Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 09:47
Behavioral task
behavioral1
Sample
95c8d93702e7063e7db9555969545540N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
95c8d93702e7063e7db9555969545540N.exe
Resource
win10v2004-20240704-en
General
-
Target
95c8d93702e7063e7db9555969545540N.exe
-
Size
304KB
-
MD5
95c8d93702e7063e7db9555969545540
-
SHA1
31fb6c9b10e2a75634fe6fbd3fbe23eeb85bf569
-
SHA256
de4ec1fb441ef422cd308ccb378f490ee728f8dc89b7f0cac4056c72e5474960
-
SHA512
d6b960ce8dbfaa9b3684f2a1e7dfbeb5f634e13c00131b9263880612215441abebd42a1c94766ec83307a1009bcc423f70942be9978cde80fa40b08510f9a9fa
-
SSDEEP
3072:fHUm8QyMWSVCqwT1h+popOOfaPOx5P+m/pNdhZ1QYUdqz:fQqwJh+6pAkGm/pH1gdq
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2240 95c8d93702e7063e7db9555969545540N.exe 864 WindowsService.exe 2996 WindowsService.exe 2652 WindowsService.exe -
Loads dropped DLL 6 IoCs
pid Process 2716 95c8d93702e7063e7db9555969545540N.exe 2240 95c8d93702e7063e7db9555969545540N.exe 2240 95c8d93702e7063e7db9555969545540N.exe 2240 95c8d93702e7063e7db9555969545540N.exe 2240 95c8d93702e7063e7db9555969545540N.exe 2240 95c8d93702e7063e7db9555969545540N.exe -
resource yara_rule behavioral1/memory/2716-0-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/files/0x0008000000016d65-175.dat upx behavioral1/memory/2716-177-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2240-194-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2716-192-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/files/0x0009000000016d5e-219.dat upx behavioral1/memory/864-238-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/864-445-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2996-449-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2240-448-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2996-454-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Microsoft\Windows\CurrentVersion\Run\sidebar = "C:\\Users\\Admin\\AppData\\Roaming\\SystemWindows\\WindowsService.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2716 set thread context of 2240 2716 95c8d93702e7063e7db9555969545540N.exe 31 PID 864 set thread context of 2996 864 WindowsService.exe 36 PID 864 set thread context of 2652 864 WindowsService.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 63 IoCs
description pid Process Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe Token: SeDebugPrivilege 2996 WindowsService.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2716 95c8d93702e7063e7db9555969545540N.exe 2240 95c8d93702e7063e7db9555969545540N.exe 864 WindowsService.exe 2996 WindowsService.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2240 2716 95c8d93702e7063e7db9555969545540N.exe 31 PID 2716 wrote to memory of 2240 2716 95c8d93702e7063e7db9555969545540N.exe 31 PID 2716 wrote to memory of 2240 2716 95c8d93702e7063e7db9555969545540N.exe 31 PID 2716 wrote to memory of 2240 2716 95c8d93702e7063e7db9555969545540N.exe 31 PID 2716 wrote to memory of 2240 2716 95c8d93702e7063e7db9555969545540N.exe 31 PID 2716 wrote to memory of 2240 2716 95c8d93702e7063e7db9555969545540N.exe 31 PID 2716 wrote to memory of 2240 2716 95c8d93702e7063e7db9555969545540N.exe 31 PID 2716 wrote to memory of 2240 2716 95c8d93702e7063e7db9555969545540N.exe 31 PID 2240 wrote to memory of 2100 2240 95c8d93702e7063e7db9555969545540N.exe 32 PID 2240 wrote to memory of 2100 2240 95c8d93702e7063e7db9555969545540N.exe 32 PID 2240 wrote to memory of 2100 2240 95c8d93702e7063e7db9555969545540N.exe 