Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03/09/2024, 19:58 UTC

General

  • Target

    2aea86819a6b684a5fbcad254441232d03ce9c9d7a7841939f9a19097dc70df3.exe

  • Size

    204KB

  • MD5

    812845a38d0e46c33d6158022a93546e

  • SHA1

    b94bd84bf01c5f2ace6f57e68e1ef4f02e122027

  • SHA256

    2aea86819a6b684a5fbcad254441232d03ce9c9d7a7841939f9a19097dc70df3

  • SHA512

    b039e4d5b6b8bd5e2dccf4ec79ec2ae5f75eb8a8e864c64705c1706f6fd47f9ee0ca4bdc370fec0527621bf1f8bb7d25df134571887abd94f22d3e7d3ae90d7a

  • SSDEEP

    1536:1EGh0oBl15IRVhNJ5Qef7BudMeNzVg3Ve+rrS2GunMxVS3Hgdo:1EGh0oBl1OPOe2MUVg3Ve+rXfMUy

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 11 IoCs
  • Drops file in Windows directory 11 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 23 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2aea86819a6b684a5fbcad254441232d03ce9c9d7a7841939f9a19097dc70df3.exe
    "C:\Users\Admin\AppData\Local\Temp\2aea86819a6b684a5fbcad254441232d03ce9c9d7a7841939f9a19097dc70df3.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Windows\{F7F163D9-7150-446e-B3D4-EAEFF8472C1F}.exe
      C:\Windows\{F7F163D9-7150-446e-B3D4-EAEFF8472C1F}.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2716
      • C:\Windows\{3BCEA048-B3BC-4ea2-80A4-EFAA8395F148}.exe
        C:\Windows\{3BCEA048-B3BC-4ea2-80A4-EFAA8395F148}.exe
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2760
        • C:\Windows\{350A5D8C-42B9-4340-AEB7-5413505BBC04}.exe
          C:\Windows\{350A5D8C-42B9-4340-AEB7-5413505BBC04}.exe
          4⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2692
          • C:\Windows\{FDF291FD-9E8F-432f-A715-E5561C9B780D}.exe
            C:\Windows\{FDF291FD-9E8F-432f-A715-E5561C9B780D}.exe
            5⤵
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1712
            • C:\Windows\{343A1A79-8849-436f-89F6-9D3DE75FD100}.exe
              C:\Windows\{343A1A79-8849-436f-89F6-9D3DE75FD100}.exe
              6⤵
              • Boot or Logon Autostart Execution: Active Setup
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1976
              • C:\Windows\{A1400617-2A40-447c-AE77-E38C699C452D}.exe
                C:\Windows\{A1400617-2A40-447c-AE77-E38C699C452D}.exe
                7⤵
                • Boot or Logon Autostart Execution: Active Setup
                • Executes dropped EXE
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2632
                • C:\Windows\{D8A5B69A-F576-44db-BE7B-EF6A18570F7B}.exe
                  C:\Windows\{D8A5B69A-F576-44db-BE7B-EF6A18570F7B}.exe
                  8⤵
                  • Boot or Logon Autostart Execution: Active Setup
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1140
                  • C:\Windows\{6CC559A8-02B3-415a-9D76-BC08B4E72879}.exe
                    C:\Windows\{6CC559A8-02B3-415a-9D76-BC08B4E72879}.exe
                    9⤵
                    • Boot or Logon Autostart Execution: Active Setup
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3044
                    • C:\Windows\{468A1795-ACC8-4126-A06F-C076F713C67C}.exe
                      C:\Windows\{468A1795-ACC8-4126-A06F-C076F713C67C}.exe
                      10⤵
                      • Boot or Logon Autostart Execution: Active Setup
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1408
                      • C:\Windows\{53A7CDAC-FE36-4095-B66E-48D3EBABBECA}.exe
                        C:\Windows\{53A7CDAC-FE36-4095-B66E-48D3EBABBECA}.exe
                        11⤵
                        • Boot or Logon Autostart Execution: Active Setup
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of AdjustPrivilegeToken
                        PID:396
                        • C:\Windows\{C75B414F-E5E0-44b5-9C4B-8A7A81F96BAB}.exe
                          C:\Windows\{C75B414F-E5E0-44b5-9C4B-8A7A81F96BAB}.exe
                          12⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:1876
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /c del C:\Windows\{53A7C~1.EXE > nul
                          12⤵
                          • System Location Discovery: System Language Discovery
                          PID:916
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c del C:\Windows\{468A1~1.EXE > nul
                        11⤵
                        • System Location Discovery: System Language Discovery
                        PID:1032
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{6CC55~1.EXE > nul
                      10⤵
                      • System Location Discovery: System Language Discovery
                      PID:284
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{D8A5B~1.EXE > nul
                    9⤵
                    • System Location Discovery: System Language Discovery
                    PID:3052
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{A1400~1.EXE > nul
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:332
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c del C:\Windows\{343A1~1.EXE > nul
                7⤵
                • System Location Discovery: System Language Discovery
                PID:2952
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c del C:\Windows\{FDF29~1.EXE > nul
              6⤵
              • System Location Discovery: System Language Discovery
              PID:1048
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{350A5~1.EXE > nul
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2100
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{3BCEA~1.EXE > nul
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2620
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Windows\{F7F16~1.EXE > nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2684
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\2AEA86~1.EXE > nul
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2576

