Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
14/05/2024, 19:05
240514-xrnkkabe5x 707/05/2024, 00:36
240507-axztfsdd54 707/05/2024, 00:07
240507-aee2bsce26 7Analysis
-
max time kernel
214s -
max time network
224s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/05/2024, 19:05
Static task
static1
Behavioral task
behavioral1
Sample
update_release_x86_64_.exe.7z
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
update_release_x86_64_.exe.7z
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
update_release_x86_64_.exe
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
update_release_x86_64_.exe
Resource
win10v2004-20240426-en
General
-
Target
update_release_x86_64_.exe.7z
-
Size
13.1MB
-
MD5
075a892cdef834e2d1e4f0998e32817c
-
SHA1
ed4d5d3836359e7a121f620197f1ba52768ba8be
-
SHA256
5af8c7f5923a113a9cb32c45435fcb618ffe6dc1d65b1346524af256570a9886
-
SHA512
e07c3d8fa14f0a4bfa4592bea6cd9deb1db5be1bb23449fa991d735fba453a682f13b24cd9d13c1221f2ff2898fad02bce8b09b2432e16e8c6e6adf10ab6efd4
-
SSDEEP
393216:4P63NPD8PN2MzBTkWKSf79iWSkJLiCDETMM:44Nbo2MtTkM/VLiCD
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 540 update_release_x86_64_.exe 2168 linux_wsl_2.exe -
Loads dropped DLL 10 IoCs
pid Process 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 1204 Process not Found 540 update_release_x86_64_.exe 2168 linux_wsl_2.exe 1204 Process not Found -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 540 update_release_x86_64_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 540 update_release_x86_64_.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2716 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeRestorePrivilege 2716 7zFM.exe Token: 35 2716 7zFM.exe Token: SeSecurityPrivilege 2716 7zFM.exe Token: SeRestorePrivilege 1044 7zFM.exe Token: 35 1044 7zFM.exe Token: 33 2652 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2652 AUDIODG.EXE Token: 33 2652 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2652 AUDIODG.EXE Token: SeRestorePrivilege 1052 7zG.exe Token: 35 1052 7zG.exe Token: SeSecurityPrivilege 1052 7zG.exe Token: SeSecurityPrivilege 1052 7zG.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2716 7zFM.exe 2716 7zFM.exe 1044 7zFM.exe 1052 7zG.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1196 wrote to memory of 2716 1196 cmd.exe 29 PID 1196 wrote to memory of 2716 1196 cmd.exe 29 PID 1196 wrote to memory of 2716 1196 cmd.exe 29 PID 540 wrote to memory of 2168 540 update_release_x86_64_.exe 39 PID 540 wrote to memory of 2168 540 update_release_x86_64_.exe 39 PID 540 wrote to memory of 2168 540 update_release_x86_64_.exe 39
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\update_release_x86_64_.exe.7z1⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\update_release_x86_64_.exe.7z"2⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2716
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2840
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\update_release_x86_64_.exe.7z"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1044
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4f81⤵
- Suspicious use of AdjustPrivilegeToken
PID:2652
-
C:\Users\Admin\AppData\Local\Temp\update_release_x86_64_.exe"C:\Users\Admin\AppData\Local\Temp\update_release_x86_64_.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\onefile_540_133601873037066000\linux_wsl_2.exe"C:\Users\Admin\AppData\Local\Temp\update_release_x86_64_.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2168
-
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\" -an -ai#7zMap3865:130:7zEvent38931⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1052
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.5MB
MD55a5dd7cad8028097842b0afef45bfbcf
SHA1e247a2e460687c607253949c52ae2801ff35dc4a
SHA256a811c7516f531f1515d10743ae78004dd627eba0dc2d3bc0d2e033b2722043ce
SHA512e6268e4fad2ce3ef16b68298a57498e16f0262bf3531539ad013a66f72df471569f94c6fcc48154b7c3049a3ad15cbfcbb6345dacb4f4ed7d528c74d589c9858
-
Filesize
20.9MB
MD55be7258c944760f57cb7e103b0dc1a9d
SHA13930c306a72463334ec62773ede645c8b0ded3fd
SHA256e3bd8cbdeb3cc6b0fcca0a19ee7da2bc8b6bc04e9e3c2007d4c5afdc5ee01c33
SHA512c43ea9d867ac2b5a601c70d2b7e9ba4d234c93c68f19e53f3b5040df2100652fa8ae6fd5056dcd4e0b446aa565b5198afa9870b46ffff4e029ae9671b4ce60f1
-
Filesize
13.1MB
MD5a242becef481a0115f6196937ad13ca8
SHA14be300ac5db16ff38fbf2936d68cab02a4c577b3
SHA2566481c9aedb7ed19fe0aaf9a08a400a19f3dd4ea6454ee5c59f3f88e407e38edb
SHA5120a3ae2da64e2500f0a3bfb9cc4f383fc757f7869e924879d9f8d25284170ea72510ed2dbd4939b84bc6159ceb867a2abc454eb98433050dc508c05e645025638