Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
115s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/09/2024, 00:33
Behavioral task
behavioral1
Sample
2f8df73e7d4092fe0087ba993cbace70N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2f8df73e7d4092fe0087ba993cbace70N.exe
Resource
win10v2004-20240802-en
General
-
Target
2f8df73e7d4092fe0087ba993cbace70N.exe
-
Size
41KB
-
MD5
2f8df73e7d4092fe0087ba993cbace70
-
SHA1
c9b3571a3ba5a6baa4c50cdf65eddc78b822732f
-
SHA256
b13ab3dc1bb327e2b74bf44e94a26a7d89957623b6e787ad4413fc5ca78dc993
-
SHA512
8ee474e2c4c9544983d3ae0a79300507a50723bffa00d10ecdc097d0a7567a841da53d3b2e8f959032cc106e38c94c54bd542b279d6ab83643b5f1c2fcdda9a4
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/:AEwVs+0jNDY1qi/q
Malware Config
Signatures
-
Detects MyDoom family 9 IoCs
resource yara_rule behavioral1/memory/1788-2-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/1788-9-0x0000000000400000-0x0000000000408000-memory.dmp family_mydoom behavioral1/memory/1788-17-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/1788-37-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/1788-58-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/1788-60-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/1788-65-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/1788-72-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/1788-77-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom -
Executes dropped EXE 1 IoCs
pid Process 2320 services.exe -
resource yara_rule behavioral1/memory/1788-2-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/1788-4-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x0008000000017481-7.dat upx behavioral1/memory/2320-11-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1788-9-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1788-17-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2320-20-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2320-21-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2320-26-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2320-31-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2320-33-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1788-37-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2320-38-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/files/0x0005000000004ed7-48.dat upx behavioral1/memory/1788-58-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2320-59-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1788-60-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2320-61-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1788-65-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2320-66-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2320-71-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1788-72-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2320-73-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/1788-77-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2320-78-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" 2f8df73e7d4092fe0087ba993cbace70N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\java.exe 2f8df73e7d4092fe0087ba993cbace70N.exe File created C:\Windows\services.exe 2f8df73e7d4092fe0087ba993cbace70N.exe File opened for modification C:\Windows\java.exe 2f8df73e7d4092fe0087ba993cbace70N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f8df73e7d4092fe0087ba993cbace70N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1788 wrote to memory of 2320 1788 2f8df73e7d4092fe0087ba993cbace70N.exe 30 PID 1788 wrote to memory of 2320 1788 2f8df73e7d4092fe0087ba993cbace70N.exe 30 PID 1788 wrote to memory of 2320 1788 2f8df73e7d4092fe0087ba993cbace70N.exe 30 PID 1788 wrote to memory of 2320 1788 2f8df73e7d4092fe0087ba993cbace70N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f8df73e7d4092fe0087ba993cbace70N.exe"C:\Users\Admin\AppData\Local\Temp\2f8df73e7d4092fe0087ba993cbace70N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD5e3bfd295b4ba1bd5df7d67062e2f12f7
SHA1907e3b34aa8172cf5c5086fb7819d02c6d15cb86
SHA256b00a8abfcb6728695f2bc4690155c1a4e2e9e89793efb4203ab0d59323a28d48
SHA512ed9912dfd92e21f3d62a0021602c0d7197fc7b36658cea79c0c98ecd871c830bdeaf6688494f8cfc8c9de592a20a98272216aa3e1fad6ce4e103cbd0e12ef98f
-
Filesize
192B
MD5f3c5566c81ea130acbfc5f5e49c29ac1
SHA19950af47abee1800df94854226c8e14afc3cea2c
SHA256502e50e8ded40e9dedb9fd6344033ffc6e4393cd7b36ed7909a9ecb022393f47
SHA51219f6ae6071f42a7c09b12fa7b227c2b05efe467daf4457a0ed44951ab87764bab31b70136711edfbf2be79c52a01f293008bdb6dc0a26ed8c067b74ce7545f96
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2