Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05/07/2024, 20:49 UTC
Static task
static1
Behavioral task
behavioral1
Sample
3ddf598354802dbb764bfd1339f08223885ec4b0c4a11706f8e3a8029f0223be.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3ddf598354802dbb764bfd1339f08223885ec4b0c4a11706f8e3a8029f0223be.exe
Resource
win10v2004-20240704-en
General
-
Target
3ddf598354802dbb764bfd1339f08223885ec4b0c4a11706f8e3a8029f0223be.exe
-
Size
233KB
-
MD5
e29719d3adf28eed2d8ba410872ac962
-
SHA1
ed6247a21e2e00557e133c1289aca24df2b881d8
-
SHA256
3ddf598354802dbb764bfd1339f08223885ec4b0c4a11706f8e3a8029f0223be
-
SHA512
f419a104c3b010c6691a528d140b690d4d727de7d68dc9823e651a9028c8cee9c4894b91eaf61f9a34ab1e7957a6eb556f91719143b25412fd7f3aa6441b2d95
-
SSDEEP
6144:xD2JWK2zuqUzN15TMdN/5djkxUEKm/tJajKw:xD2JFYoZmF7kUm/Cj
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2532 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 236 PkgMcont.exe 2304 ~FAD3.tmp 2732 Disputou.exe -
Loads dropped DLL 3 IoCs
pid Process 1908 3ddf598354802dbb764bfd1339f08223885ec4b0c4a11706f8e3a8029f0223be.exe 1908 3ddf598354802dbb764bfd1339f08223885ec4b0c4a11706f8e3a8029f0223be.exe 236 PkgMcont.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\fontnced = "C:\\Users\\Admin\\AppData\\Roaming\\Netppubw\\PkgMcont.exe" 3ddf598354802dbb764bfd1339f08223885ec4b0c4a11706f8e3a8029f0223be.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Disputou.exe 3ddf598354802dbb764bfd1339f08223885ec4b0c4a11706f8e3a8029f0223be.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 236 PkgMcont.exe 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE 1360 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 236 PkgMcont.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1908 wrote to memory of 236 1908 3ddf598354802dbb764bfd1339f08223885ec4b0c4a11706f8e3a8029f0223be.exe 31 PID 1908 wrote to memory of 236 1908 3ddf598354802dbb764bfd1339f08223885ec4b0c4a11706f8e3a8029f0223be.exe 31 PID 1908 wrote to memory of 236 1908 3ddf598354802dbb764bfd1339f08223885ec4b0c4a11706f8e3a8029f0223be.exe 31 PID 1908 wrote to memory of 236 1908 3ddf598354802dbb764bfd1339f08223885ec4b0c4a11706f8e3a8029f0223be.exe 31 PID 236 wrote to memory of 2304 236 PkgMcont.exe 32 PID 236 wrote to memory of 2304 236 PkgMcont.exe 32 PID 236 wrote to memory of 2304 236 PkgMcont.exe 32 PID 236 wrote to memory of 2304 236 PkgMcont.exe 32 PID 2304 wrote to memory of 1360 2304 ~FAD3.tmp 21 PID 1908 wrote to memory of 2532 1908 3ddf598354802dbb764bfd1339f08223885ec4b0c4a11706f8e3a8029f0223be.exe 34 PID 1908 wrote to memory of 2532 1908 3ddf598354802dbb764bfd1339f08223885ec4b0c4a11706f8e3a8029f0223be.exe 34 PID 1908 wrote to memory of 2532 1908 3ddf598354802dbb764bfd1339f08223885ec4b0c4a11706f8e3a8029f0223be.exe 34 PID 1908 wrote to memory of 2532 1908 3ddf598354802dbb764bfd1339f08223885ec4b0c4a11706f8e3a8029f0223be.exe 34 PID 2532 wrote to memory of 2644 2532 cmd.exe 36 PID 2532 wrote to memory of 2644 2532 cmd.exe 36 PID 2532 wrote to memory of 2644 2532 cmd.exe 36 PID 2532 wrote to memory of 2644 2532 cmd.exe 36 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2644 attrib.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\3ddf598354802dbb764bfd1339f08223885ec4b0c4a11706f8e3a8029f0223be.exe"C:\Users\Admin\AppData\Local\Temp\3ddf598354802dbb764bfd1339f08223885ec4b0c4a11706f8e3a8029f0223be.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Roaming\Netppubw\PkgMcont.exe"C:\Users\Admin\AppData\Roaming\Netppubw"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Users\Admin\AppData\Local\Temp\~FAD3.tmp1360 239112 236 14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2304
-
-
-
C:\Windows\SysWOW64\cmd.exe/C 259456073.cmd3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "3ddf598354802dbb764bfd1339f08223885ec4b0c4a11706f8e3a8029f0223be.exe"4⤵
- Views/modifies file attributes
PID:2644
-
-
-
-
C:\Windows\SysWOW64\Disputou.exeC:\Windows\SysWOW64\Disputou.exe -s1⤵
- Executes dropped EXE
PID:2732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
291B
MD56b620a106e65ad01793b41c094db3f7a
SHA1d8338fed27f9a1367fd2952db385a319c2c72c09
SHA256b17777b942fd9a860d7c2bb774369390cf39ecc8841b5642d307bdaf151c23d1
SHA512ac84b9b550e58380d9041b6d860d9628a5da43ce71a37f04b988aee63df9fdf36d6d824685b5b862541f2b34efcc5720392da2e49a7f846b84d2e8afced4da73
-
Filesize
8KB
MD586dc243576cf5c7445451af37631eea9
SHA199a81c47c4c02f32c0ab456bfa23c306c7a09bf9
SHA25625d2a671e1b5b5b95697ac0234ce4d46e0d0894919521b54aabebd9daecf994a
SHA512c7310524f9b65f811146c1eb6ae944966351ac88a95fbc1ac422d8810730e5e212a7e28090ad758ea23c96ba38073e7fcf42460575e7f09dbc759a45c5d5a4a4
-
Filesize
233KB
MD57625144b71d411fcab7213f6ba33050d
SHA15755665f69d7e7ffa366cd525e092230c751df1d
SHA256db4b22345f935119493237fb2f9df9d7c2f7176fa60584b957a3d01e82014e36
SHA512e0f102a4658052a76de82396588c86f8baf995d3f4e9c53bcba3a840dea2d11efa21a837f795c603fd921c74416e5606c839e8614ced975cd98ad590b80fc5ab