Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 02:21
Static task
static1
Behavioral task
behavioral1
Sample
563ca131a21ed75620f5e6874a180e20.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
563ca131a21ed75620f5e6874a180e20.exe
Resource
win10v2004-20240508-en
General
-
Target
563ca131a21ed75620f5e6874a180e20.exe
-
Size
31KB
-
MD5
563ca131a21ed75620f5e6874a180e20
-
SHA1
9fd5685f16bbac96f671a4a9d53217aab485fd92
-
SHA256
684d7931efcf8cbeb69602aec6806d5f4fd2ff76518be11cb9b91f41318de3a1
-
SHA512
74733876dcce9c347f01c37d9fb1120511c7478e5a99dbe39201e672f9977fa04d67d9c216f95049da68384390a07a5ba3f4920c0bdd7a9d73fb05e6346ab5b7
-
SSDEEP
768:PVEHJqjHyGvwFylDpulVSQJrE/2QmlCYZUTyn838d0o0:PH2nylslwHCCL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2872 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 2420 563ca131a21ed75620f5e6874a180e20.exe 2420 563ca131a21ed75620f5e6874a180e20.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 563ca131a21ed75620f5e6874a180e20.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 563ca131a21ed75620f5e6874a180e20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 563ca131a21ed75620f5e6874a180e20.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\¢«.exe 563ca131a21ed75620f5e6874a180e20.exe File created C:\Windows\SysWOW64\¢«.exe 563ca131a21ed75620f5e6874a180e20.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe 563ca131a21ed75620f5e6874a180e20.exe File created C:\Windows\SysWOW64\notepad¢¬.exe 563ca131a21ed75620f5e6874a180e20.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe 563ca131a21ed75620f5e6874a180e20.exe File created C:\Windows\system\rundll32.exe 563ca131a21ed75620f5e6874a180e20.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1718850067" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 563ca131a21ed75620f5e6874a180e20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" 563ca131a21ed75620f5e6874a180e20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" 563ca131a21ed75620f5e6874a180e20.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv 563ca131a21ed75620f5e6874a180e20.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 563ca131a21ed75620f5e6874a180e20.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command 563ca131a21ed75620f5e6874a180e20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 563ca131a21ed75620f5e6874a180e20.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1718850067" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2420 563ca131a21ed75620f5e6874a180e20.exe 2420 563ca131a21ed75620f5e6874a180e20.exe 2420 563ca131a21ed75620f5e6874a180e20.exe 2420 563ca131a21ed75620f5e6874a180e20.exe 2420 563ca131a21ed75620f5e6874a180e20.exe 2420 563ca131a21ed75620f5e6874a180e20.exe 2420 563ca131a21ed75620f5e6874a180e20.exe 2420 563ca131a21ed75620f5e6874a180e20.exe 2420 563ca131a21ed75620f5e6874a180e20.exe 2420 563ca131a21ed75620f5e6874a180e20.exe 2420 563ca131a21ed75620f5e6874a180e20.exe 2420 563ca131a21ed75620f5e6874a180e20.exe 2420 563ca131a21ed75620f5e6874a180e20.exe 2420 563ca131a21ed75620f5e6874a180e20.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2872 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2420 563ca131a21ed75620f5e6874a180e20.exe 2872 rundll32.exe 2872 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2872 2420 563ca131a21ed75620f5e6874a180e20.exe 28 PID 2420 wrote to memory of 2872 2420 563ca131a21ed75620f5e6874a180e20.exe 28 PID 2420 wrote to memory of 2872 2420 563ca131a21ed75620f5e6874a180e20.exe 28 PID 2420 wrote to memory of 2872 2420 563ca131a21ed75620f5e6874a180e20.exe 28 PID 2420 wrote to memory of 2872 2420 563ca131a21ed75620f5e6874a180e20.exe 28 PID 2420 wrote to memory of 2872 2420 563ca131a21ed75620f5e6874a180e20.exe 28 PID 2420 wrote to memory of 2872 2420 563ca131a21ed75620f5e6874a180e20.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\563ca131a21ed75620f5e6874a180e20.exe"C:\Users\Admin\AppData\Local\Temp\563ca131a21ed75620f5e6874a180e20.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5cd7f33c9b3ba886c9c93a11562eb98f0
SHA1cf11530a9112ab74b284e496df1c63f8f630ae5c
SHA2568cd1b34b067963729c8a7a07bc3b26b7a32f19681aec8737e1c79e886b489e5c
SHA5121992b4eee7f16300050c7e7f896d212a7e07bc0eb97b3575cdb9f00247e4ca8748534c12316508d354f6b7bc10efe6882399834b7f59264209427e3d9942df56
-
Filesize
33KB
MD50e19584eaf8123c106c1dc5145d2860a
SHA19bab8173eb07de253adf14cecf852e8b71e46e2a
SHA256c135408925555267d6e3668472e91da23ec747e2f48f1bf60ff46cfab8ec1d5b
SHA5127bf237d47629207975b356b03dcf3631e6cc3c1be769e66d10c65a57c7ff951b0a7b7edd7a35893e32cdabdd1ebe73e642431ed2ed40ded5bc02efcd48eafd49