Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
14/06/2024, 20:25
Static task
static1
Behavioral task
behavioral1
Sample
363aeefc9adb17cdc816347f4ce7ae519eb89e4ef2ab12f48da5401c5767802b.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
363aeefc9adb17cdc816347f4ce7ae519eb89e4ef2ab12f48da5401c5767802b.exe
Resource
win10v2004-20240508-en
General
-
Target
363aeefc9adb17cdc816347f4ce7ae519eb89e4ef2ab12f48da5401c5767802b.exe
-
Size
88KB
-
MD5
672986c018e259d92efb948d60fe0d50
-
SHA1
650b11fbd0d94cc539d94e13b462479e6a483a5c
-
SHA256
363aeefc9adb17cdc816347f4ce7ae519eb89e4ef2ab12f48da5401c5767802b
-
SHA512
173a99b17ccafc45d8de5c5646e66e73b89cc3f528be87b5f1c9094f155ecdf1cc2ce407397f8dc89582b33d2162fee61d65ea1a77dfc93c459c5a67e0f81cd0
-
SSDEEP
1536:ahUDofByDJWbMGcEFLPEPKOJUsy1+VMA:aIofBHbKMP0PvMA
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 7 IoCs
resource yara_rule behavioral1/memory/2588-140-0x0000000000400000-0x000000000040B000-memory.dmp UPX behavioral1/memory/2588-137-0x0000000000400000-0x000000000040B000-memory.dmp UPX behavioral1/memory/2588-142-0x0000000000400000-0x000000000040B000-memory.dmp UPX behavioral1/memory/2588-141-0x0000000000400000-0x000000000040B000-memory.dmp UPX behavioral1/memory/1572-312-0x0000000000400000-0x000000000040B000-memory.dmp UPX behavioral1/memory/2588-316-0x0000000000400000-0x000000000040B000-memory.dmp UPX behavioral1/memory/1572-336-0x0000000000400000-0x000000000040B000-memory.dmp UPX -
Executes dropped EXE 4 IoCs
pid Process 2216 explorer.exe 1572 explorer.exe 1988 explorer.exe 3056 explorer.exe -
Loads dropped DLL 5 IoCs
pid Process 2588 363aeefc9adb17cdc816347f4ce7ae519eb89e4ef2ab12f48da5401c5767802b.exe 2588 363aeefc9adb17cdc816347f4ce7ae519eb89e4ef2ab12f48da5401c5767802b.exe 2588 363aeefc9adb17cdc816347f4ce7ae519eb89e4ef2ab12f48da5401c5767802b.exe 2588 363aeefc9adb17cdc816347f4ce7ae519eb89e4ef2ab12f48da5401c5767802b.exe 2588 363aeefc9adb17cdc816347f4ce7ae519eb89e4ef2ab12f48da5401c5767802b.exe -
resource yara_rule behavioral1/memory/2588-140-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2588-137-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2588-135-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2588-142-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2588-141-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1572-312-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2588-316-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1572-336-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\Video Driver = "C:\\Users\\Admin\\AppData\\Roaming\\config\\explorer.exe" reg.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2104 set thread context of 2588 2104 363aeefc9adb17cdc816347f4ce7ae519eb89e4ef2ab12f48da5401c5767802b.exe 28 PID 2216 set thread context of 1572 2216 explorer.exe 33 PID 2216 set thread context of 1988 2216 explorer.exe 34 PID 1988 set thread context of 3056 1988 explorer.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe Token: SeDebugPrivilege 1572 explorer.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2104 363aeefc9adb17cdc816347f4ce7ae519eb89e4ef2ab12f48da5401c5767802b.exe 2588 363aeefc9adb17cdc816347f4ce7ae519eb89e4ef2ab12f48da5401c5767802b.exe 2216 explorer.exe 1572 explorer.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2588 2104 363aeefc9adb17cdc816347f4ce7ae519eb89e4ef2ab12f48da5401c5767802b.exe 28 PID 2104 wrote to memory of 2588 2104 363aeefc9adb17cdc816347f4ce7ae519eb89e4ef2ab12f48da5401c5767802b.exe 28 PID 2104 wrote to memory of 2588 2104 363aeefc9adb17cdc816347f4ce7ae519eb89e4ef2ab12f48da5401c5767802b.exe 28 PID 2104 wrote to memory of 2588 2104 363aeefc9adb17cdc816347f4ce7ae519eb89e4ef2ab12f48da5401c5767802b.exe 28 PID 2104 wrote to memory of 2588 2104 363aeefc9adb17cdc816347f4ce7ae519eb89e4ef2ab12f48da5401c5767802b.exe 28 PID 2104 wrote to memory of 2588 2104 363aeefc9adb17cdc816347f4ce7ae519eb89e4ef2ab12f48da5401c5767802b.exe 28 PID 2104 wrote to memory of 2588 2104 363aeefc9adb17cdc816347f4ce7ae519eb89e4ef2ab12f48da5401c5767802b.exe 28 PID 2104 wrote to memory of 2588 2104 363aeefc9adb17cdc816347f4ce7ae519eb89e4ef2ab12f48da5401c5767802b.exe 28 PID 2588 wrote to memory of 1248 2588 