Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 03:57
Behavioral task
behavioral1
Sample
39f7e2b5de54745bbd54c098809633758732875d9fef2ac52af0c81abdccd482.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
39f7e2b5de54745bbd54c098809633758732875d9fef2ac52af0c81abdccd482.exe
Resource
win10v2004-20240426-en
General
-
Target
39f7e2b5de54745bbd54c098809633758732875d9fef2ac52af0c81abdccd482.exe
-
Size
12.4MB
-
MD5
2e21d73c2d966944f9abe8b86fdf204e
-
SHA1
438e391ca8fabb4ad2cc11df14551f076dd67ddc
-
SHA256
39f7e2b5de54745bbd54c098809633758732875d9fef2ac52af0c81abdccd482
-
SHA512
c54f99f7474ae5db41ac442f843c7fce5cb5ca033f18bfc35d618ee2f181a7b589564db20be24cb9c88659d2db9d87c57e712cb2aaf489ef6792cdfb859fa628
-
SSDEEP
393216:0HoFh75DfUg5eMTy/yRzE5KELV37xbeQs8deRs:0Hob7daMTOKERxSZ8dx
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0005000000019a84-231.dat acprotect -
Executes dropped EXE 2 IoCs
pid Process 3048 7z.exe 324 syltools.exe -
Loads dropped DLL 5 IoCs
pid Process 2368 39f7e2b5de54745bbd54c098809633758732875d9fef2ac52af0c81abdccd482.exe 2368 39f7e2b5de54745bbd54c098809633758732875d9fef2ac52af0c81abdccd482.exe 3048 7z.exe 2368 39f7e2b5de54745bbd54c098809633758732875d9fef2ac52af0c81abdccd482.exe 324 syltools.exe -
resource yara_rule behavioral1/memory/2368-0-0x00000000009A0000-0x0000000000BAA000-memory.dmp upx behavioral1/files/0x0007000000015cb6-37.dat upx behavioral1/memory/324-233-0x0000000010000000-0x0000000010081000-memory.dmp upx behavioral1/files/0x0005000000019a84-231.dat upx behavioral1/memory/2368-247-0x00000000009A0000-0x0000000000BAA000-memory.dmp upx -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: syltools.exe File opened (read-only) \??\H: syltools.exe File opened (read-only) \??\J: syltools.exe File opened (read-only) \??\X: syltools.exe File opened (read-only) \??\Z: syltools.exe File opened (read-only) \??\B: syltools.exe File opened (read-only) \??\E: syltools.exe File opened (read-only) \??\N: syltools.exe File opened (read-only) \??\R: syltools.exe File opened (read-only) \??\V: syltools.exe File opened (read-only) \??\Y: syltools.exe File opened (read-only) \??\U: syltools.exe File opened (read-only) \??\W: syltools.exe File opened (read-only) \??\G: syltools.exe File opened (read-only) \??\I: syltools.exe File opened (read-only) \??\O: syltools.exe File opened (read-only) \??\P: syltools.exe File opened (read-only) \??\Q: syltools.exe File opened (read-only) \??\S: syltools.exe File opened (read-only) \??\K: syltools.exe File opened (read-only) \??\L: syltools.exe File opened (read-only) \??\M: syltools.exe File opened (read-only) \??\T: syltools.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2368-247-0x00000000009A0000-0x0000000000BAA000-memory.dmp autoit_exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created \??\c:\tools\autorun.inf 7z.exe File opened for modification \??\c:\tools\autorun.inf 7z.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 324 syltools.