Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
18s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
30/04/2024, 03:19
Static task
static1
Behavioral task
behavioral1
Sample
d64e6d00675f2b672ed6a6296f1754f155325620149f47bf90f6abc07e4e09cc.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
d64e6d00675f2b672ed6a6296f1754f155325620149f47bf90f6abc07e4e09cc.exe
Resource
win10v2004-20240419-en
General
-
Target
d64e6d00675f2b672ed6a6296f1754f155325620149f47bf90f6abc07e4e09cc.exe
-
Size
95KB
-
MD5
7de0e55e080109e43e832b11cb0f2f35
-
SHA1
b4e238de5ea1494efc939e726787825de8b7b966
-
SHA256
d64e6d00675f2b672ed6a6296f1754f155325620149f47bf90f6abc07e4e09cc
-
SHA512
4cdd2e1f93f3d5711f0623d4f48320708d9f2b99bbcc1f069f7ea602e6d3e114e4dbf1ca3b97a1191eba7bb12c4b5a80065274c10b9b50832e147f799dccf472
-
SSDEEP
1536:Hlqls0GgUyj5JxdA4Oj3W2Fsdq4FCG+sdguxnSngBNpT/mzNnxPAxEAz0+/8omCH:HQC/yj5JO3MnCG+Hu54Fx4xE8EomCP1x
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 7 IoCs
resource yara_rule behavioral1/memory/1688-0-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/files/0x000d000000014713-5.dat UPX behavioral1/memory/2200-16-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/1688-15-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/1688-9-0x0000000000420000-0x000000000043B000-memory.dmp UPX behavioral1/memory/2372-26-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2200-25-0x0000000000400000-0x000000000041B000-memory.dmp UPX -
Executes dropped EXE 3 IoCs
pid Process 2200 MSWDM.EXE 2372 MSWDM.EXE 2588 D64E6D00675F2B672ED6A6296F1754F155325620149F47BF90F6ABC07E4E09CC.EXE -
Loads dropped DLL 1 IoCs
pid Process 2372 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" d64e6d00675f2b672ed6a6296f1754f155325620149f47bf90f6abc07e4e09cc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" d64e6d00675f2b672ed6a6296f1754f155325620149f47bf90f6abc07e4e09cc.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE d64e6d00675f2b672ed6a6296f1754f155325620149f47bf90f6abc07e4e09cc.exe File opened for modification C:\Windows\dev11FB.tmp d64e6d00675f2b672ed6a6296f1754f155325620149f47bf90f6abc07e4e09cc.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2372 MSWDM.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2200 1688 d64e6d00675f2b672ed6a6296f1754f155325620149f47bf90f6abc07e4e09cc.exe 28 PID 1688 wrote to memory of 2200 1688 d64e6d00675f2b672ed6a6296f1754f155325620149f47bf90f6abc07e4e09cc.exe 28 PID 1688 wrote to memory of 2200 1688 d64e6d00675f2b672ed6a6296f1754f155325620149f47bf90f6abc07e4e09cc.exe 28 PID 1688 wrote to memory of 2200 1688 d64e6d00675f2b672ed6a6296f1754f155325620149f47bf90f6abc07e4e09cc.exe 28 PID 1688 wrote to memory of 2372 1688 d64e6d00675f2b672ed6a6296f1754f155325620149f47bf90f6abc07e4e09cc.exe 29 PID 1688 wrote to memory of 2372 1688 d64e6d00675f2b672ed6a6296f1754f155325620149f47bf90f6abc07e4e09cc.exe 29 PID 1688 wrote to memory of 2372 1688 d64e6d00675f2b672ed6a6296f1754f155325620149f47bf90f6abc07e4e09cc.exe 29 PID 1688 wrote to memory of 2372 1688 d64e6d00675f2b672ed6a6296f1754f155325620149f47bf90f6abc07e4e09cc.exe 29 PID 2372 wrote to memory of 2588 2372 MSWDM.EXE 30 PID 2372 wrote to memory of 2588 2372 MSWDM.EXE 30 PID 2372 wrote to memory of 2588 2372 MSWDM.EXE 30 PID 2372 wrote to memory of 2588 2372 MSWDM.EXE 30 PID 2372 wrote to memory of 2588 2372 MSWDM.EXE 30 PID 2372 wrote to memory of 2588 2372 MSWDM.EXE 30 PID 2372 wrote to memory of 2588 2372 MSWDM.EXE 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d64e6d00675f2b672ed6a6296f1754f155325620149f47bf90f6abc07e4e09cc.exe"C:\Users\Admin\AppData\Local\Temp\d64e6d00675f2b672ed6a6296f1754f155325620149f47bf90f6abc07e4e09cc.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2200
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev11FB.tmp!C:\Users\Admin\AppData\Local\Temp\d64e6d00675f2b672ed6a6296f1754f155325620149f47bf90f6abc07e4e09cc.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\D64E6D00675F2B672ED6A6296F1754F155325620149F47BF90F6ABC07E4E09CC.EXE
- Executes dropped EXE
PID:2588
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD55b2a8c1fc71bff8146d3a25249562b02
SHA11f7a15cc0e430a3c8c7691709b3ef5bb03178447
SHA2566bb8e73f400fa65389c630483e946ab802a00412937143093de285222dc10141
SHA5128ff3c02a36495d7e6a3e9bb115e56392fd489fff4155b9106c7b0da1184d4d84a5f6bef821b845ba2200a7748d773ae1a2c731f6f37b04a27ede967caba0b2f8
-
\Users\Admin\AppData\Local\Temp\d64e6d00675f2b672ed6a6296f1754f155325620149f47bf90f6abc07e4e09cc.exe
Filesize15KB
MD5b0cec9f342bf95700b602ee376446577
SHA1b955b1b64280bb0ea873538029cf5ea44081501b
SHA25624a2472e3bd5016cb22ce14cefee112d5bc18354bf099e8e66ad9846aea15088
SHA51205ebecfc8d3e2e7885d3cacc65bfd97db710c2cbc0fb76b19b7d6cc82b327b25df953a20affc8d84002167dd8ac7710622279d3579c6605e742a98fe7095aa4e