363aeefc9adb17cdc816347f4ce7ae519eb89e4ef2ab12f48da5401c5767802b.exe 29 PID 2588 wrote to memory of 1248 2588 363aeefc9adb17cdc816347f4ce7ae519eb89e4ef2ab12f48da5401c5767802b.exe 29 PID 2588 wrote to memory of 1248 2588 363aeefc9adb17cdc816347f4ce7ae519eb89e4ef2ab12f48da5401c5767802b.exe 29 PID 2588 wrote to memory of 1248 2588 363aeefc9adb17cdc816347f4ce7ae519eb89e4ef2ab12f48da5401c5767802b.exe 29 PID 1248 wrote to memory of 2452 1248 cmd.exe 31 PID 1248 wrote to memory of 2452 1248 cmd.exe 31 PID 1248 wrote to memory of 2452 1248 cmd.exe 31 PID 1248 wrote to memory of 2452 1248 cmd.exe 31 PID 2588 wrote to memory of 2216 2588 363aeefc9adb17cdc816347f4ce7ae519eb89e4ef2ab12f48da5401c5767802b.exe 32 PID 2588 wrote to memory of 2216 2588 363aeefc9adb17cdc816347f4ce7ae519eb89e4ef2ab12f48da5401c5767802b.exe 32 PID 2588 wrote to memory of 2216 2588 363aeefc9adb17cdc816347f4ce7ae519eb89e4ef2ab12f48da5401c5767802b.exe 32 PID 2588 wrote to memory of 2216 2588 363aeefc9adb17cdc816347f4ce7ae519eb89e4ef2ab12f48da5401c5767802b.exe 32 PID 2216 wrote to memory of 1572 2216 explorer.exe 33 PID 2216 wrote to memory of 1572 2216 explorer.exe 33 PID 2216 wrote to memory of 1572 2216 explorer.exe 33 PID 2216 wrote to memory of 1572 2216 explorer.exe 33 PID 2216 wrote to memory of 1572 2216 explorer.exe 33 PID 2216 wrote to memory of 1572 2216 explorer.exe 33 PID 2216 wrote to memory of 1572 2216 explorer.exe 33 PID 2216 wrote to memory of 1572 2216 explorer.exe 33 PID 2216 wrote to memory of 1988 2216 explorer.exe 34 PID 2216 wrote to memory of 1988 2216 explorer.exe 34 PID 2216 wrote to memory of 1988 2216 explorer.exe 34 PID 2216 wrote to memory of 1988 2216 explorer.exe 34 PID 2216 wrote to memory of 1988 2216 explorer.exe 34 PID 2216 wrote to memory of 1988 2216 explorer.exe 34 PID 2216 wrote to memory of 1988 2216 explorer.exe 34 PID 2216 wrote to memory of 1988 2216 explorer.exe 34 PID 1988 wrote to memory of 3056 1988 explorer.exe 35 PID 1988 wrote to memory of 3056 1988 explorer.exe 35 PID 1988 wrote to memory of 3056 1988 explorer.exe 35 PID 1988 wrote to memory of 3056 1988 explorer.exe 35 PID 1988 wrote to memory of 3056 1988 explorer.exe 35 PID 1988 wrote to memory of 3056 1988 explorer.exe 35 PID 1988 wrote to memory of 3056 1988 explorer.exe 35 PID 1988 wrote to memory of 3056 1988 explorer.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\363aeefc9adb17cdc816347f4ce7ae519eb89e4ef2ab12f48da5401c5767802b.exe"C:\Users\Admin\AppData\Local\Temp\363aeefc9adb17cdc816347f4ce7ae519eb89e4ef2ab12f48da5401c5767802b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\363aeefc9adb17cdc816347f4ce7ae519eb89e4ef2ab12f48da5401c5767802b.exe"C:\Users\Admin\AppData\Local\Temp\363aeefc9adb17cdc816347f4ce7ae519eb89e4ef2ab12f48da5401c5767802b.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\POAJA.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Video Driver" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\config\explorer.exe" /f4⤵
- Adds Run key to start application
PID:2452
-
-
-
C:\Users\Admin\AppData\Roaming\config\explorer.exe"C:\Users\Admin\AppData\Roaming\config\explorer.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Roaming\config\explorer.exe"C:\Users\Admin\AppData\Roaming\config\explorer.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1572
-
-
C:\Users\Admin\AppData\Roaming\config\explorer.exe"C:\Users\Admin\AppData\Roaming\config\explorer.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Roaming\config\explorer.exe"C:\Users\Admin\AppData\Roaming\config\explorer.exe"5⤵
- Executes dropped EXE
PID:3056
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
149B
MD5fc1798b7c7938454220fda837a76f354
SHA1b232912930b2bc24ff18bf7ecd58f872bbe01ea0
SHA2567f0a5917b5aca9c5beb153aad0ef95bf0aeafb83768da5b086c3f029ba42d7c8
SHA512d1abdd45a8e5d33893b9d19424174a07feed145d2e6b4be318ab5fde503f850579a4a101a010f30e16ecde2c7123f45357a8341214655321ee0f0097ca911331
-
Filesize
88KB
MD5aa7c429b2fe5028b1e7e573bb98334cf
SHA1ffd657e864ea0b44477f3891c7004f8880d1bf29
SHA256d4dd9c28867852fe0c60b38a33655b9f49e1ff24f187c6e215db524bf6cd9fbb
SHA5126084105b4dc3f95bd6087e42beb689d5274a8680fc1d7dc296d8145afd1547f0fbf947dd2d204bd0db673a83fa74ded1b91985ea6c9b4231f58c98fed239eeb4