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\{343A1A79-8849-436f-89F6-9D3DE75FD100}.exe

    Filesize

    204KB

    MD5

    b1462f7a7ec452679014572305a320d8

    SHA1

    67c9da08ed8798e62854552d4e801e88fbeb5d19

    SHA256

    dd08e8fc48845886700b6c9b14db5019b5bf3c68f9aaee017ee0b62af85d0e96

    SHA512

    19e3cdca01439649c6c7f89e2ee8b33da1a0b0c8927d91114e1cbffc55f1b1c902c0d4d46111a47e1eff25cb2b783c372247df7c49c79d2a84a54f4ef2c3ea99

  • C:\Windows\{350A5D8C-42B9-4340-AEB7-5413505BBC04}.exe

    Filesize

    204KB

    MD5

    f64501274dd32970f3a4c7f450450b7c

    SHA1

    619f392487635e59a870a6164a2ea456f8cb3262

    SHA256

    025af8e5916e5d00453a4f225a169d2679029efd0c98dc480d537e86150df36b

    SHA512

    9c6e36fee6a3786ef30e30971ec0681acca08f358c3089acb6d7cd945dc3ca1776cff98d52c13ae33352246989c9684f408b4234dff186a6ef380a62dd06c6ea

  • C:\Windows\{3BCEA048-B3BC-4ea2-80A4-EFAA8395F148}.exe

    Filesize

    204KB

    MD5

    c767fc1bb77ae07ce213b22e1443e1b3

    SHA1

    7d26d0e3c919065bc55b5d07a8c27b122ef541b9

    SHA256

    1e88f054d952a2e000811dea8d52f5f78ba67de51c27ad4008cb471209a8cdb2

    SHA512

    afaed82e273a0ee7e67985bfa4857748a2fbca3b07868e4be7559246c08ab2347742787f80abcc67ef1a1ca4b85ed28c5c80b6f90f0c4a86625007f477fd6e3b

  • C:\Windows\{468A1795-ACC8-4126-A06F-C076F713C67C}.exe

    Filesize

    204KB

    MD5

    160ba3edccb9f22e4b1b3eee0932d247

    SHA1

    41db4de5d1ee861b4a3db79f023000098ef41c07

    SHA256

    4b133719e7b12e23394765621b172d2f80f6e2b87bc8c6ae32cc92f45cc2b8ae

    SHA512

    ee6f6281c2f9a8609ca56200b2703349bf28612c21a9586143c7912c014e71c7212a1ccdc1a427f1eb7ce0e617a7119b403597c5f056464970353a7a7f891af4

