Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 04:36
Static task
static1
Behavioral task
behavioral1
Sample
654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe
Resource
win10v2004-20240508-en
General
-
Target
654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe
-
Size
77KB
-
MD5
65b5c90bda5728c91cb427bff02b5a27
-
SHA1
f6e1cc9814a6df84cc1870e8b661ec3f4abe4484
-
SHA256
654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a
-
SHA512
12b839f8f5672e5602af317b029d1a9d4289af698d2f357f0cebb3b412206198cf9eeaa4fec2a59f0f9249a5b4be776d379befe92b639974393e5ec9c0a92196
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOyP2B:GhfxHNIreQm+HixP2B
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2548 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 1860 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe 1860 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\notepad¢¬.exe 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe File opened for modification C:\Windows\SysWOW64\¢«.exe 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe File created C:\Windows\SysWOW64\¢«.exe 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe File created C:\Windows\system\rundll32.exe 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1717130221" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1717130221" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1860 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe 1860 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe 1860 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe 1860 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe 1860 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe 1860 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe 1860 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe 1860 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe 1860 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe 1860 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe 1860 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe 1860 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe 1860 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe 1860 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2548 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1860 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe 2548 rundll32.exe 2548 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1860 wrote to memory of 2548 1860 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe 28 PID 1860 wrote to memory of 2548 1860 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe 28 PID 1860 wrote to memory of 2548 1860 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe 28 PID 1860 wrote to memory of 2548 1860 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe 28 PID 1860 wrote to memory of 2548 1860 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe 28 PID 1860 wrote to memory of 2548 1860 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe 28 PID 1860 wrote to memory of 2548 1860 654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe"C:\Users\Admin\AppData\Local\Temp\654e905745a48a3b797e31ccfb4ad6fd5b2988529e03f9813a8d0698b419244a.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75KB
MD5d1363978bf216165c293365dcd656dc2
SHA1259883947380fc7235fbda06fb08455b97cbb2a5
SHA256f474fdfd181e9aed1f765dabdb20e680aaf5395b3c35dcbde16945683b0b63d7
SHA5127b397202c4566bf0b0486e5c219ceb0208983d28f58fd1a763993ae6425b4a8c83c2b682e49f3ca670957589eeddb8927cf674d3acf27f9884d8063a091c2cd8
-
Filesize
81KB
MD59d617daf9a1016e98be0b591cef49162
SHA1bf5163796934212a73fb15544f2f6637393385e2
SHA256eaf80e0058068ca1c6c15c2dc302e450961cb4621be5d974132ceef076491e3f
SHA5122a1b702eff0bd1c7e84cfb5555d78e28b7329027116383502e8bc783b41af1588ee9ab0e4d92aa4e6f82082749575261d3d780a4f0b49435c5b2f16954b7c25f