Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 04:42
Static task
static1
Behavioral task
behavioral1
Sample
c7744eaa3921c46fb429c5f69a4cc0ab36502f19f00dd7463e472485dd1ac97f.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c7744eaa3921c46fb429c5f69a4cc0ab36502f19f00dd7463e472485dd1ac97f.exe
Resource
win10v2004-20240709-en
General
-
Target
c7744eaa3921c46fb429c5f69a4cc0ab36502f19f00dd7463e472485dd1ac97f.exe
-
Size
94KB
-
MD5
7eca76f3229628f835e635547a8ba915
-
SHA1
f2f8d66c103624344dd43333913c37d71f80c512
-
SHA256
c7744eaa3921c46fb429c5f69a4cc0ab36502f19f00dd7463e472485dd1ac97f
-
SHA512
0ddc8b374bea9e6a2598a6df6139b9084ecee9c3f4ccf087b93665d83d3ccb5b98254209a8d62563e845483ca6ebc97999d1dd1ce6252e2e49c62dcbeb5852c8
-
SSDEEP
1536:Sdyql1M7wIIEuti7rEYivykYkpaWj0OL+G7mJAm/lGAuJMLF4vsnXWkW316:SdV1Z1i3QKqSGCJr/lkJ6FQsnV
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2284 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2396 sppsrv.exe -
Loads dropped DLL 2 IoCs
pid Process 2396 sppsrv.exe 2396 sppsrv.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\xpwunp.dat c7744eaa3921c46fb429c5f69a4cc0ab36502f19f00dd7463e472485dd1ac97f.exe File created C:\Windows\SysWOW64\sppsrv.exe c7744eaa3921c46fb429c5f69a4cc0ab36502f19f00dd7463e472485dd1ac97f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1888 wrote to memory of 2284 1888 c7744eaa3921c46fb429c5f69a4cc0ab36502f19f00dd7463e472485dd1ac97f.exe 29 PID 1888 wrote to memory of 2284 1888 c7744eaa3921c46fb429c5f69a4cc0ab36502f19f00dd7463e472485dd1ac97f.exe 29 PID 1888 wrote to memory of 2284 1888 c7744eaa3921c46fb429c5f69a4cc0ab36502f19f00dd7463e472485dd1ac97f.exe 29 PID 1888 wrote to memory of 2284 1888 c7744eaa3921c46fb429c5f69a4cc0ab36502f19f00dd7463e472485dd1ac97f.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7744eaa3921c46fb429c5f69a4cc0ab36502f19f00dd7463e472485dd1ac97f.exe"C:\Users\Admin\AppData\Local\Temp\c7744eaa3921c46fb429c5f69a4cc0ab36502f19f00dd7463e472485dd1ac97f.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\_del.bat2⤵
- Deletes itself
PID:2284
-
-
C:\Windows\SysWOW64\sppsrv.exeC:\Windows\SysWOW64\sppsrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2396
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
294B
MD5f6b3d3659d557f2dcc10766b3ade8ae3
SHA141a4da4280d319535426845691c1e18a2fd098ea
SHA2560563055718f8e8560b28809b991cc1a71ef490f18e8fdb5ebfdda35e5ab26a00
SHA512fff4be2b724426cc956d0cf0068352c35b3c58d8cc497fedf471dd9922abc5f462d1f9ba3166676d89ae8ad2141b2b4d09cfd0fc750bb47faf5953f626343dc5
-
Filesize
740B
MD59687b79e8d6ca007835094f41b120616
SHA15e94fc9491fbcd72393df648674339d0f1ebb69d
SHA256dc03106e052743f20eebcca43dc9a234f38361220ac5197bd0a0187f87ad9c52
SHA51218c52a3c80ed825c491a303468aa66532626a70313528d8eb7afb0d38d8abe74b01143925b1669b9e5c4f676838d5d616ecad7361574b4b68b1d769763d72b5d
-
Filesize
94KB
MD5afae810fcae770473d7e1a753bce1141
SHA120a394b617506ac60d94ca1783973b70daa4f69c
SHA2567c7a39ae4ef935089406cd7d18414cc35703b3f59bd089c4e6ef346b46dd1b1c
SHA51249a0039b0bbffe3dbc9bc6fdfc654014bab3226cc18e5b21e6d9dbad67e566f753b6b4acdd26fc74dbfac5ecd0c2c627517736d22620c9507c08b0f99dce121a