  • C:\Windows\{53A7CDAC-FE36-4095-B66E-48D3EBABBECA}.exe

    Filesize

    204KB

    MD5

    e4ccd046818366c056d53ad13b41237b

    SHA1

    597f42f613a292ca1db66d9c972a35b5737fd6fe

    SHA256

    3b4588f7bddb8e65b4de7c3dcbe71658e3b7bd8d62da6a85d7378324697cffec

    SHA512

    b779b241dad61e8f5dced37fa071659e47294a035abc2f072c63e620af0f36453745b97e4b4e7759fb9885e36d0a1d07be109a5bcf093fb3357bbfc86df790e9

  • C:\Windows\{6CC559A8-02B3-415a-9D76-BC08B4E72879}.exe

    Filesize

    204KB

    MD5

    09616d1f80dd6cbebf2b41124a07ff40

    SHA1

    89a57dbe6812e3326d01da041aac696f25f409bc

    SHA256

    07b3849e158ea07d4b61d4ac791022907a9cdb3647a18f30f02dede014394cf6

    SHA512

    b58300de153a9433067ade185351c6e46883aad2125ade67a08097e4427221b38e779eb76009a9b143c3503da4f00817a60513880a3be355c240f783b7f15023

  • C:\Windows\{A1400617-2A40-447c-AE77-E38C699C452D}.exe

    Filesize

    204KB

    MD5

    3e06540eef052017cbc8af078a2833c3

    SHA1

    56d7751faa303a7a1639c30ef2e77c8b8ee03551

    SHA256

    d22a4edadfbe76e6f33a7f2b54fe4f666a30d0723d9ad2393c3d03b9b3016077

    SHA512

    af1f1470f84a1f1b40874f9fe23e58151afefa4423dc14e07eff5660ea6da691b50adf80dce9e7083ff12461db1f24b26b39d6d9ea202c24d978bf4d02855d54

  • C:\Windows\{C75B414F-E5E0-44b5-9C4B-8A7A81F96BAB}.exe

    Filesize

    204KB

    MD5

    7863e356f84121b9a36d901ceffd881f

    SHA1

    0d2e119e94e6785fbe1e0038e929f797d3c74e24

    SHA256

    9388bd9584c5f3851b6e2526d84f12445b97e49018085710e5e0c88145156a37

    SHA512

    6e0be52faee05a5e120785824d828131c21bb0423e241dbb0958111e9945cc1c56d7bb6334e12d675443e272f8f97a9c30dc128614d09469676036d7a562f420

  • C:\Windows\{D8A5B69A-F576-44db-BE7B-EF6A18570F7B}.exe

    Filesize

    204KB

    MD5

    35ba3b7a069a9a5b793463c371c4a162

    SHA1

    371bc5f31394f62bd9e9b6063f2310cd2c4adfb1

    SHA256

    dc3f4fb1aca57f8cd1136b766e339bff26363717896c60efce3c9333eb072520

    SHA512

    14879dd2f955aff0e2a9d444d4384c7bdbf0bd236b8748e56f3cd11ca347fb5e446dc0dbc3c7244543450d6c11f5b0799b7a0118a02c92471431ed271de76b57

  • C:\Windows\{F7F163D9-7150-446e-B3D4-EAEFF8472C1F}.exe

    Filesize

    204KB

    MD5

    01416e1702fa5c43a9eb3744b04a89aa

    SHA1

    60bd51fbb71c2c0f689ef4e96fb01af97540a237

    SHA256

    166a2783db2fe48484fa2550302116e4e4bdd6b5e50495a1d402775e22f3a6e2

    SHA512

    3756d01fd0034ff496176772a3f333aefefbb52ccd134ea9652f8c79c5a1b73b1599c0f67644390e5964a124cbc6562befdcc6b4389f67c47002e847f4f2553e

  • C:\Windows\{FDF291FD-9E8F-432f-A715-E5561C9B780D}.exe

    Filesize

    204KB

    MD5

    9ec35a2a1c4056a7cd138bfb8f3f50da

    SHA1

    0c57afa6559750143db7e7c4c54832df8ec17d67

    SHA256

    510cb1c56559c63e31f6efd285a2501d374e6e5cef5562d4061f517ec2794e7f

    SHA512

    49c35da2106d0e9d1b0653a19c7a16772b35af02102be11e3500991da512a4746816c62b1351c50cc1b1bfb8dfb12f037f58db027b071dc8f257bb2f2020a11f

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.