Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
11/03/2025, 23:18
Static task
static1
Behavioral task
behavioral1
Sample
start.exe
Resource
win7-20241010-en
General
-
Target
start.exe
-
Size
1.2MB
-
MD5
7ed712c21a1da57aa34c94f6112532fb
-
SHA1
a094f67f0db0260bc2cd11be4e1d8769f0378720
-
SHA256
2eb2f5bee8cdedefe8abc594fc99ff1ff56f3b2cba32742efe7c97ccea5c7971
-
SHA512
4bcaefc164f3ced4e129ba20168e8cde0eeb56f31331a2bb7af6408ee048b4fe128e1d5eaad77533d1b1cc0f8b79eb2877f3f35a94baedd19267aaa260193579
-
SSDEEP
24576:PAHnh+eWsN3skA4RV1Hom2KXFmIaHgc52ROsHneqwN0+A5:yh+ZkldoPK1XaAcgROkeqxJ
Malware Config
Extracted
darkcloud
- email_from
- email_to
Signatures
-
Darkcloud family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\hypopygidium.vbs hypopygidium.exe -
Executes dropped EXE 1 IoCs
pid Process 1728 hypopygidium.exe -
Loads dropped DLL 1 IoCs
pid Process 1704 start.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00060000000194d0-13.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1728 set thread context of 2788 1728 hypopygidium.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hypopygidium.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language start.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1728 hypopygidium.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1704 start.exe 1704 start.exe 1728 hypopygidium.exe 1728 hypopygidium.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1704 start.exe 1704 start.exe 1728 hypopygidium.exe 1728 hypopygidium.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2788 svchost.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1704 wrote to memory of 1728 1704 start.exe 31 PID 1704 wrote to memory of 1728 1704 start.exe 31 PID 1704 wrote to memory of 1728 1704 start.exe 31 PID 1704 wrote to memory of 1728 1704 start.exe 31 PID 1728 wrote to memory of 2788 1728 hypopygidium.exe 32 PID 1728 wrote to memory of 2788 1728 hypopygidium.exe 32 PID 1728 wrote to memory of 2788 1728 hypopygidium.exe 32 PID 1728 wrote to memory of 2788 1728 hypopygidium.exe 32 PID 1728 wrote to memory of 2788 1728 hypopygidium.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\kinematical\hypopygidium.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2788
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD503cf60c0a0a98016c79c51ccc686d5ea
SHA19cc763f35e2039341747f6e4ec52275536c707e5
SHA2562d53157a316d61a170fa7500ee10af7986bf10c8bd67d3863c645729974417f4
SHA5128f2abf8551b694db766fc7c73d28676906d45ea5e7d9ef35e6eb7e1f2e57056172f2bf2a700b8bbfe9ec13424c144f37e57874303c7d66a5456a790efab3ce5e
-
Filesize
1.2MB
MD57ed712c21a1da57aa34c94f6112532fb
SHA1a094f67f0db0260bc2cd11be4e1d8769f0378720
SHA2562eb2f5bee8cdedefe8abc594fc99ff1ff56f3b2cba32742efe7c97ccea5c7971
SHA5124bcaefc164f3ced4e129ba20168e8cde0eeb56f31331a2bb7af6408ee048b4fe128e1d5eaad77533d1b1cc0f8b79eb2877f3f35a94baedd19267aaa260193579