Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24/12/2024, 06:41
Static task
static1
Behavioral task
behavioral1
Sample
30713c9db29f1185d482eb9c5491dc7d68dbf8de20477e6ac866e8e8b3d87244.exe
Resource
win7-20240903-en
General
-
Target
30713c9db29f1185d482eb9c5491dc7d68dbf8de20477e6ac866e8e8b3d87244.exe
-
Size
4.7MB
-
MD5
e93e4f22d9afe1f1ade66d636f25c380
-
SHA1
1ab854cdb1c237be7fbe5a6230273414117fde2a
-
SHA256
30713c9db29f1185d482eb9c5491dc7d68dbf8de20477e6ac866e8e8b3d87244
-
SHA512
2dba62e5e9d9971b85ab169a97aa18846a57a4dd69dcddff67c80ca785dd34bc2a40a30b2b31943a3ca289692e9306e94793e2a22a9d8debb98211f36ca88517
-
SSDEEP
98304:Q0WXxnoJ2Pn/Y4MpMCkGoY9yY9F0GFvNIDc09EzcLRmOCZ:QD6yn/YHroY9yY9ewvNvgx4
Malware Config
Signatures
-
Floxif family
-
Detects Floxif payload 1 IoCs
resource yara_rule behavioral1/files/0x00080000000120f9-1.dat floxif -
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x00080000000120f9-1.dat acprotect -
Loads dropped DLL 11 IoCs
pid Process 3056 30713c9db29f1185d482eb9c5491dc7d68dbf8de20477e6ac866e8e8b3d87244.exe 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\e: 30713c9db29f1185d482eb9c5491dc7d68dbf8de20477e6ac866e8e8b3d87244.exe -
resource yara_rule behavioral1/memory/3056-3-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/files/0x00080000000120f9-1.dat upx behavioral1/memory/3056-13-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/3056-14-0x0000000010000000-0x0000000010030000-memory.dmp upx behavioral1/memory/3056-33-0x0000000010000000-0x0000000010030000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\System\symsrv.dll 30713c9db29f1185d482eb9c5491dc7d68dbf8de20477e6ac866e8e8b3d87244.exe File created \??\c:\program files\common files\system\symsrv.dll.000 30713c9db29f1185d482eb9c5491dc7d68dbf8de20477e6ac866e8e8b3d87244.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Installer\{AC76BA86-7AD7-1033-7B44-A90000000001}\SC_Reader.exe 30713c9db29f1185d482eb9c5491dc7d68dbf8de20477e6ac866e8e8b3d87244.exe File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\sc_reader.exe 30713c9db29f1185d482eb9c5491dc7d68dbf8de20477e6ac866e8e8b3d87244.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30713c9db29f1185d482eb9c5491dc7d68dbf8de20477e6ac866e8e8b3d87244.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3056 30713c9db29f1185d482eb9c5491dc7d68dbf8de20477e6ac866e8e8b3d87244.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3056 30713c9db29f1185d482eb9c5491dc7d68dbf8de20477e6ac866e8e8b3d87244.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\30713c9db29f1185d482eb9c5491dc7d68dbf8de20477e6ac866e8e8b3d87244.exe"C:\Users\Admin\AppData\Local\Temp\30713c9db29f1185d482eb9c5491dc7d68dbf8de20477e6ac866e8e8b3d87244.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD57574cf2c64f35161ab1292e2f532aabf
SHA114ba3fa927a06224dfe587014299e834def4644f
SHA256de055a89de246e629a8694bde18af2b1605e4b9b493c7e4aef669dd67acf5085
SHA5124db19f2d8d5bc1c7bbb812d3fa9c43b80fa22140b346d2760f090b73aed8a5177edb4bddc647a6ebd5a2db8565be5a1a36a602b0d759e38540d9a584ba5896ab
-
Filesize
1.1MB
MD58407c433b453155f76041beefc0de627
SHA18fccb4a6309237a6926b2360dc1b8299e508b605
SHA25677f47e76c26b59a0886957df22bf099755c0f66a443fe097dd1a857b25d852f9
SHA512a533096b7af6ba98ddf6ed258c6b71a58b9fda5783b10f7feedc1af601c4fbfb63d742e00710d21703564c631d03184880fa7969708e85e8eedefcfde26f8991
-
Filesize
388KB
MD5b3615da42676d5df7d445ff708d985d1
SHA16f362011e5d5befb83be178264dfb3e46f1c62ca
SHA2566abb8554dd47d84268921afc83a98631af9cfd635e8216dcf7f17b65fc3052f8
SHA512e06d36e2bf3dae0e3e279cf34cebd6da615ea52f1e7486b11293fccc8e332ee38cd5155134727f2b6da89c2082394c920aad8efd1e02f8f551f3b9afa3f73329
-
Filesize
1.1MB
MD543a443c88144c78f04164f96e82b5877
SHA13f0751cb0e402e5840b60fb4b4bcfd98f37b7ee7
SHA2563b60802ebc71588a1cef50505ff90019056948c5296a75dd78d0b6f37337c859
SHA512a9b01d29cd211a5257af70a9394de08a400a2049fdf076454758dcc6744989d3283833c6251886012102048e227c3224fa3929f7bc955692711ba4fe3006ef81
-
Filesize
639KB
MD53a2e67d1893eb07f48ba1ebc34a97650
SHA17d2f06bdc66330fa065aab81bc0d5f09091d9049
SHA256348ef879a28005e31e03cc253905ffa7b8f9a2868a8301f24eb41349ef6518db
SHA512939e8b7d71291e7294752e1d178ae22a787ded16d6d35333b9dddd31419fa8cccd4e05650388bcd319710bf98176f7f3505f1a83eb37828aff3ef8712139a959