Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
24/06/2024, 21:23
Behavioral task
behavioral1
Sample
4faf38dc2c68fb994cde73c30ccc463ed8a035089bbf8a17c444a8f0b500607d.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
4faf38dc2c68fb994cde73c30ccc463ed8a035089bbf8a17c444a8f0b500607d.exe
Resource
win10v2004-20240508-en
General
-
Target
4faf38dc2c68fb994cde73c30ccc463ed8a035089bbf8a17c444a8f0b500607d.exe
-
Size
134KB
-
MD5
c3340367f47927c4bcc4977a7e3b72a9
-
SHA1
e06bb4c6025c0765b73a21e764d056d04646c24b
-
SHA256
4faf38dc2c68fb994cde73c30ccc463ed8a035089bbf8a17c444a8f0b500607d
-
SHA512
7fa74a52d144c1432b84acae96a4a57b6c8be137db0fa2c13afd446abf1d91ec3580929275dadf865bde866b1b422a410fa0d8692630888c317da89b71f2db69
-
SSDEEP
1536:rF0AJELopHG9aa+9qX3apJzAKWYr0v7ioy6paK2AZqMIK7aGZh38Q1:riAyLN9aa+9U2rW1ip6pr2At7NZuQ1
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 6 IoCs
resource yara_rule behavioral1/memory/2028-0-0x0000000000960000-0x0000000000988000-memory.dmp UPX behavioral1/memory/2028-4-0x0000000000080000-0x00000000000A8000-memory.dmp UPX behavioral1/files/0x00090000000164d8-6.dat UPX behavioral1/memory/2028-7-0x0000000000960000-0x0000000000988000-memory.dmp UPX behavioral1/memory/1664-8-0x0000000001030000-0x0000000001058000-memory.dmp UPX behavioral1/memory/2028-9-0x0000000000960000-0x0000000000988000-memory.dmp UPX -
Executes dropped EXE 1 IoCs
pid Process 1664 WwanSvc.exe -
Loads dropped DLL 1 IoCs
pid Process 2028 4faf38dc2c68fb994cde73c30ccc463ed8a035089bbf8a17c444a8f0b500607d.exe -
resource yara_rule behavioral1/memory/2028-0-0x0000000000960000-0x0000000000988000-memory.dmp upx behavioral1/memory/2028-4-0x0000000000080000-0x00000000000A8000-memory.dmp upx behavioral1/files/0x00090000000164d8-6.dat upx behavioral1/memory/2028-7-0x0000000000960000-0x0000000000988000-memory.dmp upx behavioral1/memory/1664-8-0x0000000001030000-0x0000000001058000-memory.dmp upx behavioral1/memory/2028-9-0x0000000000960000-0x0000000000988000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\WwanSvc.exe\" /run" 4faf38dc2c68fb994cde73c30ccc463ed8a035089bbf8a17c444a8f0b500607d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2028 wrote to memory of 1664 2028 4faf38dc2c68fb994cde73c30ccc463ed8a035089bbf8a17c444a8f0b500607d.exe 28 PID 2028 wrote to memory of 1664 2028 4faf38dc2c68fb994cde73c30ccc463ed8a035089bbf8a17c444a8f0b500607d.exe 28 PID 2028 wrote to memory of 1664 2028 4faf38dc2c68fb994cde73c30ccc463ed8a035089bbf8a17c444a8f0b500607d.exe 28 PID 2028 wrote to memory of 1664 2028 4faf38dc2c68fb994cde73c30ccc463ed8a035089bbf8a17c444a8f0b500607d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4faf38dc2c68fb994cde73c30ccc463ed8a035089bbf8a17c444a8f0b500607d.exe"C:\Users\Admin\AppData\Local\Temp\4faf38dc2c68fb994cde73c30ccc463ed8a035089bbf8a17c444a8f0b500607d.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\ProgramData\Update\WwanSvc.exe"C:\ProgramData\Update\WwanSvc.exe" /run2⤵
- Executes dropped EXE
PID:1664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD56d8c8f10e5bf207baddd4f0c4fec6e43
SHA1b23d453e9be91cca565a1507159bbddd4d38e5f3
SHA2560c55cc67ca42c1713efca9b16831b9c23df2b696f59171ef5a67a05a7b0ce98c
SHA5124dd92b58495f5a0d36e8d00206ae6cc90f14d8034fb43589583a6eb83de9d2d71e1885f4c10b8b14f649fbe832372f8b9b63479d22abd85af319428df81cef18