Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
22s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/05/2024, 01:08
Static task
static1
Behavioral task
behavioral1
Sample
9fd256c02758625118fc01855f9ae24feedc816515ceb029f1ba1691299efe36.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9fd256c02758625118fc01855f9ae24feedc816515ceb029f1ba1691299efe36.exe
Resource
win10v2004-20240419-en
General
-
Target
9fd256c02758625118fc01855f9ae24feedc816515ceb029f1ba1691299efe36.exe
-
Size
115KB
-
MD5
f229fa274ae6c19a8b50908f2032810d
-
SHA1
a36a3b3f398eee4ae9db73d7c4151cd97a051d01
-
SHA256
9fd256c02758625118fc01855f9ae24feedc816515ceb029f1ba1691299efe36
-
SHA512
893cb6bec75c44f0da174aba5e09e8abf3259a50b922e3e4095798a0e4ee90b491f80dfce1bf84587ee6d351894727aaec0f2cbc7109635e90080bea06f566af
-
SSDEEP
1536:Hlqls0GgUyj5JxdA4Oj3W2Fsdq4FIG+sdguxnSngBNpD0Ao/VZl8WCfsED:HQC/yj5JO3MnIG+Hu5foN5Cfse
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 8 IoCs
resource yara_rule behavioral1/memory/2452-0-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/files/0x000d0000000144e9-1.dat UPX behavioral1/memory/2724-14-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2452-12-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2608-29-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/files/0x000b0000000149ea-25.dat UPX behavioral1/memory/2460-32-0x0000000000400000-0x000000000041B000-memory.dmp UPX behavioral1/memory/2724-33-0x0000000000400000-0x000000000041B000-memory.dmp UPX -
Executes dropped EXE 4 IoCs
pid Process 2724 MSWDM.EXE 2460 MSWDM.EXE 2656 9FD256C02758625118FC01855F9AE24FEEDC816515CEB029F1BA1691299EFE36.EXE 2608 MSWDM.EXE -
Loads dropped DLL 1 IoCs
pid Process 2460 MSWDM.EXE -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" 9fd256c02758625118fc01855f9ae24feedc816515ceb029f1ba1691299efe36.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" 9fd256c02758625118fc01855f9ae24feedc816515ceb029f1ba1691299efe36.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WDM = "MSWDM.EXE" MSWDM.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\WDM = "MSWDM.EXE" MSWDM.EXE -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\WINDOWS\MSWDM.EXE 9fd256c02758625118fc01855f9ae24feedc816515ceb029f1ba1691299efe36.exe File opened for modification C:\Windows\devF8B.tmp 9fd256c02758625118fc01855f9ae24feedc816515ceb029f1ba1691299efe36.exe File opened for modification C:\Windows\devF8B.tmp MSWDM.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2460 MSWDM.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2452 wrote to memory of 2724 2452 9fd256c02758625118fc01855f9ae24feedc816515ceb029f1ba1691299efe36.exe 28 PID 2452 wrote to memory of 2724 2452 9fd256c02758625118fc01855f9ae24feedc816515ceb029f1ba1691299efe36.exe 28 PID 2452 wrote to memory of 2724 2452 9fd256c02758625118fc01855f9ae24feedc816515ceb029f1ba1691299efe36.exe 28 PID 2452 wrote to memory of 2724 2452 9fd256c02758625118fc01855f9ae24feedc816515ceb029f1ba1691299efe36.exe 28 PID 2452 wrote to memory of 2460 2452 9fd256c02758625118fc01855f9ae24feedc816515ceb029f1ba1691299efe36.exe 29 PID 2452 wrote to memory of 2460 2452 9fd256c02758625118fc01855f9ae24feedc816515ceb029f1ba1691299efe36.exe 29 PID 2452 wrote to memory of 2460 2452 9fd256c02758625118fc01855f9ae24feedc816515ceb029f1ba1691299efe36.exe 29 PID 2452 wrote to memory of 2460 2452 9fd256c02758625118fc01855f9ae24feedc816515ceb029f1ba1691299efe36.exe 29 PID 2460 wrote to memory of 2656 2460 MSWDM.EXE 30 PID 2460 wrote to memory of 2656 2460 MSWDM.EXE 30 PID 2460 wrote to memory of 2656 2460 MSWDM.EXE 30 PID 2460 wrote to memory of 2656 2460 MSWDM.EXE 30 PID 2460 wrote to memory of 2608 2460 MSWDM.EXE 32 PID 2460 wrote to memory of 2608 2460 MSWDM.EXE 32 PID 2460 wrote to memory of 2608 2460 MSWDM.EXE 32 PID 2460 wrote to memory of 2608 2460 MSWDM.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fd256c02758625118fc01855f9ae24feedc816515ceb029f1ba1691299efe36.exe"C:\Users\Admin\AppData\Local\Temp\9fd256c02758625118fc01855f9ae24feedc816515ceb029f1ba1691299efe36.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\WINDOWS\MSWDM.EXE"C:\WINDOWS\MSWDM.EXE"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2724
-
-
C:\WINDOWS\MSWDM.EXE-r!C:\Windows\devF8B.tmp!C:\Users\Admin\AppData\Local\Temp\9fd256c02758625118fc01855f9ae24feedc816515ceb029f1ba1691299efe36.exe! !2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\9FD256C02758625118FC01855F9AE24FEEDC816515CEB029F1BA1691299EFE36.EXE
- Executes dropped EXE
PID:2656
-
-
C:\WINDOWS\MSWDM.EXE-e!C:\Windows\devF8B.tmp!C:\Users\Admin\AppData\Local\Temp\9FD256C02758625118FC01855F9AE24FEEDC816515CEB029F1BA1691299EFE36.EXE!3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2608
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\9FD256C02758625118FC01855F9AE24FEEDC816515CEB029F1BA1691299EFE36.EXE
Filesize115KB
MD545c687c341f60751ad8f44682bdba86d
SHA16c09dd3c9bb2f7c3db4c77a6d521571bfcaf1d5f
SHA2566501acdf404a12e9c205c87e120eb89ffea19a01975bc19747e8261750063857
SHA51231a0840064ada6c41771991be4203321e02ef32542b440556e0e52895ac4148716b1f10c7d48f456eac0c32b0e41f2620d32f3f8e58a02f224e8bbcfacaa1e4d
-
Filesize
80KB
MD55fa751a0b7b0e1eb292f02437eeeacad
SHA175c889bb503c5becc93c147e7bf80b8e6e875a55
SHA25634b3811aa0fc40930508f2c9e27ab480642e043c06bd9307b899c3dda33e8061
SHA5120c0ffa3a84eaf60d173b7c913512504f6c1e93384f20a7993f283c8c4fe91e6a35f0da4ae73614f3e505de8003759d5e4db33c26a0be854f5c9f07596671479c
-
Filesize
35KB
MD56a7c4dc0fe5a8a33154566b5071b47c4
SHA1265a1bcc6b6a6be7a7ad35194fb4984d7bb7ef88
SHA256152944690bb39772fc594430205be704f7068c7a4bbcbe58074ebceab9911cf4
SHA5128340ed45634757d05c95031541e8f655aabc7c7f4eab2caaf623c8b34bd0b2b08bb2c30f5f34faaee176b18730607308d492b1be10e098837fb6a450f344cf3e