Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
70b42c766b0...32.exe
windows7-x64
1011f9bb7186...6b.exe
windows7-x64
3childmoney.exe
windows7-x64
31c281ece6f...2a.exe
windows7-x64
332bb88fa59...4b.exe
windows7-x64
35056cbe553...3d.exe
windows7-x64
350e0f20cb3...69.exe
windows7-x64
657bbc27030...7b.exe
windows7-x64
365a84ff98e...02.exe
windows7-x64
106db6ac1ce8...be.exe
windows7-x64
1072745efc42...46.exe
windows7-x64
10751fb51baa...fe.exe
windows7-x64
1095e95a5be0...63.exe
windows7-x64
3a935725900...07.exe
windows7-x64
3c190931380...74.dll
windows7-x64
3dafc6c03ef...19.exe
windows7-x64
1e3c6c48ba7...87.exe
windows7-x64
10edbb453cc0...46.exe
windows7-x64
5f633e6f255...4b.exe
windows7-x64
fda537bc5e...ad.exe
windows7-x64
3Analysis
-
max time kernel
4s -
max time network
6s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/11/2024, 19:18
Behavioral task
behavioral1
Sample
0b42c766b056ee3a04b2e0b833c4f42e1520516e047330df3c5640dfcc492232.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
11f9bb7186adbefb2633904f1626b20f3f8d0d3ecb98e55a3a81e6a17039786b.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
childmoney.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
1c281ece6f6be8983f6f858636ddf9169dcb00ec2c0a98d0797bf8d3619cb22a.exe
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
32bb88fa592ba0f338d58730d224728823684134157afe5892f5bbd8c042d54b.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
5056cbe5539d0e171c81451306f2a970b43a6039dd847316a96f24be7b19453d.exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
50e0f20cb3844c6b0ddc4af01daf274b7ebdddd0d322f06f05b7d6fec7c16869.exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
57bbc27030a7c47b62aa08d6d05b6c7eee36010246260924ed6b85ff7e53917b.exe
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
65a84ff98e09a002d01b1c2935ca603125c8ddcb5c5824da9cc60787594a5202.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
6db6ac1ce8f946e0b441c1a1be1b0f094cef331231ae4f9d58b30e3e353145be.exe
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
72745efc423d4adb76434360755cfbc3cfe8fa47ba8e5fa2920ada7dc9ceb146.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
751fb51baa5a4ed44c9c2bb45b824831914025e87d4d866e5861a38f734d8bfe.exe
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
95e95a5be0b57cee969c5d9f616be2e973bc08a77482c75570936faaaaa35063.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
a935725900d1ad19b92bcda1c0d612bccccd8bba53dd6e13cabe6d59d7874607.exe
Resource
win7-20241010-en
Behavioral task
behavioral15
Sample
c19093138028ea6a6a6665e270c36558757931f1d7f6f88910b08e39903a1774.dll
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
dafc6c03ef671f66ddbe47e6eee600d2dfa894eee1c1b67d51d3a24532f58e19.exe
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
e3c6c48ba7d213e5c5c31f43d70dc4ca1709fc29e06883f64487ad049a520b87.exe
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
edbb453cc08e8ac79d0c60c0f1ca3803060e8c3a4dd2e2a7b40c50ec3fb0dd46.exe
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
f633e6f25507a6d99ad2474ca4528ef4fdf8f124cade2daa51d310733a62114b.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
fda537bc5e4051c8c69491089041df58483e31f410f180c5767901a53a67f9ad.exe
Resource
win7-20240903-en
Errors
General
-
Target
f633e6f25507a6d99ad2474ca4528ef4fdf8f124cade2daa51d310733a62114b.exe
-
Size
160KB
-
MD5
f0949d80cff63963625fcdf1fbb77ca8
-
SHA1
9e640241e9b3c11af65665d6ebde18d762bf2d2a
-
SHA256
f633e6f25507a6d99ad2474ca4528ef4fdf8f124cade2daa51d310733a62114b
-
SHA512
bc97e3a430a7f7d09acb7dd1ca5cb9d100141371355fab7768155a9265c56777e06de67ffe7b8ad82b762f8306ae64534abc8ad7947b3f0c1e86d6487e5f1f51
-
SSDEEP
3072:usN4+W+ogJ4i9zgCTwTmYPtZNpVvQVZQUrUMyCZLFJd3:VDTJKzqOuVzAMyOp
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2108 x2z8.exe -
Executes dropped EXE 2 IoCs
pid Process 2340 x2z8.exe 2108 x2z8.exe -
Loads dropped DLL 3 IoCs
