Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 03:59
Static task
static1
Behavioral task
behavioral1
Sample
e8a5b2b11dc992e27b289dc6576039454f76a471ef6a2fc63c545f5299b01e3f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e8a5b2b11dc992e27b289dc6576039454f76a471ef6a2fc63c545f5299b01e3f.exe
Resource
win10v2004-20240508-en
General
-
Target
e8a5b2b11dc992e27b289dc6576039454f76a471ef6a2fc63c545f5299b01e3f.exe
-
Size
12KB
-
MD5
7f3b36803cad4ef33701fa937a792eb9
-
SHA1
e7eaa8dd6b6abbdd2f0e1a6979a62e37dd0b9063
-
SHA256
e8a5b2b11dc992e27b289dc6576039454f76a471ef6a2fc63c545f5299b01e3f
-
SHA512
7e0aee2b2e17bc9d8b40515a4e1ed4713806f192fc5508304294de937584dd99e9b605e3363ab45b881ddab6aab8eab0c234f05788f4cd8cc30cfd542d06e26a
-
SSDEEP
384:XL7li/2zseq2DcEQvdhcJKLTp/NK9xavw:blM/Q9cvw
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2500 tmp9992.tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 2500 tmp9992.tmp.exe -
Loads dropped DLL 1 IoCs
pid Process 2684 e8a5b2b11dc992e27b289dc6576039454f76a471ef6a2fc63c545f5299b01e3f.exe -
Uses the VBS compiler for execution 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2684 e8a5b2b11dc992e27b289dc6576039454f76a471ef6a2fc63c545f5299b01e3f.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2684 wrote to memory of 3028 2684 e8a5b2b11dc992e27b289dc6576039454f76a471ef6a2fc63c545f5299b01e3f.exe 28 PID 2684 wrote to memory of 3028 2684 e8a5b2b11dc992e27b289dc6576039454f76a471ef6a2fc63c545f5299b01e3f.exe 28 PID 2684 wrote to memory of 3028 2684 e8a5b2b11dc992e27b289dc6576039454f76a471ef6a2fc63c545f5299b01e3f.exe 28 PID 2684 wrote to memory of 3028 2684 e8a5b2b11dc992e27b289dc6576039454f76a471ef6a2fc63c545f5299b01e3f.exe 28 PID 3028 wrote to memory of 2484 3028 vbc.exe 30 PID 3028 wrote to memory of 2484 3028 vbc.exe 30 PID 3028 wrote to memory of 2484 3028 vbc.exe 30 PID 3028 wrote to memory of 2484 3028 vbc.exe 30 PID 2684 wrote to memory of 2500 2684 e8a5b2b11dc992e27b289dc6576039454f76a471ef6a2fc63c545f5299b01e3f.exe 31 PID 2684 wrote to memory of 2500 2684 e8a5b2b11dc992e27b289dc6576039454f76a471ef6a2fc63c545f5299b01e3f.exe 31 PID 2684 wrote to memory of 2500 2684 e8a5b2b11dc992e27b289dc6576039454f76a471ef6a2fc63c545f5299b01e3f.exe 31 PID 2684 wrote to memory of 2500 2684 e8a5b2b11dc992e27b289dc6576039454f76a471ef6a2fc63c545f5299b01e3f.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8a5b2b11dc992e27b289dc6576039454f76a471ef6a2fc63c545f5299b01e3f.exe"C:\Users\Admin\AppData\Local\Temp\e8a5b2b11dc992e27b289dc6576039454f76a471ef6a2fc63c545f5299b01e3f.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\kdyjte2u\kdyjte2u.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9DD5.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE51D299FADED462A8BD3A1311729BCF2.TMP"3⤵PID:2484
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp9992.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp9992.tmp.exe" C:\Users\Admin\AppData\Local\Temp\e8a5b2b11dc992e27b289dc6576039454f76a471ef6a2fc63c545f5299b01e3f.exe2⤵
- Deletes itself
- Executes dropped EXE
PID:2500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD59a29a8fed9d25190f568adf99035d363
SHA175ca49ca3a336eb8b136f4daaaf6d49f7d30afdf
SHA25691b93c3cc7dd834647db34d79f4d5b27edbadaefab11518abeec2251d2aec49c
SHA5127ce03311cd3e1bcb360072c4160df5554dcd9523e5adcb7e2faf2be52eb0b33d0e703525d3ea5c21b161848bf472225407f13efab13a6c4a64648aaf752ee57b
-
Filesize
1KB
MD521cc886ed0ea6686cbfb90e51bc98d9a
SHA194ed39434a5d7dac60c7752c47cdd9ed787c500f
SHA256cfa72d8687ae6f3f7f65a92c21053f90e7b734fc214d0a54d58fd690b44262cd
SHA512c9f95af76da1a3716c47d65879d30aeae87f03a54a40506840d19b8e151cafd39bebe828eab0ee35ef94d0311d3e73655382a97e20b500eb3579374f247ae941
-
Filesize
2KB
MD5a689b2f458f5c62440090d182b3e529f
SHA1d576219b816d8555e202ebaca082acb077340531
SHA2561188c8c7115e6cd0e05b3164be0861cbcc19cae4e67a0b4988516d6ea195114f
SHA5127bbc69c49590a04114b096e2b969fcff0a7bb2987c06ed348bd50b815fb122261f233efa78312cb51d4cf4ac69d1ff55d0c8bb334ebfa8f9635146fdd3fe9254
-
Filesize
273B
MD50d94c2458b568b4452898951b593cc1a
SHA1b76694e0a57ab08d0f2c862c20c53a6fa65bb6c7
SHA256c235c07fbc44e7aa941aab464873fef03f11ff8c18a172d2983889867b2543f0
SHA51222385ca803ddd2e12f79e3da55c0dc81eebb08f64587cffbe2b54485246e49edf3cb2c93c110187502876af84567286240fcfbf54182f0fcfe0e2f1bb8f969b8
-
Filesize
1KB
MD5958b3f654037d234bd639cd75206c4cc
SHA1c42c065e946076d20af4d4de525715d1ff689120
SHA256c8812b1e0c68196c8007ede483879f32cc3865876952b4e7e376d43ff78471f0
SHA512ea4f227189aeed6030fa707f6c223ea91253ac523214755cc5ae6c18b8b2aa009489efc11ec8ac6716d7f6cd1c7817381bdbecf91e9048641224d66c4696dbf6
-
Filesize
12KB
MD57bd4bb3c0c78ecc61546077e8b3cc6f0
SHA1d2e8468e5c74085b1c68e1a373159fd3f3f2da8d
SHA256c835f161402699a303ef0fe8e5c4aa3fff96ddd7ee9d332a7acbf85c45a50409
SHA51276a25017d163b29e7feebb9e6a9af2733c81082df0219ace18258e9b145b943541419f528255ae354a82bcb6dea106195ad1ac4a550fe6fedf96c08590261c5a