Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
107s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 18:28
Static task
static1
Behavioral task
behavioral1
Sample
eaea7b9bab3a9040d614004b1cc51c17984fc46430554195f4afefdcd22f7220.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eaea7b9bab3a9040d614004b1cc51c17984fc46430554195f4afefdcd22f7220.exe
Resource
win10v2004-20220901-en
General
-
Target
eaea7b9bab3a9040d614004b1cc51c17984fc46430554195f4afefdcd22f7220.exe
-
Size
730KB
-
MD5
d25f2f6605f1fa74bb3e07c72f82bc58
-
SHA1
6a65b74379024eef84a6904d0418f60e75e83d9d
-
SHA256
eaea7b9bab3a9040d614004b1cc51c17984fc46430554195f4afefdcd22f7220
-
SHA512
25992b17bb5545740c5b24751b3ca58f25336330df35466b568f6bef2020bfc5e1ff999ec4a0e46c4e07f50bf3b7a689698e876478bc1cd65eef4bbca8e807e9
-
SSDEEP
12288:P5qiINR69BRWIf6sqb7CC2UVZ08uShnws4TyA7zh4fCvAaT8bd1XSkGyRA9mBirL:xDIe/+nTw8/hnws2yA7iwAy8bd1SEoOw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2036 setup.com.cn.exe -
Deletes itself 1 IoCs
pid Process 1928 cmd.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat setup.com.cn.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\setup.com.cn.exe eaea7b9bab3a9040d614004b1cc51c17984fc46430554195f4afefdcd22f7220.exe File opened for modification C:\Windows\setup.com.cn.exe eaea7b9bab3a9040d614004b1cc51c17984fc46430554195f4afefdcd22f7220.exe File created C:\Windows\uninstal.bat eaea7b9bab3a9040d614004b1cc51c17984fc46430554195f4afefdcd22f7220.exe -
Modifies data under HKEY_USERS 28 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D9156085-B8D4-48F7-8977-024A5CABC2FE}\WpadDecision = "0" setup.com.cn.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D9156085-B8D4-48F7-8977-024A5CABC2FE}\WpadNetworkName = "Network 3" setup.com.cn.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix setup.com.cn.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" setup.com.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 setup.com.cn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings setup.com.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0097000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 setup.com.cn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ setup.com.cn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D9156085-B8D4-48F7-8977-024A5CABC2FE} setup.com.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D9156085-B8D4-48F7-8977-024A5CABC2FE}\WpadDecisionTime = d0415177b0ccd801 setup.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\de-92-e7-a5-1e-27\WpadDecisionReason = "1" setup.com.cn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D9156085-B8D4-48F7-8977-024A5CABC2FE}\de-92-e7-a5-1e-27 setup.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\de-92-e7-a5-1e-27\WpadDecision = "0" setup.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" setup.com.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D9156085-B8D4-48F7-8977-024A5CABC2FE}\WpadDecisionTime = b0c053acb0ccd801 setup.com.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\de-92-e7-a5-1e-27\WpadDecisionTime = b0c053acb0ccd801 setup.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" setup.com.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 setup.com.cn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad setup.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{D9156085-B8D4-48F7-8977-024A5CABC2FE}\WpadDecisionReason = "1" setup.com.cn.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" setup.com.cn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings setup.com.cn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" setup.com.cn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections setup.com.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 setup.com.cn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\de-92-e7-a5-1e-27 setup.com.cn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\de-92-e7-a5-1e-27\WpadDecisionTime = d0415177b0ccd801 setup.com.cn.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\de-92-e7-a5-1e-27\WpadDetectedUrl setup.com.cn.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 576 eaea7b9bab3a9040d614004b1cc51c17984fc46430554195f4afefdcd22f7220.exe Token: SeDebugPrivilege 2036 setup.com.cn.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2036 setup.com.cn.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1280 2036 setup.com.cn.exe 27 PID 2036 wrote to memory of 1280 2036 setup.com.cn.exe 27 PID 2036 wrote to memory of 1280 2036 setup.com.cn.exe 27 PID 2036 wrote to memory of 1280 2036 setup.com.cn.exe 27 PID 576 wrote to memory of 1928 576 eaea7b9bab3a9040d614004b1cc51c17984fc46430554195f4afefdcd22f7220.exe 28 PID 576 wrote to memory of 1928 576 eaea7b9bab3a9040d614004b1cc51c17984fc46430554195f4afefdcd22f7220.exe 28 PID 576 wrote to memory of 1928 576 eaea7b9bab3a9040d614004b1cc51c17984fc46430554195f4afefdcd22f7220.exe 28 PID 576 wrote to memory of 1928 576 eaea7b9bab3a9040d614004b1cc51c17984fc46430554195f4afefdcd22f7220.exe 28 PID 576 wrote to memory of 1928 576 eaea7b9bab3a9040d614004b1cc51c17984fc46430554195f4afefdcd22f7220.exe 28 PID 576 wrote to memory of 1928 576 eaea7b9bab3a9040d614004b1cc51c17984fc46430554195f4afefdcd22f7220.exe 28 PID 576 wrote to memory of 1928 576 eaea7b9bab3a9040d614004b1cc51c17984fc46430554195f4afefdcd22f7220.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\eaea7b9bab3a9040d614004b1cc51c17984fc46430554195f4afefdcd22f7220.exe"C:\Users\Admin\AppData\Local\Temp\eaea7b9bab3a9040d614004b1cc51c17984fc46430554195f4afefdcd22f7220.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\uninstal.bat2⤵
- Deletes itself
PID:1928
-
-
C:\Windows\setup.com.cn.exeC:\Windows\setup.com.cn.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:1280
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
730KB
MD5d25f2f6605f1fa74bb3e07c72f82bc58
SHA16a65b74379024eef84a6904d0418f60e75e83d9d
SHA256eaea7b9bab3a9040d614004b1cc51c17984fc46430554195f4afefdcd22f7220
SHA51225992b17bb5545740c5b24751b3ca58f25336330df35466b568f6bef2020bfc5e1ff999ec4a0e46c4e07f50bf3b7a689698e876478bc1cd65eef4bbca8e807e9
-
Filesize
730KB
MD5d25f2f6605f1fa74bb3e07c72f82bc58
SHA16a65b74379024eef84a6904d0418f60e75e83d9d
SHA256eaea7b9bab3a9040d614004b1cc51c17984fc46430554195f4afefdcd22f7220
SHA51225992b17bb5545740c5b24751b3ca58f25336330df35466b568f6bef2020bfc5e1ff999ec4a0e46c4e07f50bf3b7a689698e876478bc1cd65eef4bbca8e807e9
-
Filesize
254B
MD501f349e547e9c3f799a1f5e91b36039b
SHA109b716d8c839d58767b82cb0f1b5e70679349e7e
SHA256bd1456712c835e90fc11a158f1b5731a75a896b3522856496a546c0dec919ca2
SHA512cec628b010a5de50725fb0d9e2af0a262f4dcc439975533fb49ad6fd3cca7ff4fe1eddf93a3db25425d255f58c222b300fb040f8ae800b971d0007cf9076b621