pid Process 2080 f633e6f25507a6d99ad2474ca4528ef4fdf8f124cade2daa51d310733a62114b.exe 2080 f633e6f25507a6d99ad2474ca4528ef4fdf8f124cade2daa51d310733a62114b.exe 2340 x2z8.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 f633e6f25507a6d99ad2474ca4528ef4fdf8f124cade2daa51d310733a62114b.exe File opened for modification \??\PHYSICALDRIVE0 x2z8.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1624 set thread context of 2080 1624 f633e6f25507a6d99ad2474ca4528ef4fdf8f124cade2daa51d310733a62114b.exe 31 PID 2340 set thread context of 2108 2340 x2z8.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f633e6f25507a6d99ad2474ca4528ef4fdf8f124cade2daa51d310733a62114b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x2z8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x2z8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f633e6f25507a6d99ad2474ca4528ef4fdf8f124cade2daa51d310733a62114b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2108 x2z8.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1624 wrote to memory of 2080 1624 f633e6f25507a6d99ad2474ca4528ef4fdf8f124cade2daa51d310733a62114b.exe 31 PID 1624 wrote to memory of 2080 1624 f633e6f25507a6d99ad2474ca4528ef4fdf8f124cade2daa51d310733a62114b.exe 31 PID 1624 wrote to memory of 2080 1624 f633e6f25507a6d99ad2474ca4528ef4fdf8f124cade2daa51d310733a62114b.exe 31 PID 1624 wrote to memory of 2080 1624 f633e6f25507a6d99ad2474ca4528ef4fdf8f124cade2daa51d310733a62114b.exe 31 PID 1624 wrote to memory of 2080 1624 f633e6f25507a6d99ad2474ca4528ef4fdf8f124cade2daa51d310733a62114b.exe 31 PID 1624 wrote to memory of 2080 1624 f633e6f25507a6d99ad2474ca4528ef4fdf8f124cade2daa51d310733a62114b.exe 31 PID 2080 wrote to memory of 2340 2080 f633e6f25507a6d99ad2474ca4528ef4fdf8f124cade2daa51d310733a62114b.exe 32 PID 2080 wrote to memory of 2340 2080 f633e6f25507a6d99ad2474ca4528ef4fdf8f124cade2daa51d310733a62114b.exe 32 PID 2080 wrote to memory of 2340 2080 f633e6f25507a6d99ad2474ca4528ef4fdf8f124cade2daa51d310733a62114b.exe 32 PID 2080 wrote to memory of 2340 2080 f633e6f25507a6d99ad2474ca4528ef4fdf8f124cade2daa51d310733a62114b.exe 32 PID 2340 wrote to memory of 2108 2340 x2z8.exe 33 PID 2340 wrote to memory of 2108 2340 x2z8.exe 33 PID 2340 wrote to memory of 2108 2340 x2z8.exe 33 PID 2340 wrote to memory of 2108 2340 x2z8.exe 33 PID 2340 wrote to memory of 2108 2340 x2z8.exe 33 PID 2340 wrote to memory of 2108 2340 x2z8.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\f633e6f25507a6d99ad2474ca4528ef4fdf8f124cade2daa51d310733a62114b.exe"C:\Users\Admin\AppData\Local\Temp\f633e6f25507a6d99ad2474ca4528ef4fdf8f124cade2daa51d310733a62114b.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\f633e6f25507a6d99ad2474ca4528ef4fdf8f124cade2daa51d310733a62114b.exe"C:\Users\Admin\AppData\Local\Temp\f633e6f25507a6d99ad2474ca4528ef4fdf8f124cade2daa51d310733a62114b.exe"2⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\x2z8.exeC:\Users\Admin\AppData\Local\Temp\\x2z8.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\x2z8.exe"C:\Users\Admin\AppData\Local\Temp\x2z8.exe"4⤵
- Deletes itself
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2108
-
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2816
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:3052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102B
MD5f9673770cdf4bec26cb3e95535277952
SHA10d30ed262896a65a2a81ea7fb0fc500659d69313
SHA2565c9d2194ea06e813f50eae4f0bec84b61c7485c9dede30e4a750d41e2508d3f6
SHA512f9b4425718b25675599042e1fe467f5e9926042183c4f4fc71f79a6014db0a266fb9c4ea7e985852b026bf825c38ba10f3759e94757ee363afdcbc274d8f291e
-
Filesize
160KB
MD5f0949d80cff63963625fcdf1fbb77ca8
SHA19e640241e9b3c11af65665d6ebde18d762bf2d2a
SHA256f633e6f25507a6d99ad2474ca4528ef4fdf8f124cade2daa51d310733a62114b
SHA512bc97e3a430a7f7d09acb7dd1ca5cb9d100141371355fab7768155a9265c56777e06de67ffe7b8ad82b762f8306ae64534abc8ad7947b3f0c1e86d6487e5f1f51