Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 02:18
Static task
static1
Behavioral task
behavioral1
Sample
9d714855751945b91b740169675a9b07483eaf91e9e63e1e442e2d55ee9d9eab.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
9d714855751945b91b740169675a9b07483eaf91e9e63e1e442e2d55ee9d9eab.exe
Resource
win10v2004-20240709-en
General
-
Target
9d714855751945b91b740169675a9b07483eaf91e9e63e1e442e2d55ee9d9eab.exe
-
Size
176KB
-
MD5
6e7e7b5cafd9ea6f56aba08607200a2f
-
SHA1
6c3fc039dfe8fad4afa788ffd1baf71b509eaf2d
-
SHA256
9d714855751945b91b740169675a9b07483eaf91e9e63e1e442e2d55ee9d9eab
-
SHA512
495e90b08cec9b9361d4eca173a60973f9e9194a8412afe0073a26c19c672d9e6c73edcdc60487c9c1b4ac9c89ca71a4b3f7d0402358217f39d606a937176abd
-
SSDEEP
3072:C9E4Wgbr57BVFqmx1E9Hqmz674Qbf6xET/nhqCoNWDY1TuDBujfgY1LRQBAhHuYK:40MJBVlx+Vf274Q2xqhxoNH1Ti5YtuY
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2576 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2836 dcomiles.exe 2788 ~3276.tmp 2596 DispltMC.exe -
Loads dropped DLL 3 IoCs
pid Process 2764 9d714855751945b91b740169675a9b07483eaf91e9e63e1e442e2d55ee9d9eab.exe 2764 9d714855751945b91b740169675a9b07483eaf91e9e63e1e442e2d55ee9d9eab.exe 2836 dcomiles.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\comp_ssp = "C:\\Users\\Admin\\AppData\\Roaming\\bthufmon\\dcomiles.exe" 9d714855751945b91b740169675a9b07483eaf91e9e63e1e442e2d55ee9d9eab.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\DispltMC.exe 9d714855751945b91b740169675a9b07483eaf91e9e63e1e442e2d55ee9d9eab.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2836 dcomiles.exe 1324 Explorer.EXE 2596 DispltMC.exe 1324 Explorer.EXE 2596 DispltMC.exe 1324 Explorer.EXE 2596 DispltMC.exe 1324 Explorer.EXE 2596 DispltMC.exe 1324 Explorer.EXE 2596 DispltMC.exe 1324 Explorer.EXE 2596 DispltMC.exe 1324 Explorer.EXE 2596 DispltMC.exe 1324 Explorer.EXE 2596 DispltMC.exe 1324 Explorer.EXE 2596 DispltMC.exe 1324 Explorer.EXE 2596 DispltMC.exe 1324 Explorer.EXE 2596 DispltMC.exe 1324 Explorer.EXE 2596 DispltMC.exe 1324 Explorer.EXE 2596 DispltMC.exe 1324 Explorer.EXE 2596 DispltMC.exe 1324 Explorer.EXE 2596 DispltMC.exe 1324 Explorer.EXE 2596 DispltMC.exe 1324 Explorer.EXE 2596 DispltMC.exe 1324 Explorer.EXE 2596 DispltMC.exe 1324 Explorer.EXE 2596 DispltMC.exe 1324 Explorer.EXE 2596 DispltMC.exe 1324 Explorer.EXE 2596 DispltMC.exe 1324 Explorer.EXE 2596 DispltMC.exe 1324 Explorer.EXE 2596 DispltMC.exe 1324 Explorer.EXE 2596 DispltMC.exe 1324 Explorer.EXE 2596 DispltMC.exe 1324 Explorer.EXE 2596 DispltMC.exe 1324 Explorer.EXE 2596 DispltMC.exe 1324 Explorer.EXE 2596 DispltMC.exe 1324 Explorer.EXE 2596 DispltMC.exe 1324 Explorer.EXE 2596 DispltMC.exe 1324 Explorer.EXE 2596 DispltMC.exe 1324 Explorer.