Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 20:08
Behavioral task
behavioral1
Sample
a9092f39739f07dd881dd8f07266da7289eb40042d69da0fe05aaa9074002f90N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a9092f39739f07dd881dd8f07266da7289eb40042d69da0fe05aaa9074002f90N.exe
Resource
win10v2004-20240802-en
General
-
Target
a9092f39739f07dd881dd8f07266da7289eb40042d69da0fe05aaa9074002f90N.exe
-
Size
29KB
-
MD5
98a5e00c3b09f11d2f920d7dc32176a0
-
SHA1
e244790fb34a8cd82d5d46bf188b2f393cf679f4
-
SHA256
a9092f39739f07dd881dd8f07266da7289eb40042d69da0fe05aaa9074002f90
-
SHA512
a6913527b13d16dfe482b8e212d449aecf8db1e051926ea356636eccd63cea3e31692f2d6dcde69a49a3565934aec57bf5e00c9699655c440365d44c0c2adcaa
-
SSDEEP
768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/K6:AEwVs+0jNDY1qi/qb
Malware Config
Signatures
-
Detects MyDoom family 6 IoCs
resource yara_rule behavioral1/memory/2548-16-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/2548-31-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/2548-36-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/2548-54-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/2548-61-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom behavioral1/memory/2548-68-0x0000000000500000-0x0000000000510200-memory.dmp family_mydoom -
Executes dropped EXE 1 IoCs
pid Process 340 services.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JavaVM = "C:\\Windows\\java.exe" a9092f39739f07dd881dd8f07266da7289eb40042d69da0fe05aaa9074002f90N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Services = "C:\\Windows\\services.exe" services.exe -
resource yara_rule behavioral1/memory/2548-0-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/2548-4-0x0000000000220000-0x0000000000228000-memory.dmp upx behavioral1/files/0x000700000001925c-7.dat upx behavioral1/memory/340-10-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2548-16-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/340-19-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/340-20-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/340-25-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/340-30-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/340-32-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2548-31-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/340-37-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2548-36-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/files/0x0004000000004ed7-42.dat upx behavioral1/memory/340-55-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2548-54-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/340-57-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/340-62-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2548-61-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/340-67-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/2548-68-0x0000000000500000-0x0000000000510200-memory.dmp upx behavioral1/memory/340-69-0x0000000000400000-0x0000000000408000-memory.dmp upx behavioral1/memory/340-74-0x0000000000400000-0x0000000000408000-memory.dmp upx -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\services.exe a9092f39739f07dd881dd8f07266da7289eb40042d69da0fe05aaa9074002f90N.exe File opened for modification C:\Windows\java.exe a9092f39739f07dd881dd8f07266da7289eb40042d69da0fe05aaa9074002f90N.exe File created C:\Windows\java.exe a9092f39739f07dd881dd8f07266da7289eb40042d69da0fe05aaa9074002f90N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a9092f39739f07dd881dd8f07266da7289eb40042d69da0fe05aaa9074002f90N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2548 wrote to memory of 340 2548 a9092f39739f07dd881dd8f07266da7289eb40042d69da0fe05aaa9074002f90N.exe 30 PID 2548 wrote to memory of 340 2548 a9092f39739f07dd881dd8f07266da7289eb40042d69da0fe05aaa9074002f90N.exe 30 PID 2548 wrote to memory of 340 2548 a9092f39739f07dd881dd8f07266da7289eb40042d69da0fe05aaa9074002f90N.exe 30 PID 2548 wrote to memory of 340 2548 a9092f39739f07dd881dd8f07266da7289eb40042d69da0fe05aaa9074002f90N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9092f39739f07dd881dd8f07266da7289eb40042d69da0fe05aaa9074002f90N.exe"C:\Users\Admin\AppData\Local\Temp\a9092f39739f07dd881dd8f07266da7289eb40042d69da0fe05aaa9074002f90N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\services.exe"C:\Windows\services.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD51cfb09e45462abbe3e368e953d3097f7
SHA1bfd5966bd7f1fe52a079d6653af4ddc2222708aa
SHA256e67ca6f2e1b3e9d3585ad0b33550b5e262aa6fb7c7566f20e204dfa081cfc047
SHA5125894a77570495a787415687da59c6921b39ebaa51836bc5847ab6ca5bb93108940c64f9a53d0103f7fafbc9f301a6e1a3d39723aa5b3599654b26bb37771c42e
-
Filesize
320B
MD5f03cdfc359f7f9980a35effa99c3fd72
SHA1e9ad016a265343cde76bf1306ddf29d242a92158
SHA2562f81506fcfc2c191cd6babe6b6c4c3df4a5402cabbe57e455c80d4d6b6e7736a
SHA512c9924a97c8b88e50a0ed2462cccf887cdf42f8c908117257a97b23c41a824046d367c49f39cb5200e97ce6fd71b7cbe40219aa30b8c1e241dffe4a77df2b10a1
-
Filesize
320B
MD59dde746c808c93159be5919469d6ba59
SHA103c7b48f04b2dfa57cce4c2f7df8fd85c3866863
SHA2561c18eaba9b8cde4fa4c0974a90650a6d41eec33b2ccfabcbdf67ab9f724af90e
SHA51207027c8de49baa40480b5bd9ee117d3c9dcce10f17eea400f0bbc68663a35bd4c2495a75ca2d39cf3157905a6d4c1ab655b2a7c208b70fe1e8a3b6cca7cfbba9
-
Filesize
8KB
MD5b0fe74719b1b647e2056641931907f4a
SHA1e858c206d2d1542a79936cb00d85da853bfc95e2
SHA256bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c
SHA5129c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2