\VideoLAN\VLC\locale\an\LC_MESSAGES\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Adobe\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File created C:\Program Files\Windows Mail\en-US\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened for modification C:\Program Files (x86)\Windows Media Player\wmplayer.exe a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Biscay\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\STS2\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\es-ES\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened for modification C:\Program Files\Windows Journal\es-ES\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File created C:\Program Files\Windows Journal\ja-JP\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Excel.en-us\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\Certificates\Verisign\Components\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File created C:\Program Files (x86)\Windows NT\TableTextService\en-US\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\en-US\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File created C:\Program Files\VideoLAN\VLC\plugins\audio_mixer\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\en-US\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened for modification C:\Program Files\Microsoft Games\More Games\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened for modification C:\Program Files\Reference Assemblies\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File created C:\Program Files\Microsoft Games\Mahjong\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fy\LC_MESSAGES\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Filters\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lv\LC_MESSAGES\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\Adobe AIR Application Installer.exe a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\Welcome Tool\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File created C:\Program Files (x86)\Windows Portable Devices\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\en-US\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\ja-JP\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\it-IT\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Source Engine\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Oasis\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened for modification C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\fa\LC_MESSAGES\_desktop.ini a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\rundl132.exe a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2080 a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe 2080 a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe 2080 a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe 2080 a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe 2080 a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe 2080 a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe 2080 a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe 2080 a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe 2080 a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe 2080 a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2188 2080 a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe 28 PID 2080 wrote to memory of 2188 2080 a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe 28 PID 2080 wrote to memory of 2188 2080 a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe 28 PID 2080 wrote to memory of 2188 2080 a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe 28 PID 2188 wrote to memory of 2560 2188 net.exe 30 PID 2188 wrote to memory of 2560 2188 net.exe 30 PID 2188 wrote to memory of 2560 2188 net.exe 30 PID 2188 wrote to memory of 2560 2188 net.exe 30 PID 2080 wrote to memory of 1136 2080 a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe 20 PID 2080 wrote to memory of 1136 2080 a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe 20
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe"C:\Users\Admin\AppData\Local\Temp\a1c47654896d7c78937bf82083af325d1eb007deee89830ad78d48659e9e6730.exe"2⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵PID:2560
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD503f2b0baf58ba658d3a68c3a410c7103
SHA1aeea14914f27c7b4d962caeb90e9dfadde1fffab
SHA256895644b779b1d449613044a4f5f7da13ce5bebbda58d97961cbb7d1f18d95c40
SHA512efc74a220ab91fe06331ac388149cad22d88f12aae2e3d601f00570dde02d06c61421285608a48287e8f688ad1112cce57e287f8d87700fd59d4f162a946f706
-
Filesize
956KB
MD59bd082f539046b92281ad4ec17940f73
SHA1785df9eb5b59a82bd19f0c96202037fe6451757a
SHA25630fcae65670c8f6350dbd1866a8b01e699ce678f0fb04a9b9533ca3e68a2c703
SHA5121ffdda672d9603dbd057b268ee001ece453a24e7f38b121c669bb83f53cb4ae84afc2a2194964319c39105020b5d54281a8af6e328b257bd5714461901de0f4c
-
Filesize
471KB
MD5c6c8fde27f649c91ddaab8cb9ca344a6
SHA15e4865aec432a18107182f47edda176e8c566152
SHA25632c3fed53bfc1d890e9bd1d771fdc7e2c81480e03f1425bce07b4045a192d100
SHA512a8df7d1e852d871d7f16bae10c4ff049359583da88cc85a039f0298525839040d5363ce5ef4cbdb92a12a25785f73df83cf0df07752b78e6e6444f32160a2155
-
Filesize
9B
MD572b7e38c6ba037d117f32b55c07b1a9c
SHA135e2435e512e17ca2be885e17d75913f06b90361
SHA256e9719e3c653627668046bac84b77097bfb0cd018d68465c17130ed31d6d6eca6
SHA5122bebd814b81ad2dc547802d42891d833caaad81d004758ec4373f9c7af2971eb822f0a559d2d5d4fca499912fea95e25bab22e92cb0c149d6a4c692eee6ee46a