Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 01:27
Static task
static1
Behavioral task
behavioral1
Sample
31c14cdf08f79c8dd23da19ea5913c8d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
31c14cdf08f79c8dd23da19ea5913c8d.exe
Resource
win10v2004-20240508-en
General
-
Target
31c14cdf08f79c8dd23da19ea5913c8d.exe
-
Size
36.7MB
-
MD5
31c14cdf08f79c8dd23da19ea5913c8d
-
SHA1
024d9bf8c6416d201e132eae3d82e7d3de804b5c
-
SHA256
19e4b8511307b215721c7c6a7150bfca078045360d258355f7e172a0a357ec43
-
SHA512
8c1d2e69cd42234553ec4bc28fad79dd4b739b134073162084c19ec13f400d4fd167af39612a3edb611cd9e70ee504f05f77625f5cb4b6c2cd6e3c354657df9f
-
SSDEEP
786432:pDsCef8iSTCkgTVaG79BNQUN36YP/+W6B36hMx02DouwT:pD8w2Z79B+UN36K+WU6D2kuw
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2240 31c14cdf08f79c8dd23da19ea5913c8d.tmp 2616 7z.exe 2752 7z.exe -
Loads dropped DLL 9 IoCs
pid Process 2012 31c14cdf08f79c8dd23da19ea5913c8d.exe 2240 31c14cdf08f79c8dd23da19ea5913c8d.tmp 2240 31c14cdf08f79c8dd23da19ea5913c8d.tmp 2240 31c14cdf08f79c8dd23da19ea5913c8d.tmp 2644 Process not Found 2616 7z.exe 2240 31c14cdf08f79c8dd23da19ea5913c8d.tmp 2564 Process not Found 2752 7z.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main 31c14cdf08f79c8dd23da19ea5913c8d.tmp Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 31c14cdf08f79c8dd23da19ea5913c8d.tmp Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" 31c14cdf08f79c8dd23da19ea5913c8d.tmp -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeRestorePrivilege 2616 7z.exe Token: 35 2616 7z.exe Token: SeSecurityPrivilege 2616 7z.exe Token: SeSecurityPrivilege 2616 7z.exe Token: SeRestorePrivilege 2752 7z.exe Token: 35 2752 7z.exe Token: SeSecurityPrivilege 2752 7z.exe Token: SeSecurityPrivilege 2752 7z.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2240 31c14cdf08f79c8dd23da19ea5913c8d.tmp 2240 31c14cdf08f79c8dd23da19ea5913c8d.tmp -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2240 2012 31c14cdf08f79c8dd23da19ea5913c8d.exe 28 PID 2012 wrote to memory of 2240 2012 31c14cdf08f79c8dd23da19ea5913c8d.exe 28 PID 2012 wrote to memory of 2240 2012 31c14cdf08f79c8dd23da19ea5913c8d.exe 28 PID 2012 wrote to memory of 2240 2012 31c14cdf08f79c8dd23da19ea5913c8d.exe 28 PID 2012 wrote to memory of 2240 2012 31c14cdf08f79c8dd23da19ea5913c8d.exe 28 PID 2012 wrote to memory of 2240 2012 31c14cdf08f79c8dd23da19ea5913c8d.exe 28 PID 2012 wrote to memory of 2240 2012 31c14cdf08f79c8dd23da19ea5913c8d.exe 28 PID 2240 wrote to memory of 2616 2240 31c14cdf08f79c8dd23da19ea5913c8d.tmp 29 PID 2240 wrote to memory of 2616 2240 31c14cdf08f79c8dd23da19ea5913c8d.tmp 29 PID 2240 wrote to memory of 2616 2240 31c14cdf08f79c8dd23da19ea5913c8d.tmp 29 PID 2240 wrote to memory of 2616 2240 31c14cdf08f79c8dd23da19ea5913c8d.tmp 29 PID 2240 wrote to memory of 2752 2240 31c14cdf08f79c8dd23da19ea5913c8d.tmp 31 PID 2240 wrote to memory of 2752 2240 31c14cdf08f79c8dd23da19ea5913c8d.tmp 31 PID 2240 wrote to memory of 2752 2240 31c14cdf08f79c8dd23da19ea5913c8d.tmp 31 PID 2240 wrote to memory of 2752 2240 31c14cdf08f79c8dd23da19ea5913c8d.tmp 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\31c14cdf08f79c8dd23da19ea5913c8d.exe"C:\Users\Admin\AppData\Local\Temp\31c14cdf08f79c8dd23da19ea5913c8d.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\is-ELGLI.tmp\31c14cdf08f79c8dd23da19ea5913c8d.tmp"C:\Users\Admin\AppData\Local\Temp\is-ELGLI.tmp\31c14cdf08f79c8dd23da19ea5913c8d.tmp" /SL5="$5014E,37611458,1148416,C:\Users\Admin\AppData\Local\Temp\31c14cdf08f79c8dd23da19ea5913c8d.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\is-G65KI.tmp\7z.exe"C:\Users\Admin\AppData\Local\Temp\is-G65KI.tmp\7z.exe" x C:\Users\Admin\AppData\Local\Temp\is-G65KI.tmp\2TGOTUHZV.7z -pqwerty0987 -oC:\Users\Admin\AppData\Local\Temp\is-G65KI.tmp\CDD1A1C7-191B-7BC1-5C7D-33473DD19D8F3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
