Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
18/10/2022, 14:28
Static task
static1
Behavioral task
behavioral1
Sample
payload.exe
Resource
win7-20220812-en
General
-
Target
payload.exe
-
Size
185KB
-
MD5
14382242e215d139c77c0ee9bb0c7ad6
-
SHA1
3951322a28787e4757fd3715d518103d6c054960
-
SHA256
5017913bca4c5c1eaf5646e3983f9d8fc4e52f4a66406f46f3029952ae1fde70
-
SHA512
1f4eef4d4685ca466702b45fa163e31089c031d2c491b4a14279bf28cba64a1aada928536df2970399510c4efb093ab08c7a05f0223fde66e751e20c26e07a4b
-
SSDEEP
3072:yXoVNpuuK+ArjKxjCpZomp/04AkJmHrwF8gUdSl5xCZqnr/xA3unPu:bfp5SZow/04tUuUdeSqri3gu
Malware Config
Extracted
formbook
knnt
65SBubRb0cQTZyel+RrmtuIytWG7hIY=
lxY8gZLYuXPYl40/
IBCcbQLOUkWVL3cA/DkK2ei+vuKlXA==
4Lo6dar405m4hxqWl58sOc0=
4KyQBqNrzYWTI6Iv016m7BZVvuKlXA==
PyCmasPI0Lj0JTU=
hnoGNwDmybXus0PVH2S1Td2l0ZTJ
s4CRDagqgmaCo9bOBD4i
T5IbS3G46ZbN8RncbsWuAiWl0ZTJ
2vxQ/T6e+7vkjz9yriaOpBbO8bYapwAu
55558Jha4dgR7PCZrQ==
O9KAFJVY3c4V1Xi2rEGne4ZMtSY=
ZPih22lkYU3Yl40/
mCc1tbkLsWeH
MpbgOtnQvGu9jQ==
D6uAq4Gdj3UEkzmKkCOIW4BG
A3rp8NpDzp2Q
4WMaDz2Ff26SfX5xEaABgk0WTQ==
G16+qE5AFMf20h0PxfsyLIZMtSY=
az44qCVNL8dm2vG/nuEbI3K46HT5K44=
diAkZlHwTStSRz3wbh9m3G2Cqp+dCXx1rw==
ffC9ra7gsm+GqNfOBD4i
LVly43lAwJWZDHRBWt4=
5BJ9ci3CPideCnkSTOFMpg==
xGB7vLFMsI7TCAT0PuUtqThQ
0rww83cujg54ASg=
LS3WlRMiFxo74XtOS1kgIs8=
aQQRwP6zypOa
Mgrwb8EzoIDe3O2WrQ==
tSYt4jy2GsrheliJecwZMM8=
B+T9SePXvGu9jQ==
s99ZdB8C+c/axH8GOmFKLYB+wLiMCXx1rw==
9IBSZ+gLsWeH
ulV6trz5xnaepjyMUc1Mpg==
zMoShxjqZmHI9/67Uc1Mpg==
Piqq166reVusrOplow==
YuSgq8SEeVGL
s6buaf/aIwUoDQgSTOFMpg==
uXyHvZsjdhZxWeY3
qHCEy7zq79L08yq2Kl47
BVLMnc8unIHe3O2WrQ==
uUpunoQQm42p2/H0PuUtqThQ
SWEN1fdnvXze3O2WrQ==
mnBAOx+fMRJWWew3
Ma56cxfrw4+ddQl/E5xAgk0WTQ==
ZyYt3CV607oJlrmjslmquBLMgDPZJY4=
SNCgtHFSRjyJjCWKIHjSors1rKbQ
BG4fFjJnYVLe3O2WrQ==
UcmZlZjUxsLjhf2KFQxZog==
sUd0sarZ3doFIkEDaqkO4QaFvQ3YWkk7
RfILOwiC27b/hmYnk9Y=
0dIDc6IKiYG7DjE/ROJCACyl0ZTJ
S07smzJDzp2Q
PK6K+Z5q2oOjsAePug==
6hCDO5icoXmJdSis6BBsAhggVA==
TLZ4XVHzZ2DYl40/
55q88eBaDO1N1XCxj8tNQ9Q=
Cs0DeKUawVXLqH2MbLDwQJwk6bLL
31sQzJ2whlviZ/qGuA==
Ac3E9+NirYqpye70PuUtqThQ
0fo+u0n4c1riZ/qGuA==
L/klOSRT65uf
QYrnxccD99zpxNPOBD4i
1F6aSX7wSfcGYnlYfVY7OdA=
sw25502.xyz
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Control Panel\International\Geo\Nation payload.exe -
Loads dropped DLL 1 IoCs
pid Process 748 control.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1576 set thread context of 1276 1576 payload.exe 15 PID 748 set thread context of 1276 748 control.exe 15 -
description ioc Process Key created \Registry\User\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 control.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 1576 payload.exe 1576 payload.exe 1576 payload.exe 1576 payload.exe 748 control.exe 748 control.exe 748 control.exe 748 control.exe 748 control.exe 748 control.exe 748 control.exe 748 control.exe 748 control.exe 748 control.exe 748 control.exe 748 control.exe 748 control.exe 748 control.exe 748 control.exe 748 control.exe 748 control.exe 748 control.exe 748 control.exe 748 control.exe 748 control.exe 748 control.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 1576 payload.exe 1576 payload.exe 1576 payload.exe 748 control.exe 748 control.exe 748 control.exe 748 control.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1576 payload.exe Token: SeDebugPrivilege 748 control.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1276 Explorer.EXE 1276 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1276 Explorer.EXE 1276 Explorer.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1276 wrote to memory of 748 1276 Explorer.EXE 28 PID 1276 wrote to memory of 748 1276 Explorer.EXE 28 PID 1276 wrote to memory of 748 1276 Explorer.EXE 28 PID 1276 wrote to memory of 748 1276 Explorer.EXE 28 PID 748 wrote to memory of 1968 748 control.exe 31 PID 748 wrote to memory of 1968 748 control.exe 31 PID 748 wrote to memory of 1968 748 control.exe 31 PID 748 wrote to memory of 1968 748 control.exe 31 PID 748 wrote to memory of 1968 748 control.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\payload.exe"C:\Users\Admin\AppData\Local\Temp\payload.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1576
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1968
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5f1e5f58f9eb43ecec773acbdb410b888
SHA1f1b8076b0bbde696694bbc0ab259a77893839464
SHA256a15fd84ee61b54c92bb099dfb78226548f43d550c67fb6adf4cce3d064ab1c14
SHA5120aff96430dd99bb227285fefc258014c301f85216c84e40f45702d26cdd7e77261a41fd3811d686f5fb2ee363cc651a014e8ffa339384004cece645a36486456