Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12/06/2024, 07:27
Behavioral task
behavioral1
Sample
fe8c86095397635bfbc612c50e9d365607c904aef8f94151a59c01ea6f65a552.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
fe8c86095397635bfbc612c50e9d365607c904aef8f94151a59c01ea6f65a552.exe
Resource
win10v2004-20240508-en
General
-
Target
fe8c86095397635bfbc612c50e9d365607c904aef8f94151a59c01ea6f65a552.exe
-
Size
134KB
-
MD5
94e7c44026616a36ad658e2d93ec77ee
-
SHA1
71e645d14569d3acf51e64d39eb30cc098c27b58
-
SHA256
fe8c86095397635bfbc612c50e9d365607c904aef8f94151a59c01ea6f65a552
-
SHA512
c2b3cc328b9d787b0e5a722aec3c3d2ad02b60054dfa55b586bca757aedbfec380097990f4a9fe23799f7ac5b875c567f1465044d2fda93395d5eaca6ab36a22
-
SSDEEP
1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38QZ:riAyLN9aa+9U2rW1ip6pr2At7NZuQZ
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 7 IoCs
resource yara_rule behavioral1/memory/2268-0-0x0000000000840000-0x0000000000868000-memory.dmp UPX behavioral1/files/0x000b000000012303-6.dat UPX behavioral1/memory/956-7-0x0000000000020000-0x0000000000048000-memory.dmp UPX behavioral1/memory/2268-4-0x0000000000200000-0x0000000000228000-memory.dmp UPX behavioral1/memory/2268-8-0x0000000000840000-0x0000000000868000-memory.dmp UPX behavioral1/memory/956-9-0x0000000000020000-0x0000000000048000-memory.dmp UPX behavioral1/memory/2268-10-0x0000000000840000-0x0000000000868000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 956 WwanSvc.exe -
Loads dropped DLL 1 IoCs
pid Process 2268 fe8c86095397635bfbc612c50e9d365607c904aef8f94151a59c01ea6f65a552.exe -
resource yara_rule behavioral1/memory/2268-0-0x0000000000840000-0x0000000000868000-memory.dmp upx behavioral1/files/0x000b000000012303-6.dat upx behavioral1/memory/956-7-0x0000000000020000-0x0000000000048000-memory.dmp upx behavioral1/memory/2268-4-0x0000000000200000-0x0000000000228000-memory.dmp upx behavioral1/memory/2268-8-0x0000000000840000-0x0000000000868000-memory.dmp upx behavioral1/memory/956-9-0x0000000000020000-0x0000000000048000-memory.dmp upx behavioral1/memory/2268-10-0x0000000000840000-0x0000000000868000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\WwanSvc.exe\" /run" fe8c86095397635bfbc612c50e9d365607c904aef8f94151a59c01ea6f65a552.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2268 wrote to memory of 956 2268 fe8c86095397635bfbc612c50e9d365607c904aef8f94151a59c01ea6f65a552.exe 28 PID 2268 wrote to memory of 956 2268 fe8c86095397635bfbc612c50e9d365607c904aef8f94151a59c01ea6f65a552.exe 28 PID 2268 wrote to memory of 956 2268 fe8c86095397635bfbc612c50e9d365607c904aef8f94151a59c01ea6f65a552.exe 28 PID 2268 wrote to memory of 956 2268 fe8c86095397635bfbc612c50e9d365607c904aef8f94151a59c01ea6f65a552.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe8c86095397635bfbc612c50e9d365607c904aef8f94151a59c01ea6f65a552.exe"C:\Users\Admin\AppData\Local\Temp\fe8c86095397635bfbc612c50e9d365607c904aef8f94151a59c01ea6f65a552.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\ProgramData\Update\WwanSvc.exe"C:\ProgramData\Update\WwanSvc.exe" /run2⤵
- Executes dropped EXE
PID:956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5a0f9fb47578a9d267d1c171a9580ad6d
SHA11c2d9b3c83f1e408fa70ef0626aad66599d3aaba
SHA256051fb5d1bb7ac930a76aa737c6d39d15f77a11d984a7986ad98d5cbe8244324b
SHA5128336ffec18cd311bf4e40272bc668929c8cdb2b36496ca7ba6a530a539878cd5387ac5237f2368c979819da4e67e1d84ff46f92972eb238b904863943bd7c2e1