Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/06/2024, 04:29
Static task
static1
Behavioral task
behavioral1
Sample
e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe
Resource
win10v2004-20240226-en
General
-
Target
e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe
-
Size
73KB
-
MD5
36a0c576ea687f2b0ffc6ff094d1f6e2
-
SHA1
d7fdf6561d3cac7057a7dd2aa64c89278bd906b4
-
SHA256
e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57
-
SHA512
a10e9f92aa03a0b69382e006c776eba00cf7e8a9d0f6897b2aa78ee0374cfc0b749616bb341c534f1f25c6e9d326f5b9203577f0a7a1cb3ee0cf90a04e05c8fd
-
SSDEEP
768:agO5xRYi+SfSWHHNvvG5bnl/NqNwsKVDstHxYD0p1aXKynF0vQmYZS0HdJnfWOE:RshfSWHHNvoLqNwDDGw02eQmh0HjWOE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2992 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 1524 e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe 1524 e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\¢«.exe e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe File created C:\Windows\SysWOW64\notepad¢¬.exe e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe File opened for modification C:\Windows\SysWOW64\¢«.exe e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe File created C:\Windows\system\rundll32.exe e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1717993776" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1717993776" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1524 e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe 1524 e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe 1524 e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe 1524 e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe 1524 e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe 1524 e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe 1524 e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe 1524 e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe 1524 e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe 1524 e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe 1524 e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe 1524 e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe 1524 e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe 1524 e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2992 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1524 e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe 2992 rundll32.exe 2992 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1524 wrote to memory of 2992 1524 e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe 28 PID 1524 wrote to memory of 2992 1524 e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe 28 PID 1524 wrote to memory of 2992 1524 e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe 28 PID 1524 wrote to memory of 2992 1524 e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe 28 PID 1524 wrote to memory of 2992 1524 e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe 28 PID 1524 wrote to memory of 2992 1524 e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe 28 PID 1524 wrote to memory of 2992 1524 e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe"C:\Users\Admin\AppData\Local\Temp\e003b9ab60a0ecd5528e9de8d6f5846138cb5d1e79d63e513b480f79da59db57.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2992
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD5f42ab326d8ca832af681e3ccb51f0392
SHA1cd86ed12b7376ccb3fa05f6f13a432083a1842b9
SHA2560358e1f08e4568e668edd40eccb46e9f71ee489e224750ffba0466bed9b5385e
SHA51277b3fed82dff587a77ca92e3998eb720037cd54dae19c3e384da061eaadb1ab550fe07ee5d400ba26c505dd4928ab316aef471033d4990ffcc786ca84cdc9dd8
-
Filesize
79KB
MD51c69ce0f550936b1a8cf9231e2e5ce63
SHA153d1ae3990d377111a9c6e6e86e3aa2c5628801b
SHA2562199de2332823e1dd7cfa7be745dc1d6d1bbb11d3c87a07c9c0ecbd7f9639239
SHA51246ff1803eb679f63ae5330c5fa05235f6850d215bde8129be96de42ef3d353c910fb48cd4a059b540c0f9645c435e89e977dc66a5a5d406644ad5e56c439aa65