Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04/07/2024, 22:38
Static task
static1
Behavioral task
behavioral1
Sample
695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe
Resource
win10v2004-20240508-en
General
-
Target
695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe
-
Size
1.5MB
-
MD5
6e00bfc00b435588a6f091ef55c536c4
-
SHA1
06356a232e61250fbc37d390c74071596ad8c3e1
-
SHA256
695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd
-
SHA512
e8802dfa04073c6b7ceac128ee58467156964947ede8b17f2cccd078ce98f9d4c23c7b2ee97e08e4fb172aa7c0654fbde9f1973654b96776fad2f2e0f5984247
-
SSDEEP
6144:kJuXtXxog5E+FWPNfrf6yGEssQxNpbM2eWdbjMMqcXmr8MMtjyhX9+FL:w8XNE+FuNfrSyGEssQJU03MMq/r8MMP
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs 10 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened (read-only) \??\G: 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened (read-only) \??\J: 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened (read-only) \??\H: 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened (read-only) \??\I: 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened (read-only) \??\K: 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened (read-only) \??\L: 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened (read-only) \??\M: 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened (read-only) \??\N: 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened (read-only) \??\O: 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\RCX2357.tmp 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InkWatson.cab 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File created C:\Program Files\Google\Chrome\Application\chrome.cab 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\TabTip.cab 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.cab 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCX2345.tmp 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCX239D.tmp 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\mip.cab 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\mip.exe 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File created C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.cab 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File created C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.cab 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCX235C.tmp 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File created C:\Program Files\7-Zip\7z.exe 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened for modification C:\Program Files\7-Zip\RCX2272.tmp 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File created C:\Program Files\Common Files\Microsoft Shared\MSInfo\msinfo32.cab 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\RCX2313.tmp 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened for modification C:\Program Files\7-Zip\7z.exe 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File created C:\Program Files\Common Files\Microsoft Shared\MSInfo\msinfo32.exe 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCX2356.tmp 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\RCX23AF.tmp 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\RCX23DF.tmp 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ConvertInkStore.cab 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.cab 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\RCX2302.tmp 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.cab 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\RCX2301.tmp 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File created C:\Program Files\Google\Chrome\Application\chrome.exe 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCX236D.tmp 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCX239E.tmp 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened for modification C:\Program Files\7-Zip\7z.cab 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened for modification C:\Program Files\7-Zip\RCX2271.tmp 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\FlickLearningWizard.cab 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InputPersonalization.cab 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ShapeCollector.cab 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\TabTip.cab 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\MSInfo\msinfo32.cab 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened for modification C:\Program Files\7-Zip\RCX2231.tmp 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened for modification C:\Program Files\7-Zip\7zFM.cab 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\InkWatson.cab 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\InkWatson.exe 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File created C:\Program Files\Google\Chrome\Application\chrome_proxy.exe 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File created C:\Program Files\7-Zip\7z.cab 