Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/05/2024, 01:16
Static task
static1
Behavioral task
behavioral1
Sample
Photo1.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Photo1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Photo2.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Photo2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
TConf.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
TConf.exe
Resource
win10v2004-20240508-en
General
-
Target
Photo2.exe
-
Size
37KB
-
MD5
7b6fe54446ff5d20230b2d6f5ce45fad
-
SHA1
d6404f74516285cc40272d345461d9abd90823b3
-
SHA256
70aae83fad8fbbbd63c6a348fc4716abdd19a4f9bb9d011cb0f80850beb4543a
-
SHA512
77ce4a4fbe85e9b2a4c63637b0247724ee33ca0b6024a6a39138c5e73b0a3b3ed36a11a14bed04e05ba1babac183e9bae30a0b5b01c1fb3a655a78a81063f477
-
SSDEEP
768:LX3pbhvZSjPrIHHVuLIFOXds2L6cJj3AD2DLyxNCK1mM:d3Sr0HSPXdVLDpDLyxNN
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2876 IEXPAND.EXE -
Executes dropped EXE 1 IoCs
pid Process 2876 IEXPAND.EXE -
Loads dropped DLL 2 IoCs
pid Process 1640 Photo2.exe 1640 Photo2.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\iexpand.exe = "iexpand.exe" Photo2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\iexpand.exe = "iexpand.exe" IEXPAND.EXE -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\IEXPAND.EXE Photo2.exe File opened for modification C:\WINDOWS\SysWOW64\IEXPAND.EXE Photo2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1640 Photo2.exe 1640 Photo2.exe 1640 Photo2.exe 2876 IEXPAND.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2876 1640 Photo2.exe 30 PID 1640 wrote to memory of 2876 1640 Photo2.exe 30 PID 1640 wrote to memory of 2876 1640 Photo2.exe 30 PID 1640 wrote to memory of 2876 1640 Photo2.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Photo2.exe"C:\Users\Admin\AppData\Local\Temp\Photo2.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\WINDOWS\SysWOW64\IEXPAND.EXE"C:\WINDOWS\SYSTEM32\IEXPAND.EXE" C:\Users\Admin\AppData\Local\Temp\Photo2.exe2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD57b6fe54446ff5d20230b2d6f5ce45fad
SHA1d6404f74516285cc40272d345461d9abd90823b3
SHA25670aae83fad8fbbbd63c6a348fc4716abdd19a4f9bb9d011cb0f80850beb4543a
SHA51277ce4a4fbe85e9b2a4c63637b0247724ee33ca0b6024a6a39138c5e73b0a3b3ed36a11a14bed04e05ba1babac183e9bae30a0b5b01c1fb3a655a78a81063f477