Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
07/05/2024, 15:07
240507-shcz9aeg94 1007/05/2024, 15:06
240507-sgvhxacc6v 507/05/2024, 14:33
240507-rxbv3adh92 7Analysis
-
max time kernel
1800s -
max time network
1559s -
platform
windows7_x64 -
resource
win7-20240221-es -
resource tags
arch:x64arch:x86image:win7-20240221-eslocale:es-esos:windows7-x64systemwindows -
submitted
07/05/2024, 15:07
Static task
static1
Behavioral task
behavioral1
Sample
9b7.exe
Resource
win7-20240221-es
General
-
Target
9b7.exe
-
Size
1.2MB
-
MD5
3e045f1fa7e08692418b1a21673ed3ec
-
SHA1
41f9dc3023e480d6722cb18e16ce06395b644165
-
SHA256
9b72da9d930ab568e000d6b8d833e673206fe655831ac2b7d794263818f8977a
-
SHA512
e366df7a99809ad1548a8a88aeb961b1acd3431420b8035baf7c7670955833581e6b9594280e0996264f07d4feedaabbb759ad2e2ce16398ab819a9a15da7712
-
SSDEEP
24576:EqDEvCTbMWu7rQYlBQcBiT6rprG8azO9n4WH9A+8zhy0V2J:ETvC/MTQYxsWR7azCn4WuLrM
Malware Config
Signatures
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Loads dropped DLL 1 IoCs
pid Process 2688 finger.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2396 set thread context of 2264 2396 9b7.exe 28 PID 2264 set thread context of 1224 2264 svchost.exe 21 PID 2264 set thread context of 2688 2264 svchost.exe 29 PID 2688 set thread context of 1224 2688 finger.exe 21 -
description ioc Process Key created \Registry\User\S-1-5-21-2297530677-1229052932-2803917579-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 finger.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2264 svchost.exe 2264 svchost.exe 2264 svchost.exe 2264 svchost.exe 2264 svchost.exe 2264 svchost.exe 2264 svchost.exe 2264 svchost.exe 2688 finger.exe 2688 finger.exe 2688 finger.exe 2688 finger.exe 2688 finger.exe 2688 finger.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1224 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2396 9b7.exe 2264 svchost.exe 1224 Explorer.EXE 1224 Explorer.EXE 2688 finger.exe 2688 finger.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeShutdownPrivilege 1224 Explorer.EXE Token: SeShutdownPrivilege 1224 Explorer.EXE Token: SeShutdownPrivilege 1224 Explorer.EXE Token: SeShutdownPrivilege 1224 Explorer.EXE Token: SeShutdownPrivilege 1224 Explorer.EXE Token: SeShutdownPrivilege 1224 Explorer.EXE -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2396 9b7.exe 2396 9b7.exe 1224 Explorer.EXE 1224 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2396 9b7.exe 2396 9b7.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2264 2396 9b7.exe 28 PID 2396 wrote to memory of 2264 2396 9b7.exe 28 PID 2396 wrote to memory of 2264 2396 9b7.exe 28 PID 2396 wrote to memory of 2264 2396 9b7.exe 28 PID 2396 wrote to memory of 2264 2396 9b7.exe 28 PID 1224 wrote to memory of 2688 1224 Explorer.EXE 29 PID 1224 wrote to memory of 2688 1224 Explorer.EXE 29 PID 1224 wrote to memory of 2688 1224 Explorer.EXE 29 PID 1224 wrote to memory of 2688 1224 Explorer.EXE 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\9b7.exe"C:\Users\Admin\AppData\Local\Temp\9b7.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\9b7.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2264
-
-
-
C:\Windows\SysWOW64\finger.exe"C:\Windows\SysWOW64\finger.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2688
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
268KB
MD5368bffaed84bc1dbffec8bb31ed9dfdf
SHA121c7ad2ab70cbe8ef4f1c259a2e91c1a7ceec70d
SHA256b01ff2279a65c0b16bd5b41e9f4eefeafd37d96b0363a1d8729aa6a0bb8d56bd
SHA51290a1049c6e8ec973c17365532caf74bd42ca17bf860ddae633bb26e2ffc9ded25de7cef0782dd0bf36fbb34c74b58c83afc9e5f58a8e998f9d9c7d5234eddc95
-
Filesize
434KB
MD56366b1751087ba991f1b4188a3f38486
SHA1449fab91dcd435e62a96dc4b400671ba0460a84a
SHA2563102600d3ad67b0e3f132bc0f8e0e66d976ba3700c3cc96459b65a87fa57c373
SHA512e1a8eb6dcfe0732299ccf74a0e61acbd132da4abac8aad996c2ba481328c0671530a55347f694f23a01a40e2343976196fc09fdd4573ab996a8a88d8e7693b90
-
Filesize
831KB
MD5f4d8be409d1bd016a7b3b2580a2b90fb
SHA1a68e1f6a9b2234f2269d9cf1fbda94124c428dbe
SHA256d70b27121bb33012560b14a7bd597666d76193d7dc5f89e2ac5e7507240bf708
SHA5129892cd38d77898fe7916a8810c82a377bbcb4f0c3f75a8295943fa29a5cb4daec95a1600a74614f31ec723967fd95721174042f2e54b12e52fe85202cdf052df