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\FlickLearningWizard.cab 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ShapeCollector.exe 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCX2344.tmp 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCX2343.tmp 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File created C:\Program Files\Google\Chrome\Application\chrome_proxy.cab 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.exe 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File created C:\Program Files\7-Zip\7zFM.exe 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\FlickLearningWizard.exe 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\InputPersonalization.exe 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\TabTip.exe 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\ConvertInkStore.cab 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File created C:\Program Files\Common Files\Microsoft Shared\ink\InputPersonalization.cab 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File created C:\Program Files\readme.1xt 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File created C:\Program Files\7-Zip\7zFM.cab 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCX235A.tmp 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\RCX23AE.tmp 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCX2359.tmp 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened for modification C:\Program Files\Google\Chrome\Application\RCX235B.tmp 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1152 2608 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2608 wrote to memory of 1152 2608 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe 28 PID 2608 wrote to memory of 1152 2608 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe 28 PID 2608 wrote to memory of 1152 2608 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe 28 PID 2608 wrote to memory of 1152 2608 695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe"C:\Users\Admin\AppData\Local\Temp\695d92b3560eb32a4b9c0cdba0bfabc26131c3c7e2de2e73a85979cb81a569fd.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 7402⤵
- Program crash
PID:1152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
544KB
MD59a1dd1d96481d61934dcc2d568971d06
SHA1f136ef9bf8bd2fc753292fb5b7cf173a22675fb3
SHA2568cebb25e240db3b6986fcaed6bc0b900fa09dad763a56fb71273529266c5c525
SHA5127ac1581f8a29e778ba1a1220670796c47fa5b838417f8f635e2cb1998a01515cff3ee57045dacb78a8ec70d43754b970743aba600379fe6d9481958d32d8a5aa
-
Filesize
1.5MB
MD5940a7c56b0b4f67cebd28ed36025dd28
SHA1db11adb6f4bd46204407b67fc097666cdf0c1f6c
SHA2567fcc3e9bdee3d252265cf33b93ddb9249d9f054a068f1b912ef5a5f5b45e3a73
SHA5124c9c384a0ea4ba9ae653cc37754ef781f5d77f57eb6bf86d164e28991df72a981080c016f9cb865b9888d565509a2c82b3aaf9b1b468f888b7f126167954a431
-
Filesize
930KB
MD530ac0b832d75598fb3ec37b6f2a8c86a
SHA16f47dbfd6ff36df7ba581a4cef024da527dc3046
SHA2561ea0839c8dc95ad2c060af7d042c40c0daed58ce8e4524c0fba12fd73e4afb74
SHA512505870601a4389b7ed2c8fecf85835adfd2944cbc10801f74bc4e08f5a0d6ecc9a52052fc37e216304cd1655129021862294a698ed36b3b43d428698f7263057
-
Filesize
118KB
MD5f45a7db6aec433fd579774dfdb3eaa89
SHA12f8773cc2b720143776a0909d19b98c4954b39cc
SHA2562bc2372cfabd26933bc4012046e66a5d2efc9554c0835d1a0aa012d3bd1a6f9a
SHA51203a4b7c53373ff6308a0292bb84981dc1566923e93669bbb11cb03d9f58a8d477a1a2399aac5059f477bbf1cf14b17817d208bc7c496b8675ece83cdabec5662
-
Filesize
174KB
MD58d9797194e3826b5ab1050f637275859
SHA1e633cc82c5ae2f57aba7cf83738a592cff2a8fc9
SHA256ed8e457251c983d7acdcd3dcbdf750d21509aa056e62fee6525034e1721941dd
SHA512aaed0b4b27ecb5616d5967226c3d6e2b9aaaa432380747f8cc5c9b83659d1a72cc175fe0157359f3b622fba4e7b94bb4626726ed97150662d1f4ded0fbb1ab18
-
Filesize
1.6MB
MD5527e039ba9add8a7fac3a6bc30a6d476
SHA1729a329265eda72cada039c1941e7c672addfc19
SHA2564b8a72fc81b733ed2e6e70d4c5401f954002783dbf14927849ad579860780b94
SHA5129e73e14e33a5f07a87e9c1fecfdaee09d1408471052aacfde3d1e877dad4d253b525ebefca6bddabc23cf81d8dcce0785aedcc2f135d171ecbb1feaeb922c449
-
Filesize
2.8MB
MD5095092f4e746810c5829038d48afd55a
SHA1246eb3d41194dddc826049bbafeb6fc522ec044a
SHA2562f606012843d144610dc7be55d1716d5d106cbc6acbce57561dc0e62c38b8588
SHA5127f36fc03bfed0f3cf6ac3406c819993bf995e4f8c26a7589e9032c14b5a9c7048f5567f77b3b15f946c5282fc0be6308a92eab7879332d74c400d0c139ce8400
-
Filesize
1.5MB
MD5391a382f44fc0854e931322d8133ade9
SHA1337d84f0111ee543622a04ac8a543d18d7518594
SHA2567dcae3db07d5e53ee53a2feccada7574d87892df88c0d1480a8b6629082e32e5
SHA512809447152dff161cfc326771a0086a34ee52bebdd66647d656734d055e31d4493ddc8917e80f390537cb3d6cfdeba0855ae846a992118ad58424356a4fcd5275
-
Filesize
1020KB
MD5b65d7344b0a7faa207d2e1a7adaafb60
SHA1755ad15b1745b0e730d658d4a92e2b754425b7db
SHA256f4b91fbbcba8a46eefe4965e4a24c6ede3decbd1fec96e141a1953173efd1c92
SHA512f17ac73c2df7c73a31b11ce0f533d6db91bdb0cdeea653dcd52ac72c3cf28da0c236b79586ddc7a6c825fdd171290722f888465e776f12ac2cae75be82726b22