Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06/08/2024, 03:14
Static task
static1
Behavioral task
behavioral1
Sample
d90dac9586fe39d9be072d88a48363339beccf10d2ed73581c05da2a9e78363a.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d90dac9586fe39d9be072d88a48363339beccf10d2ed73581c05da2a9e78363a.exe
Resource
win10v2004-20240802-en
General
-
Target
d90dac9586fe39d9be072d88a48363339beccf10d2ed73581c05da2a9e78363a.exe
-
Size
384KB
-
MD5
a8ed87317006fa535844f05b1b2f649f
-
SHA1
63061c935151b19a5dc308c658ebd47e4641324e
-
SHA256
d90dac9586fe39d9be072d88a48363339beccf10d2ed73581c05da2a9e78363a
-
SHA512
87dbb362549b317ace0585626b88b161ec37ca65f8d0df17edf9bef8efd0e331fafcb03292bf9db9ea2ce8d9c7b7e6f25d7a9f7ffe9eda9e7ab25ddfe0d19142
-
SSDEEP
6144:d0E523Mak8/k/j+zHmlGyZ6YugQdjGG1wsKm6eBgdQbkoKTBEAz/6DG1ETdqvZNS:d0E03Mak8u8KGyXu1jGG1wsGeBgRTGAC
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad d90dac9586fe39d9be072d88a48363339beccf10d2ed73581c05da2a9e78363a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\Web Event Logger = "{79FAA099-1BAE-816E-D711-115290CEE717}" d90dac9586fe39d9be072d88a48363339beccf10d2ed73581c05da2a9e78363a.exe -
Executes dropped EXE 1 IoCs
pid Process 3044 Dpapaj32.exe -
Loads dropped DLL 5 IoCs
pid Process 2168 d90dac9586fe39d9be072d88a48363339beccf10d2ed73581c05da2a9e78363a.exe 2168 d90dac9586fe39d9be072d88a48363339beccf10d2ed73581c05da2a9e78363a.exe 3052 WerFault.exe 3052 WerFault.exe 3052 WerFault.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\Pdkefp32.dll d90dac9586fe39d9be072d88a48363339beccf10d2ed73581c05da2a9e78363a.exe File created C:\Windows\SysWOW64\ÿs.e¢e Dpapaj32.exe File opened for modification C:\Windows\SysWOW64\ÿs.e¢e Dpapaj32.exe File created C:\Windows\SysWOW64\Dpapaj32.exe d90dac9586fe39d9be072d88a48363339beccf10d2ed73581c05da2a9e78363a.exe File opened for modification C:\Windows\SysWOW64\Dpapaj32.exe d90dac9586fe39d9be072d88a48363339beccf10d2ed73581c05da2a9e78363a.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3052 3044 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dpapaj32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d90dac9586fe39d9be072d88a48363339beccf10d2ed73581c05da2a9e78363a.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32 d90dac9586fe39d9be072d88a48363339beccf10d2ed73581c05da2a9e78363a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node d90dac9586fe39d9be072d88a48363339beccf10d2ed73581c05da2a9e78363a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID d90dac9586fe39d9be072d88a48363339beccf10d2ed73581c05da2a9e78363a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717} d90dac9586fe39d9be072d88a48363339beccf10d2ed73581c05da2a9e78363a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ = "C:\\Windows\\SysWow64\\Pdkefp32.dll" d90dac9586fe39d9be072d88a48363339beccf10d2ed73581c05da2a9e78363a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{79FAA099-1BAE-816E-D711-115290CEE717}\InProcServer32\ThreadingModel = "Apartment" d90dac9586fe39d9be072d88a48363339beccf10d2ed73581c05da2a9e78363a.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2168 wrote to memory of 3044 2168 d90dac9586fe39d9be072d88a48363339beccf10d2ed73581c05da2a9e78363a.exe 31 PID 2168 wrote to memory of 3044 2168 d90dac9586fe39d9be072d88a48363339beccf10d2ed73581c05da2a9e78363a.exe 31 PID 2168 wrote to memory of 3044 2168 d90dac9586fe39d9be072d88a48363339beccf10d2ed73581c05da2a9e78363a.exe 31 PID 2168 wrote to memory of 3044 2168 d90dac9586fe39d9be072d88a48363339beccf10d2ed73581c05da2a9e78363a.exe 31 PID 3044 wrote to memory of 3052 3044 Dpapaj32.exe 32 PID 3044 wrote to memory of 3052 3044 Dpapaj32.exe 32 PID 3044 wrote to memory of 3052 3044 Dpapaj32.exe 32 PID 3044 wrote to memory of 3052 3044 Dpapaj32.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\d90dac9586fe39d9be072d88a48363339beccf10d2ed73581c05da2a9e78363a.exe"C:\Users\Admin\AppData\Local\Temp\d90dac9586fe39d9be072d88a48363339beccf10d2ed73581c05da2a9e78363a.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\Dpapaj32.exeC:\Windows\system32\Dpapaj32.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3044 -s 1443⤵
- Loads dropped DLL
- Program crash
PID:3052
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD548eca9c797cdd12b9ca47e9deb3787bf
SHA1926c1a3392ca775f66962e830801ebc047b69867
SHA256ba0840585357b9d28d8f403b7ca924958b9c7c9526cbebc80b2ed53cc66c4d7d
SHA5125863f65c555fb078aa3738bcf863335e9df863f1922581205c61cd2cf765f0277677784416123ce165a4fc1d5b016b29876696f2297670d00c2dc7b72b26172a