C:\Users\Admin\AppData\Local\Temp\is-G65KI.tmp\7z.exe"C:\Users\Admin\AppData\Local\Temp\is-G65KI.tmp\7z.exe" x C:\Users\Admin\AppData\Local\Temp\is-G65KI.tmp\DBQM4FAUZ.7z -pqwerty0987 -oC:\Users\Admin\AppData\Local\Temp\is-G65KI.tmp\CDD1A1C7-191B-7BC1-5C7D-33473DD19D8F3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
499KB
MD53175cec55609ca0f6b8ec96519a77c47
SHA119ad5d8e54f573f9eab9315fda4fa8474adc10ea
SHA256dc552ce2e691dad50b2ff62197928a9c34bf2bf2a14e7b16bd76a18275e3fe00
SHA5128d72da712206721ac4c11663f0b04284d3d067f135fde30f8ae50c1e764a1663f4e7f9916c3ec721bebab2c0b9b43d68a9b8104266920743ce96e5ca89ef1140
-
Filesize
1.7MB
MD56416fc6c11f5775f474607ee7eec2935
SHA14d1703ee174f5f6b20274864ec2cb1c6b6c8529b
SHA256ed594e74aa38cdb08d38807eb626b28ffd9eb8c73f75b303031598963331ff55
SHA512816725ea67f43041692a58e6fec75c9485cc8fe56cf97894b6b6e570ad18863edd9d7d047aaca33d8c93af26913bd1f7e1da10b869dab981d7626a3b0920d1bf
-
C:\Users\Admin\AppData\Local\Temp\is-G65KI.tmp\CDD1A1C7-191B-7BC1-5C7D-33473DD19D8F\Install\info.xml
Filesize1KB
MD5f1a0d79bc6bcbb684b634a22a6e4b892
SHA13e25c55cd492509f159cc22b5e1638949e502a63
SHA25611599d4b685ed4af5a28ffb8b9793cecfa0f069084e053d95020d7be60aa9f69
SHA51291897508e0f9cb6ba926a933250cfa6a56742b7540bf260d953e4f77301a62a6f678827bf655abed644b2fd822107c61da24b0b0237b743adabfa5e8ba3177cd
-
C:\Users\Admin\AppData\Local\Temp\is-G65KI.tmp\CDD1A1C7-191B-7BC1-5C7D-33473DD19D8F\install\0\offer0.html
Filesize16KB
MD56ac56705899b7e41664135444ae3b736
SHA104cd5dc01cdc322b79ef8309e4ccdc852871c327
SHA2564b6f5643ef970105bf33ae47d53001fdbeb939b79d22acc77124a98c9c38d6d4
SHA512c5884f4a8bf1e6ab7aa6bf7f680a527cfc31ff5ad7b7834cce6d673b4b316dfbf55358042528692f3448369cc169d46bc014241e602c4f2c4fd4e666b0fe5a46
-
Filesize
32.4MB
MD50ba639980fbb48eb931a461b2953974d
SHA198143706e9f5568411b56d139013349fafcd1573
SHA256b4193b80034515e841c7599522c38e6e8db227216b784ebef7dc89af80ae65f9
SHA512b700ac29f6a12ecba8bdf700197d6a6ffb2a52bb192c3236c59fead6068c2f2d93df52d1fe348659006ab3c0206da9aebd5e5114e6ce9d988a782e9ea6fd6bd1
-
Filesize
3.2MB
MD5cbf5b2bddfd6a5bffd958e11427abc41
SHA1f6d675d9f600f0934fae373762f2901bf72b312c
SHA25643982e6d11f2be798d0d3317dbd337d55b48a63f4400964fdf906556aebde1ba
SHA512d1db4894656e910d5ca26073df07b287d91f0dd91e855419a7308e6b4390929dc0d8cf36b72e865aa49942904e5eaf5c59572f47221f4e2f87f266405d112ba8
-
Filesize
532KB
MD5ed53b28ab53811c06879e8fc5e1000ce
SHA1e4e4d66639097862a59410decf5db146ceaa5d19
SHA2567135e78794c5ceacb094afcadca57755cc3801591552776f1a717bbdd65605a7
SHA512be92e468682ee681436c31d8f39db6585185bf8f8adefae8f6646b65c7e9339e54a027ac7e63d9356cb4602d5020664b023a74486c4da629cdc97b5cff61985f
-
Filesize
28KB
MD5077cb4461a2767383b317eb0c50f5f13
SHA1584e64f1d162398b7f377ce55a6b5740379c4282
SHA2568287d0e287a66ee78537c8d1d98e426562b95c50f569b92cea9ce36a9fa57e64
SHA512b1fcb0265697561ef497e6a60fcee99dc5ea0cf02b4010da9f5ed93bce88bdfea6bfe823a017487b8059158464ea29636aad8e5f9dd1e8b8a1b6eaaab670e547
-
Filesize
2.2MB
MD5c663759adbcf6c47f9fec3a835a97c92
SHA14fb9b1f6ec51d4c3674977020c1723f6641e07d7
SHA2561e9b2bf3b80fe61a32f66097fd371db197ddde1a2ea5b6120f7b39f76a186288
SHA512afd0661b7f70d22e147affc9fe20ee9df8a2234ce3c23e8a262d2e9c148317caf19d9c68d77aba02151774bb55d316b0316719b9e5cc6cff54bb4fcad258ee20