Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1800s -
max time network
1799s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
18/10/2022, 20:13
Static task
static1
Behavioral task
behavioral1
Sample
payload.exe
Resource
win7-20220812-en
General
-
Target
payload.exe
-
Size
185KB
-
MD5
14382242e215d139c77c0ee9bb0c7ad6
-
SHA1
3951322a28787e4757fd3715d518103d6c054960
-
SHA256
5017913bca4c5c1eaf5646e3983f9d8fc4e52f4a66406f46f3029952ae1fde70
-
SHA512
1f4eef4d4685ca466702b45fa163e31089c031d2c491b4a14279bf28cba64a1aada928536df2970399510c4efb093ab08c7a05f0223fde66e751e20c26e07a4b
-
SSDEEP
3072:yXoVNpuuK+ArjKxjCpZomp/04AkJmHrwF8gUdSl5xCZqnr/xA3unPu:bfp5SZow/04tUuUdeSqri3gu
Malware Config
Extracted
formbook
knnt
65SBubRb0cQTZyel+RrmtuIytWG7hIY=
lxY8gZLYuXPYl40/
IBCcbQLOUkWVL3cA/DkK2ei+vuKlXA==
4Lo6dar405m4hxqWl58sOc0=
4KyQBqNrzYWTI6Iv016m7BZVvuKlXA==
PyCmasPI0Lj0JTU=
hnoGNwDmybXus0PVH2S1Td2l0ZTJ
s4CRDagqgmaCo9bOBD4i
T5IbS3G46ZbN8RncbsWuAiWl0ZTJ
2vxQ/T6e+7vkjz9yriaOpBbO8bYapwAu
55558Jha4dgR7PCZrQ==
O9KAFJVY3c4V1Xi2rEGne4ZMtSY=
ZPih22lkYU3Yl40/
mCc1tbkLsWeH
MpbgOtnQvGu9jQ==
D6uAq4Gdj3UEkzmKkCOIW4BG
A3rp8NpDzp2Q
4WMaDz2Ff26SfX5xEaABgk0WTQ==
G16+qE5AFMf20h0PxfsyLIZMtSY=
az44qCVNL8dm2vG/nuEbI3K46HT5K44=
diAkZlHwTStSRz3wbh9m3G2Cqp+dCXx1rw==
ffC9ra7gsm+GqNfOBD4i
LVly43lAwJWZDHRBWt4=
5BJ9ci3CPideCnkSTOFMpg==
xGB7vLFMsI7TCAT0PuUtqThQ
0rww83cujg54ASg=
LS3WlRMiFxo74XtOS1kgIs8=
aQQRwP6zypOa
Mgrwb8EzoIDe3O2WrQ==
tSYt4jy2GsrheliJecwZMM8=
B+T9SePXvGu9jQ==
s99ZdB8C+c/axH8GOmFKLYB+wLiMCXx1rw==
9IBSZ+gLsWeH
ulV6trz5xnaepjyMUc1Mpg==
zMoShxjqZmHI9/67Uc1Mpg==
Piqq166reVusrOplow==
YuSgq8SEeVGL
s6buaf/aIwUoDQgSTOFMpg==
uXyHvZsjdhZxWeY3
qHCEy7zq79L08yq2Kl47
BVLMnc8unIHe3O2WrQ==
uUpunoQQm42p2/H0PuUtqThQ
SWEN1fdnvXze3O2WrQ==
mnBAOx+fMRJWWew3
Ma56cxfrw4+ddQl/E5xAgk0WTQ==
ZyYt3CV607oJlrmjslmquBLMgDPZJY4=
SNCgtHFSRjyJjCWKIHjSors1rKbQ
BG4fFjJnYVLe3O2WrQ==
UcmZlZjUxsLjhf2KFQxZog==
sUd0sarZ3doFIkEDaqkO4QaFvQ3YWkk7
RfILOwiC27b/hmYnk9Y=
0dIDc6IKiYG7DjE/ROJCACyl0ZTJ
S07smzJDzp2Q
PK6K+Z5q2oOjsAePug==
6hCDO5icoXmJdSis6BBsAhggVA==
TLZ4XVHzZ2DYl40/
55q88eBaDO1N1XCxj8tNQ9Q=
Cs0DeKUawVXLqH2MbLDwQJwk6bLL
31sQzJ2whlviZ/qGuA==
Ac3E9+NirYqpye70PuUtqThQ
0fo+u0n4c1riZ/qGuA==
L/klOSRT65uf
QYrnxccD99zpxNPOBD4i
1F6aSX7wSfcGYnlYfVY7OdA=
sw25502.xyz
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1572 updatemx6hz.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Control Panel\International\Geo\Nation payload.exe -
Loads dropped DLL 4 IoCs
pid Process 1652 msdt.exe 1572 updatemx6hz.exe 1572 updatemx6hz.exe 1572 updatemx6hz.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \Registry\Machine\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run msdt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\GBTHEFWHG8GX = "C:\\Program Files (x86)\\Sqjl\\updatemx6hz.exe" msdt.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1208 set thread context of 1388 1208 payload.exe 15 PID 1652 set thread context of 1388 1652 msdt.exe 15 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Sqjl\updatemx6hz.exe msdt.exe File created C:\Program Files (x86)\Sqjl\updatemx6hz.exe Explorer.EXE -
description ioc Process Key created \Registry\User\S-1-5-21-3845472200-3839195424-595303356-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 msdt.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1208 payload.exe 1208 payload.exe 1208 payload.exe 1208 payload.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1388 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 1208 payload.exe 1208 payload.exe 1208 payload.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe 1652 msdt.