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2368 wrote to memory of 3048 2368 39f7e2b5de54745bbd54c098809633758732875d9fef2ac52af0c81abdccd482.exe 28 PID 2368 wrote to memory of 3048 2368 39f7e2b5de54745bbd54c098809633758732875d9fef2ac52af0c81abdccd482.exe 28 PID 2368 wrote to memory of 3048 2368 39f7e2b5de54745bbd54c098809633758732875d9fef2ac52af0c81abdccd482.exe 28 PID 2368 wrote to memory of 3048 2368 39f7e2b5de54745bbd54c098809633758732875d9fef2ac52af0c81abdccd482.exe 28 PID 2368 wrote to memory of 324 2368 39f7e2b5de54745bbd54c098809633758732875d9fef2ac52af0c81abdccd482.exe 30 PID 2368 wrote to memory of 324 2368 39f7e2b5de54745bbd54c098809633758732875d9fef2ac52af0c81abdccd482.exe 30 PID 2368 wrote to memory of 324 2368 39f7e2b5de54745bbd54c098809633758732875d9fef2ac52af0c81abdccd482.exe 30 PID 2368 wrote to memory of 324 2368 39f7e2b5de54745bbd54c098809633758732875d9fef2ac52af0c81abdccd482.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\39f7e2b5de54745bbd54c098809633758732875d9fef2ac52af0c81abdccd482.exe"C:\Users\Admin\AppData\Local\Temp\39f7e2b5de54745bbd54c098809633758732875d9fef2ac52af0c81abdccd482.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\7z.exeC:\Users\Admin\AppData\Local\Temp\7z.exe x C:\Users\Admin\AppData\Local\Temp\39f7e2b5de54745bbd54c098809633758732875d9fef2ac52af0c81abdccd482.exe -p18688699960 -y -oc:\tools2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops autorun.inf file
PID:3048
-
-
\??\c:\tools\syltools.exec:\tools\syltools.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of SetWindowsHookEx
PID:324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
919KB
MD5686e08ef0e632143fc4c2facb8072edd
SHA193af191a245bd3b542b3665a677cfd21f013efe8
SHA256154f32ef79bb84a5aae909211b4020f7ba5e362b650bcbc798bc432dafd459c1
SHA5121b1e0cf5bd539722a8e36f12769ab149640385d1d2761ecebc2bebeb4092a19e8407a900ffe9ab2c82a628ffd248633ce0fd454cd9c97cc49f076aa204c5532f
-
Filesize
380KB
MD5ace663ed10d3f87e729f934d724304ac
SHA1e3f2ae024a0667bdafd7d6360a8e4564bda0c5e6
SHA25640f8c340f112baa4f4902dd662f9d8af5416e94c16339c37a60ad3d468da7cba
SHA5122c12281313364658d674dd68905cd0ac23cc079f5488768004c62d9895d4686c87fbfe30ce3b1f3e229476277386b2e98bf961c6b60b8d1e4524a022909b79fa
-
Filesize
2.9MB
MD5ced916f666893d11a4a868254542f1ee
SHA183c2cef4f642683e7e14def976d827f417fb2752
SHA256fa6af994f4389d9856265d13c68c6c5d69eb0385e940570e6adb6e80f26a98ea
SHA512cbb14866545f8463174c327b6b5d8b82189cda6cf00b884b702bfe274bf22edced72027cd80f472566bfde449c21ae60ec56c95b88f6807d8ef6e25c72fa1f2a
-
Filesize
164KB
MD52667d1d118fe3e9f51f09fa9b5296233
SHA1ab31e106c118653a22895dc1ea1381d883e76db9
SHA25672acda706067a16ee03ebfdf0665f47ffaa893755ad210ee309f5934aa095833
SHA5126b41da8d756fff93a88cfbbb62791ca06680a74fc5b2ba291a74f26b5976b43354fbd96c91f17d8098216e7c584b7dfe354bbefaae397dffc34f48e3ed07177a
-
Filesize
148KB
MD510a2f663fdc511fd52bfcfd0a8837549
SHA1e3669af6eeb82c20b10245caa4974cb727b52bf0
SHA256bd5f2e4ac7c2bea616fa60a50698b0d6d46a9456c08392a5c62c340d6f738eeb
SHA5127e54bcce8f6813873db102f010431ad1ba83d554e9c368c598d428a1b8e6bc10f3622e559c0daa9d5b1740aa6fc08a5d97bc3f23217035b929a64b0399ce9830