Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20/07/2024, 21:43 UTC
Behavioral task
behavioral1
Sample
0ecf609ddcf3ace6e04121853f0b2f70N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
0ecf609ddcf3ace6e04121853f0b2f70N.exe
Resource
win10v2004-20240709-en
General
-
Target
0ecf609ddcf3ace6e04121853f0b2f70N.exe
-
Size
134KB
-
MD5
0ecf609ddcf3ace6e04121853f0b2f70
-
SHA1
9000f2fbdce27a1e44adf2c91a673596a02eb484
-
SHA256
4926da8f17642412e5c19c390aab3df0dcd09586d409c922c7c5d8d1ed8e9aab
-
SHA512
7a170702339a9a47f3fce1dbd316522236b001b72a946ef2dff39a8d22db6086cb3f235efb2e331802a47b444d089a4c668f4393062e18f0c74c52c83148e1ba
-
SSDEEP
1536:YGYU/W2/HG6QMauSV3ixJHABLrmhH7i9eNOOg00GqMIK7aGZh3SO0:YfU/WF6QMauSuiWNi9eNOl0007NZIO0
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2748 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2756 wuauclt.exe -
Loads dropped DLL 1 IoCs
pid Process 3008 0ecf609ddcf3ace6e04121853f0b2f70N.exe -
resource yara_rule behavioral1/memory/3008-1-0x0000000000920000-0x0000000000948000-memory.dmp upx behavioral1/files/0x0009000000015b50-2.dat upx behavioral1/memory/2756-7-0x00000000000C0000-0x00000000000E8000-memory.dmp upx behavioral1/memory/3008-8-0x0000000000920000-0x0000000000948000-memory.dmp upx behavioral1/memory/2756-10-0x00000000000C0000-0x00000000000E8000-memory.dmp upx behavioral1/memory/3008-11-0x0000000000920000-0x0000000000948000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\wuauclt.exe\" /run" 0ecf609ddcf3ace6e04121853f0b2f70N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2756 3008 0ecf609ddcf3ace6e04121853f0b2f70N.exe 30 PID 3008 wrote to memory of 2756 3008 0ecf609ddcf3ace6e04121853f0b2f70N.exe 30 PID 3008 wrote to memory of 2756 3008 0ecf609ddcf3ace6e04121853f0b2f70N.exe 30 PID 3008 wrote to memory of 2756 3008 0ecf609ddcf3ace6e04121853f0b2f70N.exe 30 PID 3008 wrote to memory of 2748 3008 0ecf609ddcf3ace6e04121853f0b2f70N.exe 31 PID 3008 wrote to memory of 2748 3008 0ecf609ddcf3ace6e04121853f0b2f70N.exe 31 PID 3008 wrote to memory of 2748 3008 0ecf609ddcf3ace6e04121853f0b2f70N.exe 31 PID 3008 wrote to memory of 2748 3008 0ecf609ddcf3ace6e04121853f0b2f70N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ecf609ddcf3ace6e04121853f0b2f70N.exe"C:\Users\Admin\AppData\Local\Temp\0ecf609ddcf3ace6e04121853f0b2f70N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\ProgramData\Update\wuauclt.exe"C:\ProgramData\Update\wuauclt.exe" /run2⤵
- Executes dropped EXE
PID:2756
-
-
C:\windows\SysWOW64\cmd.exe"C:\windows\system32\cmd.exe" /c del /q "C:\Users\Admin\AppData\Local\Temp\0ecf609ddcf3ace6e04121853f0b2f70N.exe" >> NUL2⤵
- Deletes itself
PID:2748
-
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD569b13d73960d8c932101608a4da3e00b
SHA1b82287b3ed5e23d43119ae00c8deca55c35434f4
SHA256e8cdf426fc8bb5986a8ec753a8766b82d92d7375ab6e9a57a00789c4e876ab75
SHA5129dd153ac27eb017a634214fc21d47518bffd4ea49e0ccbd50d6301bc59efbccfbdba491edac54c6ecb2f2634bf95e4f25d7c0a9010f15679e1274ea4f84af657