Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
09/07/2024, 13:05
Static task
static1
Behavioral task
behavioral1
Sample
f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe
Resource
win10v2004-20240704-en
General
-
Target
f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe
-
Size
80KB
-
MD5
82af85c2ee08cdff5e14f996f70cc3bb
-
SHA1
11b407bb9fab4a1fe87bf1f9bf77a1190f89a2e8
-
SHA256
f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0
-
SHA512
8db75ec2c3607084d7e4f9dd1298f7e9f18b8db0db06ee3cd34bf6eff8b68b4185afb1881405afc5c173a4b09611dec083fa8a2b4bd0dc8fa4bd5b6e08e9f0b0
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOdr4apL/:GhfxHNIreQm+Hi+r4apL/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2112 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 2088 f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe 2088 f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe File created C:\Windows\SysWOW64\notepad¢¬.exe f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe File opened for modification C:\Windows\SysWOW64\¢«.exe f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe File created C:\Windows\SysWOW64\¢«.exe f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe File created C:\Windows\system\rundll32.exe f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1720530334" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1720530334" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2088 f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe 2088 f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe 2088 f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe 2088 f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe 2088 f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe 2088 f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe 2088 f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe 2088 f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe 2088 f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe 2088 f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe 2088 f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe 2088 f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe 2088 f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe 2088 f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2112 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2088 f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe 2112 rundll32.exe 2112 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2112 2088 f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe 30 PID 2088 wrote to memory of 2112 2088 f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe 30 PID 2088 wrote to memory of 2112 2088 f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe 30 PID 2088 wrote to memory of 2112 2088 f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe 30 PID 2088 wrote to memory of 2112 2088 f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe 30 PID 2088 wrote to memory of 2112 2088 f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe 30 PID 2088 wrote to memory of 2112 2088 f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe"C:\Users\Admin\AppData\Local\Temp\f8693fe7dd2add24c69145ba04a14837df1bf7c38c475d46e5bede43a17d6ff0.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD54ef26a4dcee63ef8a7ab200ed88de0e4
SHA14bc4236dd5c48ad73083ae159de4f0fd737bc5a2
SHA2569abc8f88be5d2d59c73c0f6ed940f7773b0346b131f56d3166efb595a6b4ecd4
SHA512ee3a2364b9187ebf4d937f78c065d6d6bb2b5c9c7e580dc9e4c7f830340674174d6d97a7b04add624659dcb663e88d7350b788c141d6ab8146c7a7680882986b
-
Filesize
75KB
MD5650d67959e86889737357821b32c8bea
SHA1ab658b5ff06a682ed620db0ee32476468a3be06c
SHA25642571491006ec19445515ef0c2ee6b00aee8ee6ea35f0893c62edc28fa5b8ebc
SHA51270b3de889e039d285b952d1a1bd46c12a12db0e45de850ba2ef8b588c99aab239cc9b96ea3c5078232cf69de706f9e214c0b1b6bda1bef52cd3f718b60f5a17a