Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
11s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
02/05/2024, 19:51
Static task
static1
Behavioral task
behavioral1
Sample
2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79.exe
Resource
win10v2004-20240226-en
General
-
Target
2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79.exe
-
Size
615KB
-
MD5
cd5a3037f111dd08a62a1dfaea55fe15
-
SHA1
6410cbbb863d904fa789fa22c8a0aa771c2111f8
-
SHA256
2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79
-
SHA512
63dd7f43a6c87b55bee27f7a8fd0815c40ee3fc66095aa48666b90ee3e31e16097ef807711799c45f77c0685daef43dbcf8af458289f7858d1bdf248aee58b0a
-
SSDEEP
12288:wlbX+Waplw9U+qMi8CtdVldusIh6BBHCHrKZXCktSzIzWpX5x:WbX+NYTqMi8CtBd2QHCHmTBW5x
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 10 IoCs
resource yara_rule behavioral1/memory/2328-1-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/files/0x00080000000122cd-13.dat UPX behavioral1/memory/2948-20-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2500-19-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2328-12-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2428-30-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/files/0x000d00000001568c-28.dat UPX behavioral1/memory/2428-33-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2500-36-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2948-37-0x0000000000400000-0x000000000041B000-memory.dmp UPX -
Executes dropped EXE 5 IoCs
pid Process 2500 MSWDM.EXE 2948 MSWDM.EXE 2616 2861850B353799786F5E8F22753CD82CFC887EA6472C9F14ABAF57C595101B79.EXE 1212 Process not Found 2428 MSWDM.EXE -
Loads dropped DLL 2 IoCs
pid Process 2500 MSWDM.EXE 2500 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE 2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79.exe File opened for modification C:\Windows\dev28F4.tmp 2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79.exe File opened for modification C:\Windows\dev28F4.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2500 MSWDM.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2948 2328 2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79.exe 28 PID 2328 wrote to memory of 2948 2328 2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79.exe 28 PID 2328 wrote to memory of 2948 2328 2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79.exe 28 PID 2328 wrote to memory of 2948 2328 2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79.exe 28 PID 2328 wrote to memory of 2500 2328 2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79.exe 29 PID 2328 wrote to memory of 2500 2328 2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79.exe 29 PID 2328 wrote to memory of 2500 2328 2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79.exe 29 PID 2328 wrote to memory of 2500 2328 2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79.exe 29 PID 2500 wrote to memory of 2616 2500 MSWDM.EXE 30 PID 2500 wrote to memory of 2616 2500 MSWDM.EXE 30 PID 2500 wrote to memory of 2616 2500 MSWDM.EXE 30 PID 2500 wrote to memory of 2616 2500 MSWDM.EXE 30 PID 2500 wrote to memory of 2428 2500 MSWDM.EXE 31 PID 2500 wrote to memory of 2428 2500 MSWDM.EXE 31 PID 2500 wrote to memory of 2428 2500 MSWDM.EXE 31 PID 2500 wrote to memory of 2428 2500 MSWDM.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79.exe"C:\Users\Admin\AppData\Local\Temp\2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2948
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\dev28F4.tmp!C:\Users\Admin\AppData\Local\Temp\2861850b353799786f5e8f22753cd82cfc887ea6472c9f14abaf57c595101b79.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\2861850B353799786F5E8F22753CD82CFC887EA6472C9F14ABAF57C595101B79.EXE
- Executes dropped EXE
PID:2616
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\dev28F4.tmp!C:\Users\Admin\AppData\Local\Temp\2861850B353799786F5E8F22753CD82CFC887EA6472C9F14ABAF57C595101B79.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2428
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\2861850B353799786F5E8F22753CD82CFC887EA6472C9F14ABAF57C595101B79.EXE
Filesize615KB
MD572655d8e8db634cbfdf6093bbe8042bb
SHA15d33963b083b3282e6cf125fc6d298c4d4e3a9b4
SHA256afb08709bfc463d60dd27c60d7759289c13af0a29783bb39fbcef0e3cdfa2f93
SHA512312da48c58e9200124339554f53573fbda7bd6dce471651318dcd081656655286b65f5074bac5de6b2ecd442d6a8d6794405668af4bdb5de288a180ff849c167
-
Filesize
47KB
MD5336ffd74e5eb29bc13e4e0f5de0cb57a
SHA1fb3bab77482267f8880cd329d926a41d397d072d
SHA256688c0c407e9651d4fb63017475f3ca304c7ff8c0185592c3a1d7d3b660098c79
SHA512e8e70882eebbb5a602ac68a4a51a15c7d32d083b5c5717981a9b33d358e17411a0fee1294b631f29f0f5cf06e0ad86109198de6114ba364fdaac1e866a049d76
-
Filesize
568KB
MD504fb3ae7f05c8bc333125972ba907398
SHA1df22612647e9404a515d48ebad490349685250de
SHA2562fb898bacb587f2484c9c4aa6da2729079d93d1f923a017bb84beef87bf74fef
SHA51294c164a0b884c939ece30f5038d07b756702998d46786f9f613fbea2eb30bed4bc19a409f347bb4cc565898473b18155d580b453683223beaf30ed4079c251b2