Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
31s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 20:29
Behavioral task
behavioral1
Sample
1703e2a6825e290c8da584c71e86cc60N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1703e2a6825e290c8da584c71e86cc60N.exe
Resource
win10v2004-20240709-en
General
-
Target
1703e2a6825e290c8da584c71e86cc60N.exe
-
Size
135KB
-
MD5
1703e2a6825e290c8da584c71e86cc60
-
SHA1
feafc890dff86816443abdf9dfa0b3a51f55b956
-
SHA256
ee9dd70687ef98791daf0e7a06c437b373aa8589716dea602a5636cbeefe0b82
-
SHA512
f1a8080e2b91cf297cd67e1ac6000372d8b4c0d889a6230e378b6eea084bda3132043e8afd45dc4a040af9bf1fcbdcae60b74bd9b883d94d8c838ecbb6c95f4d
-
SSDEEP
1536:YGYU/W2/HG6QMauSV3ixJHABLrmhH7i9eNOOg00GqMIK7aGZh3SOz:YfU/WF6QMauSuiWNi9eNOl0007NZIOz
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2132 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1840 wuauclt.exe -
Loads dropped DLL 1 IoCs
pid Process 1140 1703e2a6825e290c8da584c71e86cc60N.exe -
resource yara_rule behavioral1/memory/1140-1-0x0000000000330000-0x0000000000358000-memory.dmp upx behavioral1/files/0x0009000000018f82-5.dat upx behavioral1/memory/1840-7-0x00000000003D0000-0x00000000003F8000-memory.dmp upx behavioral1/memory/1840-9-0x00000000003D0000-0x00000000003F8000-memory.dmp upx behavioral1/memory/1140-10-0x0000000000330000-0x0000000000358000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\wuauclt.exe\" /run" 1703e2a6825e290c8da584c71e86cc60N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1140 wrote to memory of 1840 1140 1703e2a6825e290c8da584c71e86cc60N.exe 30 PID 1140 wrote to memory of 1840 1140 1703e2a6825e290c8da584c71e86cc60N.exe 30 PID 1140 wrote to memory of 1840 1140 1703e2a6825e290c8da584c71e86cc60N.exe 30 PID 1140 wrote to memory of 1840 1140 1703e2a6825e290c8da584c71e86cc60N.exe 30 PID 1140 wrote to memory of 2132 1140 1703e2a6825e290c8da584c71e86cc60N.exe 31 PID 1140 wrote to memory of 2132 1140 1703e2a6825e290c8da584c71e86cc60N.exe 31 PID 1140 wrote to memory of 2132 1140 1703e2a6825e290c8da584c71e86cc60N.exe 31 PID 1140 wrote to memory of 2132 1140 1703e2a6825e290c8da584c71e86cc60N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\1703e2a6825e290c8da584c71e86cc60N.exe"C:\Users\Admin\AppData\Local\Temp\1703e2a6825e290c8da584c71e86cc60N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\ProgramData\Update\wuauclt.exe"C:\ProgramData\Update\wuauclt.exe" /run2⤵
- Executes dropped EXE
PID:1840
-
-
C:\windows\SysWOW64\cmd.exe"C:\windows\system32\cmd.exe" /c del /q "C:\Users\Admin\AppData\Local\Temp\1703e2a6825e290c8da584c71e86cc60N.exe" >> NUL2⤵
- Deletes itself
PID:2132
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5f9b6e5bd917e27d676f4efabd324dee0
SHA11a9a28d0180f730a8fc280a01845faff4c25b2fa
SHA2569bd6ccc9a9b6e34777b441eb70309057243b58bbbbded09da5d0e7db18c4c8a0
SHA512911ef8eeb9e956cd6618cf94be753f22e50ee4ec1dd3cdd58734154c7765fa254aabc96228d41f8470b30af74758c4e02fef6499aca4e4f2a00802a47614e7fe