Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 07:27
Behavioral task
behavioral1
Sample
0c7b1dafed4420aab551544f4ca8813f1556e19442f75046b00bb0c952215456.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0c7b1dafed4420aab551544f4ca8813f1556e19442f75046b00bb0c952215456.exe
Resource
win10v2004-20240802-en
General
-
Target
0c7b1dafed4420aab551544f4ca8813f1556e19442f75046b00bb0c952215456.exe
-
Size
158KB
-
MD5
95408095927f78deffaeb9cb1f4cd44d
-
SHA1
5e98f7cc5b8bce4dcefddc0313fe1ccc15ffe08c
-
SHA256
0c7b1dafed4420aab551544f4ca8813f1556e19442f75046b00bb0c952215456
-
SHA512
b415f4c6d87a3a609fb554e4ee0af4f27ac8f954e85daada7d3034134a5a24b71401819d702f45e24aece4183059149c56d0936ac25dd4c5a106dc3fd09d1a81
-
SSDEEP
3072:s3pAiuZ03rXGkMTCyymEUoRBiaQaS/dqG9fvX7ZYl3QamlPx6AkyWx:obuZ6rXRW/HRag/dqs7ZCQ5Z6Ak/
Malware Config
Signatures
-
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\System32\oobe\AnyDeskCrashHandler.exe 0c7b1dafed4420aab551544f4ca8813f1556e19442f75046b00bb0c952215456.exe File created C:\Windows\System32\oobe\MicrosoftWindowsDefenderCoreService.exe 0c7b1dafed4420aab551544f4ca8813f1556e19442f75046b00bb0c952215456.exe File created C:\Windows\System32\WindowsUpdate.txt 0c7b1dafed4420aab551544f4ca8813f1556e19442f75046b00bb0c952215456.exe File created C:\Windows\System32\AnyDeskShellIntegration.dll 0c7b1dafed4420aab551544f4ca8813f1556e19442f75046b00bb0c952215456.exe -
resource yara_rule behavioral1/memory/2368-0-0x000000013F3C0000-0x000000013F41E000-memory.dmp upx behavioral1/memory/2368-163-0x000000013F3C0000-0x000000013F41E000-memory.dmp upx behavioral1/memory/2368-166-0x000000013F3C0000-0x000000013F41E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2692 2368 0c7b1dafed4420aab551544f4ca8813f1556e19442f75046b00bb0c952215456.exe 30 PID 2368 wrote to memory of 2692 2368 0c7b1dafed4420aab551544f4ca8813f1556e19442f75046b00bb0c952215456.exe 30 PID 2368 wrote to memory of 2692 2368 0c7b1dafed4420aab551544f4ca8813f1556e19442f75046b00bb0c952215456.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c7b1dafed4420aab551544f4ca8813f1556e19442f75046b00bb0c952215456.exe"C:\Users\Admin\AppData\Local\Temp\0c7b1dafed4420aab551544f4ca8813f1556e19442f75046b00bb0c952215456.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c DEL /F /S /Q "C:\Windows\System32\WindowsUpdate.txt"2⤵PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b