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2836 2764 9d714855751945b91b740169675a9b07483eaf91e9e63e1e442e2d55ee9d9eab.exe 30 PID 2764 wrote to memory of 2836 2764 9d714855751945b91b740169675a9b07483eaf91e9e63e1e442e2d55ee9d9eab.exe 30 PID 2764 wrote to memory of 2836 2764 9d714855751945b91b740169675a9b07483eaf91e9e63e1e442e2d55ee9d9eab.exe 30 PID 2764 wrote to memory of 2836 2764 9d714855751945b91b740169675a9b07483eaf91e9e63e1e442e2d55ee9d9eab.exe 30 PID 2836 wrote to memory of 2788 2836 dcomiles.exe 31 PID 2836 wrote to memory of 2788 2836 dcomiles.exe 31 PID 2836 wrote to memory of 2788 2836 dcomiles.exe 31 PID 2836 wrote to memory of 2788 2836 dcomiles.exe 31 PID 2788 wrote to memory of 1324 2788 ~3276.tmp 21 PID 2764 wrote to memory of 2576 2764 9d714855751945b91b740169675a9b07483eaf91e9e63e1e442e2d55ee9d9eab.exe 33 PID 2764 wrote to memory of 2576 2764 9d714855751945b91b740169675a9b07483eaf91e9e63e1e442e2d55ee9d9eab.exe 33 PID 2764 wrote to memory of 2576 2764 9d714855751945b91b740169675a9b07483eaf91e9e63e1e442e2d55ee9d9eab.exe 33 PID 2764 wrote to memory of 2576 2764 9d714855751945b91b740169675a9b07483eaf91e9e63e1e442e2d55ee9d9eab.exe 33 PID 2576 wrote to memory of 1744 2576 cmd.exe 35 PID 2576 wrote to memory of 1744 2576 cmd.exe 35 PID 2576 wrote to memory of 1744 2576 cmd.exe 35 PID 2576 wrote to memory of 1744 2576 cmd.exe 35 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1744 attrib.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\9d714855751945b91b740169675a9b07483eaf91e9e63e1e442e2d55ee9d9eab.exe"C:\Users\Admin\AppData\Local\Temp\9d714855751945b91b740169675a9b07483eaf91e9e63e1e442e2d55ee9d9eab.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Roaming\bthufmon\dcomiles.exe"C:\Users\Admin\AppData\Roaming\bthufmon\dcomiles.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\~3276.tmp"C:\Users\Admin\AppData\Local\Temp\~3276.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2788
-
-
-
C:\Windows\SysWOW64\cmd.exe/C 259470098.cmd3⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\attrib.exeattrib -r -s -h "9d714855751945b91b740169675a9b07483eaf91e9e63e1e442e2d55ee9d9eab.exe"4⤵
- Views/modifies file attributes
PID:1744
-
-
-
-
C:\Windows\SysWOW64\DispltMC.exeC:\Windows\SysWOW64\DispltMC.exe -k1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
291B
MD537306281e6c55ed53fd6e1611063bbf4
SHA11d95b943e58a4657da8878429e16cc1ab669afb9
SHA2565504a823e0c3906b982a0d6cd79458260d10d81336ad1f2b843c5f49f3a3ba52
SHA5129f98b602d1691a025ef5bf5999ce755a7b6745e4129125f42e2883f8b35aaf737e22d6dc4b67d868ff948e3a1a449907186792cea458bc03424a05201c92e125
-
Filesize
176KB
MD56e7e7b5cafd9ea6f56aba08607200a2f
SHA16c3fc039dfe8fad4afa788ffd1baf71b509eaf2d
SHA2569d714855751945b91b740169675a9b07483eaf91e9e63e1e442e2d55ee9d9eab
SHA512495e90b08cec9b9361d4eca173a60973f9e9194a8412afe0073a26c19c672d9e6c73edcdc60487c9c1b4ac9c89ca71a4b3f7d0402358217f39d606a937176abd
-
Filesize
6KB
MD58452126ada63e57f5ae2bdf60551a0a5
SHA13da08606ba93bf1189caeba5f89ec41e21946d68
SHA25650413e40ec806ce9b1e5e0411505ed2d742b30a9e8c77295af6f0863c60b32c3
SHA51275d6607b066a036ad61200387683dde94fbebcbdf047600ab6479224b9ac49f6b793cb3e4197f3343ccfd6a66ba6623d9d73a96674f4cf9589ba55249c543595
-
Filesize
176KB
MD54afad48c537af54d004e6dd452c66a9f
SHA11a982ce341fe419dde1507c1551ced74ae584b82
SHA256c115add04346c28e1d87327d4de90951cc8e5e015513428b03b3a409a9523558
SHA51217978e91033453e5bdf8077c9641e5e4bf5496622ecc412ad149dd4f6b91635593f519901c64c2fe2697e57af56d657d0e17e1ef54f742cbb2008996ffaa72c0