Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/01/2025, 19:38
Static task
static1
Behavioral task
behavioral1
Sample
privatools-files.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
privatools-files.rar
Resource
win10v2004-20241007-en
General
-
Target
privatools-files.rar
-
Size
81.6MB
-
MD5
98c2ceda9dbf52164fff822da4cd21e8
-
SHA1
c4a454397bd1b3dbce114136aa15d02cf8fb3753
-
SHA256
be6ac2cd293e28b25337d64551f8893d97068cef5c3fd012fb0e133073f64f7b
-
SHA512
c17dfad8109b5df9da6d34083526e8a3954c132d2b07b608baf3d3f6f5f9568208804e67f82cb28553a372d564ad088a931dc97b606189e3c9e643891f85e7db
-
SSDEEP
1572864:3XKdIwet6E4RetXLvBZ757eNB6sYjEA62g0+8WI7c0OUjPU4SK16TxfRKpSJ:36dIwet63c9vBd5M0ZSF0+KwPUjPLRmf
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 2700 loader.exe 2448 load.exe 2532 loader.exe 1436 loader.exe 2192 Stub.exe -
Loads dropped DLL 6 IoCs
pid Process 2700 loader.exe 2700 loader.exe 2532 loader.exe 1436 loader.exe 2448 load.exe 2192 Stub.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1544 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 1544 7zFM.exe Token: 35 1544 7zFM.exe Token: SeSecurityPrivilege 1544 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1544 7zFM.exe 1544 7zFM.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1544 wrote to memory of 2700 1544 7zFM.exe 29 PID 1544 wrote to memory of 2700 1544 7zFM.exe 29 PID 1544 wrote to memory of 2700 1544 7zFM.exe 29 PID 2700 wrote to memory of 2448 2700 loader.exe 30 PID 2700 wrote to memory of 2448 2700 loader.exe 30 PID 2700 wrote to memory of 2448 2700 loader.exe 30 PID 2700 wrote to memory of 2532 2700 loader.exe 31 PID 2700 wrote to memory of 2532 2700 loader.exe 31 PID 2700 wrote to memory of 2532 2700 loader.exe 31 PID 2532 wrote to memory of 1436 2532 loader.exe 33 PID 2532 wrote to memory of 1436 2532 loader.exe 33 PID 2532 wrote to memory of 1436 2532 loader.exe 33 PID 2448 wrote to memory of 2192 2448 load.exe 34 PID 2448 wrote to memory of 2192 2448 load.exe 34 PID 2448 wrote to memory of 2192 2448 load.exe 34
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\privatools-files.rar"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\7zO806BE527\loader.exe"C:\Users\Admin\AppData\Local\Temp\7zO806BE527\loader.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Roaming\load.exe"C:\Users\Admin\AppData\Roaming\load.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\onefile_2448_133817891350704000\Stub.exeC:\Users\Admin\AppData\Roaming\load.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2192
-
-
-
C:\Users\Admin\AppData\Roaming\loader.exe"C:\Users\Admin\AppData\Roaming\loader.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\onefile_2532_133817891353668000\loader.exe"C:\Users\Admin\AppData\Roaming\loader.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1436
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43.8MB
MD5b24f88f0db403ac11a78716ff320deb4
SHA19c8d20371469ea36e3587b7ab63f523b8bfd4648
SHA2562fc809e60498653ef870494366d1d633eed8244332f6bdb14aefaeef1032db44
SHA5127ca0790b1413d55e623157de8cdd7542d1cd78bd0464cf71c66f617a4332dbf6bb9e8cc2ac01cd70cbd342e995504f96dac38368a17979ce256a0b4724725c06
-
Filesize
4.3MB
MD5e4533934b37e688106beac6c5919281e
SHA1ada39f10ef0bbdcf05822f4260e43d53367b0017
SHA2562bf761bae584ba67d9a41507b45ebd41ab6ae51755b1782496d0bc60cc1d41d5
SHA512fa681a48ddd81854c9907026d4f36b008e509729f1d9a18a621f1d86cd1176c1a1ff4f814974306fa4d9e3886e2ce112a4f79b66713e1401f5dae4bcd8b898b9
-
Filesize
8.5MB
MD525c312f4da3222a68d209c91945adda8
SHA125cfa08c17e2c97e61bd4819a3f4aac03f80ddf5
SHA2561fb6e99be149836379a93738c525c809cd30bda46330a49a3601c8e9b3372aba
SHA512aba55518bedda5bdec190635e100ef1cea6e9823ff0ecfbad742aa603270e4da39e2a1fe8df3beebcc633b362d0c61738bcf5003a6145fd5d68f5e2313df5382
-
Filesize
5.5MB
MD59a24c8c35e4ac4b1597124c1dcbebe0f
SHA1f59782a4923a30118b97e01a7f8db69b92d8382a
SHA256a0cf640e756875c25c12b4a38ba5f2772e8e512036e2ac59eb8567bf05ffbfb7
SHA5129d9336bf1f0d3bc9ce4a636a5f4e52c5f9487f51f00614fc4a34854a315ce7ea8be328153812dbd67c45c75001818fa63317eba15a6c9a024fa9f2cab163165b
-
Filesize
38.5MB
MD5b72ffc0e6d94d011ddad9018285049e6
SHA177c84dab48fa2fc633fde8ad8675900e48209839
SHA25609b5cbb3c2ac46e0ed298bed4ff08b87ea437dd13b71883b1b087b0a0bdb7f6d
SHA5126da0259e6eb89ce1187f9531c6eabd023215e12077dccffffa72172571cb991a5146f3964c696cb419fdd3cc89306bfaf20db80a96d4ef0a8206dce3d24bbc3e
-
Filesize
5.3MB
MD58106fe1bba482da9cf1436a1fac73230
SHA12eea03f71155c437875d00a9c8de052689dcb824
SHA256c5e0a4e8bcb73aa7b6da814ac986d07836f87aa70af84620087eaa8ccb680ff7
SHA512a98e7452ecbf0a4493da4d471b719f5c2e88d0526a9b1a9ac7ed3eda1c131401184c425f3b858d588e2b75d5747e47671e7a4d2f04c8071d847f9721dc19bdad