Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 01:10
Static task
static1
Behavioral task
behavioral1
Sample
32eb98f1f7ac1afbb6973567bbb44da961ac9a34e81900878c7170a1099a82bd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
32eb98f1f7ac1afbb6973567bbb44da961ac9a34e81900878c7170a1099a82bd.exe
Resource
win10v2004-20240611-en
General
-
Target
32eb98f1f7ac1afbb6973567bbb44da961ac9a34e81900878c7170a1099a82bd.exe
-
Size
581KB
-
MD5
d52303578c29640c6b02ac49a2075ad3
-
SHA1
be0f1d767f91be2e7a9e1d89ab58a34f601a279b
-
SHA256
32eb98f1f7ac1afbb6973567bbb44da961ac9a34e81900878c7170a1099a82bd
-
SHA512
eec7136a6f29fde81bbaefbcac93e8234b5217928330862e2eae12162aec871c679d0a283095942e9d70c5d5f22691d0555c3b1e187ba06abb43fc3a89dd61e6
-
SSDEEP
12288:3Ny16BJzpPPQlR/wKBZbDVuQIcQ7YdSR5Y4F1V799C:d1JzpwlRoKbQ7oSRqqH79o
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 1856 powershell.exe -
Loads dropped DLL 2 IoCs
pid Process 1856 powershell.exe 2712 Syntaksfejls.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\kobberbrylluppers.dis 32eb98f1f7ac1afbb6973567bbb44da961ac9a34e81900878c7170a1099a82bd.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2712 Syntaksfejls.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1856 powershell.exe 2712 Syntaksfejls.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1856 set thread context of 2712 1856 powershell.exe 32 PID 2712 set thread context of 1204 2712 Syntaksfejls.exe 21 PID 2712 set thread context of 1484 2712 Syntaksfejls.exe 37 PID 1484 set thread context of 1204 1484 ctfmon.exe 21 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\resources\0409\Protoplasmaet.ini 32eb98f1f7ac1afbb6973567bbb44da961ac9a34e81900878c7170a1099a82bd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x000d000000014230-20.dat nsis_installer_1 behavioral1/files/0x000d000000014230-20.dat nsis_installer_2 -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 1856 powershell.exe 1856 powershell.exe 1856 powershell.exe 1856 powershell.exe 1856 powershell.exe 1856 powershell.exe 1856 powershell.exe 1856 powershell.exe 2712 Syntaksfejls.exe 2712 Syntaksfejls.exe 2712 Syntaksfejls.exe 2712 Syntaksfejls.exe 2712 Syntaksfejls.exe 2712 Syntaksfejls.exe 2712 Syntaksfejls.exe 2712 Syntaksfejls.exe 1484 ctfmon.exe 1484 ctfmon.exe 1484 ctfmon.exe 1484 ctfmon.exe 1484 ctfmon.exe 1484 ctfmon.exe 1484 ctfmon.exe 1484 ctfmon.exe 1484 ctfmon.exe 1484 ctfmon.exe 1484 ctfmon.exe 1484 ctfmon.exe 1484 ctfmon.exe 1484 ctfmon.exe 1484 ctfmon.exe 1484 ctfmon.exe 1484 ctfmon.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1856 powershell.exe 2712 Syntaksfejls.exe 2712 Syntaksfejls.exe 1484 ctfmon.exe 1484 ctfmon.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1856 powershell.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1856 2336 32eb98f1f7ac1afbb6973567bbb44da961ac9a34e81900878c7170a1099a82bd.exe 28 PID 2336 wrote to memory of 1856 2336 32eb98f1f7ac1afbb6973567bbb44da961ac9a34e81900878c7170a1099a82bd.exe 28 PID 2336 wrote to memory of 1856 2336 32eb98f1f7ac1afbb6973567bbb44da961ac9a34e81900878c7170a1099a82bd.exe 28 PID 2336 wrote to memory of 1856 2336 32eb98f1f7ac1afbb6973567bbb44da961ac9a34e81900878c7170a1099a82bd.exe 28 PID 1856 wrote to memory of 2704 1856 powershell.exe 30 PID 1856 wrote to memory of 2704 1856 powershell.exe 30 PID 1856 wrote to memory of 2704 1856 powershell.exe 30 PID 1856 wrote to memory of 2704 1856 powershell.exe 30 PID 1856 wrote to memory of 2712 1856 powershell.exe 32 PID 1856 wrote to memory of 2712 1856 powershell.exe 32 PID 1856 wrote to memory of 2712 1856 powershell.exe 32 PID 1856 wrote to memory of 2712 1856 powershell.exe 32 PID 1856 wrote to memory of 2712 1856 powershell.exe 32 PID 1856 wrote to memory of 2712 1856 powershell.exe 32 PID 2712 wrote to memory of 1484 2712 Syntaksfejls.exe 37 PID 2712 wrote to memory of 1484 2712 Syntaksfejls.exe 37 PID 2712 wrote to memory of 1484 2712 Syntaksfejls.exe 37 PID 2712 wrote to memory of 1484 2712 Syntaksfejls.exe 37
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\32eb98f1f7ac1afbb6973567bbb44da961ac9a34e81900878c7170a1099a82bd.exe"C:\Users\Admin\AppData\Local\Temp\32eb98f1f7ac1afbb6973567bbb44da961ac9a34e81900878c7170a1099a82bd.exe"2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Micropenis247=Get-Content 'C:\Users\Admin\AppData\Local\gannetry\Salle.Non';$Appellerede=$Micropenis247.SubString(68777,3);.$Appellerede($Micropenis247)"3⤵
- Command and Scripting Interpreter: PowerShell
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"4⤵PID:2704
-
-
C:\Users\Admin\AppData\Local\Temp\Syntaksfejls.exe"C:\Users\Admin\AppData\Local\Temp\Syntaksfejls.exe"4⤵
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\ctfmon.exe"C:\Windows\SysWOW64\ctfmon.exe"5⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:1484
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
329KB
MD5c822dd4362ec00c58bd764ae1b21eca4
SHA15da2aa6764581eb1c9c206f0f5da856fefa1b274
SHA256f841c821e161ee15b7983f5e83f712a4b39ecf92e55ce73bdf16a712d42b29a0
SHA512e66432334651e52186c5937546b334facd30c0af2a7344b7c8d369fd509de29ada2e7c5cee6561aa3f90174406e75b537d502c4e622c94cb6c9e17979059911e
-
Filesize
67KB
MD51597abb9389a3dc50e280f8c2e1a4cff
SHA1bbfac48e35c19284cc3431a40c1519beb854a250
SHA256aa36dfd548ae2c29a2bcd2aa2613e4e6bedebfb70536b778a5b65048eff8e94e
SHA51274ee87b4bc669acd7a3c2f640760b0c688e6a2f3b2b1d9870bcf14c87ed6d0d0d93e850170edf6240d2d52401e36fee92dccf2b6de611ebf6bd349df5a529517
-
Filesize
581KB
MD5d52303578c29640c6b02ac49a2075ad3
SHA1be0f1d767f91be2e7a9e1d89ab58a34f601a279b
SHA25632eb98f1f7ac1afbb6973567bbb44da961ac9a34e81900878c7170a1099a82bd
SHA512eec7136a6f29fde81bbaefbcac93e8234b5217928330862e2eae12162aec871c679d0a283095942e9d70c5d5f22691d0555c3b1e187ba06abb43fc3a89dd61e6