32 PID 2240 wrote to memory of 2100 2240 95c8d93702e7063e7db9555969545540N.exe 32 PID 2100 wrote to memory of 2168 2100 cmd.exe 34 PID 2100 wrote to memory of 2168 2100 cmd.exe 34 PID 2100 wrote to memory of 2168 2100 cmd.exe 34 PID 2100 wrote to memory of 2168 2100 cmd.exe 34 PID 2240 wrote to memory of 864 2240 95c8d93702e7063e7db9555969545540N.exe 35 PID 2240 wrote to memory of 864 2240 95c8d93702e7063e7db9555969545540N.exe 35 PID 2240 wrote to memory of 864 2240 95c8d93702e7063e7db9555969545540N.exe 35 PID 2240 wrote to memory of 864 2240 95c8d93702e7063e7db9555969545540N.exe 35 PID 864 wrote to memory of 2996 864 WindowsService.exe 36 PID 864 wrote to memory of 2996 864 WindowsService.exe 36 PID 864 wrote to memory of 2996 864 WindowsService.exe 36 PID 864 wrote to memory of 2996 864 WindowsService.exe 36 PID 864 wrote to memory of 2996 864 WindowsService.exe 36 PID 864 wrote to memory of 2996 864 WindowsService.exe 36 PID 864 wrote to memory of 2996 864 WindowsService.exe 36 PID 864 wrote to memory of 2996 864 WindowsService.exe 36 PID 864 wrote to memory of 2652 864 WindowsService.exe 37 PID 864 wrote to memory of 2652 864 WindowsService.exe 37 PID 864 wrote to memory of 2652 864 WindowsService.exe 37 PID 864 wrote to memory of 2652 864 WindowsService.exe 37 PID 864 wrote to memory of 2652 864 WindowsService.exe 37 PID 864 wrote to memory of 2652 864 WindowsService.exe 37 PID 864 wrote to memory of 2652 864 WindowsService.exe 37 PID 864 wrote to memory of 2652 864 WindowsService.exe 37 PID 864 wrote to memory of 2652 864 WindowsService.exe 37 PID 864 wrote to memory of 2652 864 WindowsService.exe 37 PID 864 wrote to memory of 2652 864 WindowsService.exe 37 PID 864 wrote to memory of 2652 864 WindowsService.exe 37 PID 864 wrote to memory of 2652 864 WindowsService.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\95c8d93702e7063e7db9555969545540N.exe"C:\Users\Admin\AppData\Local\Temp\95c8d93702e7063e7db9555969545540N.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\95c8d93702e7063e7db9555969545540N.exe"C:\Users\Admin\AppData\Local\Temp\95c8d93702e7063e7db9555969545540N.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\AITVQ.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "sidebar" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe" /f4⤵
- Adds Run key to start application
PID:2168
-
-
-
C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2996
-
-
C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"4⤵
- Executes dropped EXE
PID:2652
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
157B
MD5f6a90c20834f271a907a4e2bc28184c2
SHA136c9d1602b74f622346fbb22693597d7889df48d
SHA25673f29cd953eee40cea4de67842556ffd96efe8094a6a9b70f33a35df2582febd
SHA51239cabae19fe1faa37455e4bd242c868be60d6252b07f01224b3f7501c3cf734e503300b840d83381a452707cab6df2f95f920655884be56d4024676b26943804
-
Filesize
304KB
MD595c8d93702e7063e7db9555969545540
SHA131fb6c9b10e2a75634fe6fbd3fbe23eeb85bf569
SHA256de4ec1fb441ef422cd308ccb378f490ee728f8dc89b7f0cac4056c72e5474960
SHA512d6b960ce8dbfaa9b3684f2a1e7dfbeb5f634e13c00131b9263880612215441abebd42a1c94766ec83307a1009bcc423f70942be9978cde80fa40b08510f9a9fa
-
Filesize
304KB
MD52612ae0612cfbd59bf30dae2ca299e2b
SHA1e41f95a3667771b1fad290e3e1aa75221cfa4580
SHA256e9295155d8bf18449d3cec0ae3d861aa1f238834e2a871064caf05f84cec91ca
SHA512ce6dbf71ed14d25a8771e1a4fda839483cc8d9a2af31c9461eab39caa0571fbbd1125711feb959e3b2b31b655a245957b7673bb815f8cbe2ef0f29680351dbf0