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 1208 payload.exe Token: SeDebugPrivilege 1652 msdt.exe Token: SeShutdownPrivilege 1388 Explorer.EXE Token: SeShutdownPrivilege 1388 Explorer.EXE Token: SeDebugPrivilege 1572 updatemx6hz.exe Token: SeShutdownPrivilege 1388 Explorer.EXE Token: SeShutdownPrivilege 1388 Explorer.EXE Token: SeShutdownPrivilege 1388 Explorer.EXE Token: SeShutdownPrivilege 1388 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1388 Explorer.EXE 1388 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1388 Explorer.EXE 1388 Explorer.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1388 wrote to memory of 1652 1388 Explorer.EXE 27 PID 1388 wrote to memory of 1652 1388 Explorer.EXE 27 PID 1388 wrote to memory of 1652 1388 Explorer.EXE 27 PID 1388 wrote to memory of 1652 1388 Explorer.EXE 27 PID 1652 wrote to memory of 1148 1652 msdt.exe 30 PID 1652 wrote to memory of 1148 1652 msdt.exe 30 PID 1652 wrote to memory of 1148 1652 msdt.exe 30 PID 1652 wrote to memory of 1148 1652 msdt.exe 30 PID 1652 wrote to memory of 1148 1652 msdt.exe 30 PID 1388 wrote to memory of 1572 1388 Explorer.EXE 32 PID 1388 wrote to memory of 1572 1388 Explorer.EXE 32 PID 1388 wrote to memory of 1572 1388 Explorer.EXE 32 PID 1388 wrote to memory of 1572 1388 Explorer.EXE 32 PID 1388 wrote to memory of 1572 1388 Explorer.EXE 32 PID 1388 wrote to memory of 1572 1388 Explorer.EXE 32 PID 1388 wrote to memory of 1572 1388 Explorer.EXE 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Drops file in Program Files directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\payload.exe"C:\Users\Admin\AppData\Local\Temp\payload.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1208
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1148
-
-
-
C:\Program Files (x86)\Sqjl\updatemx6hz.exe"C:\Program Files (x86)\Sqjl\updatemx6hz.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1572
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
185KB
MD514382242e215d139c77c0ee9bb0c7ad6
SHA13951322a28787e4757fd3715d518103d6c054960
SHA2565017913bca4c5c1eaf5646e3983f9d8fc4e52f4a66406f46f3029952ae1fde70
SHA5121f4eef4d4685ca466702b45fa163e31089c031d2c491b4a14279bf28cba64a1aada928536df2970399510c4efb093ab08c7a05f0223fde66e751e20c26e07a4b
-
Filesize
185KB
MD514382242e215d139c77c0ee9bb0c7ad6
SHA13951322a28787e4757fd3715d518103d6c054960
SHA2565017913bca4c5c1eaf5646e3983f9d8fc4e52f4a66406f46f3029952ae1fde70
SHA5121f4eef4d4685ca466702b45fa163e31089c031d2c491b4a14279bf28cba64a1aada928536df2970399510c4efb093ab08c7a05f0223fde66e751e20c26e07a4b
-
Filesize
185KB
MD514382242e215d139c77c0ee9bb0c7ad6
SHA13951322a28787e4757fd3715d518103d6c054960
SHA2565017913bca4c5c1eaf5646e3983f9d8fc4e52f4a66406f46f3029952ae1fde70
SHA5121f4eef4d4685ca466702b45fa163e31089c031d2c491b4a14279bf28cba64a1aada928536df2970399510c4efb093ab08c7a05f0223fde66e751e20c26e07a4b
-
Filesize
185KB
MD514382242e215d139c77c0ee9bb0c7ad6
SHA13951322a28787e4757fd3715d518103d6c054960
SHA2565017913bca4c5c1eaf5646e3983f9d8fc4e52f4a66406f46f3029952ae1fde70
SHA5121f4eef4d4685ca466702b45fa163e31089c031d2c491b4a14279bf28cba64a1aada928536df2970399510c4efb093ab08c7a05f0223fde66e751e20c26e07a4b
-
Filesize
185KB
MD514382242e215d139c77c0ee9bb0c7ad6
SHA13951322a28787e4757fd3715d518103d6c054960
SHA2565017913bca4c5c1eaf5646e3983f9d8fc4e52f4a66406f46f3029952ae1fde70
SHA5121f4eef4d4685ca466702b45fa163e31089c031d2c491b4a14279bf28cba64a1aada928536df2970399510c4efb093ab08c7a05f0223fde66e751e20c26e07a4b
-
Filesize
932KB
MD5661fd92d4eaeea3740649af5a484d7c8
SHA1c93f868890fee1475f8ec9e7607e26f5dce67d54
SHA25658a478f0560ea22c1bc194263f07cf6f3ecfe47d0c8b534a7bba185f28a1141f
SHA5121fac03c20139fde41d121e0adbd02d127261ce061509996087fc1c80baf2fe0d0f70fed6b83d38a85cfa2e07d038ff809161c7ecce31ec44ac8b89740d3db15d