Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22/04/2024, 20:21
Static task
static1
Behavioral task
behavioral1
Sample
8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe
Resource
win10v2004-20240412-en
General
-
Target
8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe
-
Size
74KB
-
MD5
a7d7be50cf4724f4752f97644cf64fbc
-
SHA1
aaa43524fcca8bbd24e736119e22df6cbe7e301b
-
SHA256
8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7
-
SHA512
31587192e2aa2219c21ad7a83afa7eae88db7b6db933e3bf97ca0c1c38b499f993289a42d2a641a00a930c3a2e624f6963bcd719d84fd05a830f7168ecf6efc7
-
SSDEEP
768:agO5xRYi+SfSWHHNvvG5bnl/NqNwsKVDstHxYD0p1aXKynF0vQmYZS0HdJnfWOQ8:RshfSWHHNvoLqNwDDGw02eQmh0HjWOQ8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2052 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 2256 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe 2256 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\¢«.exe 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe File created C:\Windows\SysWOW64\¢«.exe 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe File created C:\Windows\SysWOW64\notepad¢¬.exe 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe File created C:\Windows\system\rundll32.exe 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1713817292" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1713817292" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2256 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe 2256 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe 2256 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe 2256 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe 2256 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe 2256 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe 2256 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe 2256 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe 2256 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe 2256 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe 2256 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe 2256 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe 2256 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe 2256 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2052 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2256 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe 2052 rundll32.exe 2052 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2052 2256 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe 28 PID 2256 wrote to memory of 2052 2256 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe 28 PID 2256 wrote to memory of 2052 2256 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe 28 PID 2256 wrote to memory of 2052 2256 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe 28 PID 2256 wrote to memory of 2052 2256 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe 28 PID 2256 wrote to memory of 2052 2256 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe 28 PID 2256 wrote to memory of 2052 2256 8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe"C:\Users\Admin\AppData\Local\Temp\8e55ae294dad77c7edf84f5c74d80f19cfe0c5e59dcfb45d00d93556777d2ef7.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD58798df07f151eca1c7658502985770dc
SHA1a475e2df64cffdae9dddb90bcdbb87415896c08d
SHA256515976f330eb4954a42e6f604a3ff8792d0d3b835e2d633373befb5246428135
SHA51251234946dba0781db9411773a9cdf86d489045c9dca82cdefd45bd8c1bcf06051506f9542f595dd45c325e6ed590fcd772e0d30ef0f20492d725365a0cf16b01
-
Filesize
80KB
MD5bf2ca48fc4c9199c66f399caca4c4682
SHA1449b55ea0a1eaef6f8278be293962ecd5d2e91a8
SHA256840d0bffb32982bb26d473339655e02ca773b2c3dff530cb66222067c2149a09
SHA512da6b4c223b3d6158491f217e3059f37cee11f4720e64cd47277c16d5a03cfde6fe2784e2fbabe9c2b154d1adc40cd9c74f16501a409e2fc3057d3d75ee4608e0