Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 19:29
Static task
static1
Behavioral task
behavioral1
Sample
fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe
Resource
win10v2004-20240508-en
General
-
Target
fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe
-
Size
82KB
-
MD5
d1b3dcad86a122f2f0f72198bec7b8e6
-
SHA1
f6f4d5206d815abee8d95f75aff239465107bfa8
-
SHA256
fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504
-
SHA512
31909d3962390688220434f72d7794826fbd3d26602630957cb9a05adc107e3f5b9fdca1bd51e79f0861d01644dfe2578bf2d91b75cdb8d5ade0082bab0fa180
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOXeMwY:GhfxHNIreQm+HiueMwY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2512 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 2080 fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe 2080 fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\¢«.exe fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe File created C:\Windows\SysWOW64\¢«.exe fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe File created C:\Windows\SysWOW64\notepad¢¬.exe fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe File created C:\Windows\system\rundll32.exe fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\MSipv fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1717615775" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1717615775" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2080 fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe 2080 fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe 2080 fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe 2080 fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe 2080 fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe 2080 fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe 2080 fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe 2080 fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe 2080 fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe 2080 fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe 2080 fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe 2080 fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe 2080 fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe 2080 fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2512 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2080 fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe 2512 rundll32.exe 2512 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2512 2080 fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe 28 PID 2080 wrote to memory of 2512 2080 fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe 28 PID 2080 wrote to memory of 2512 2080 fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe 28 PID 2080 wrote to memory of 2512 2080 fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe 28 PID 2080 wrote to memory of 2512 2080 fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe 28 PID 2080 wrote to memory of 2512 2080 fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe 28 PID 2080 wrote to memory of 2512 2080 fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe"C:\Users\Admin\AppData\Local\Temp\fb2a529cdc5b906d5145b015e2d6e5fc1191b8da5a0a2f56786e6824ada19504.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82KB
MD5e728906194852a03f335d118232a4803
SHA1b3a422ece1458ac3e53fbca6b8ee3a2c74b8dd2d
SHA256c63b7fdd385b737ef90bb8ea5e648b4af0637bb1f4cae29d3d50b4de0964d945
SHA512e17ee218e38f1ed59a56c7929409d024e6b6bbc2dc7dece5bd5b2372489a003c4c41b9dad0046c5f153376ab00de65181bd5fbbc51921f91aebfe5f9c6fb8df7
-
Filesize
74KB
MD5838644551c1c7f65f43867292e207ee8
SHA181f66f34d25b9692eea3c3a02c7e2e2b63fc915f
SHA256600cc4ad54c76a6dde789444b8277db3d96da4b1269c05e823fbad3ce028714b
SHA512f8c8873090776d2a6cadec7b62dd4c98f18b306bff79c769e29c6b007348d18af01ab37103d98bc23c7263b937f5fbdfb40d065081ec08c0e6a6a45053cc0c36