Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
34s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 00:20
Static task
static1
Behavioral task
behavioral1
Sample
21088b0b1c5e6d7eec54fc21e969aee6a1818849094d89d215d7a99596f7c28e.dll
Resource
win7-20220812-en
General
-
Target
21088b0b1c5e6d7eec54fc21e969aee6a1818849094d89d215d7a99596f7c28e.dll
-
Size
120KB
-
MD5
911f17f27a87741be1b0a26f8f3ac49c
-
SHA1
f41f4e28c711bb0f9f771f078614a048e460c79c
-
SHA256
21088b0b1c5e6d7eec54fc21e969aee6a1818849094d89d215d7a99596f7c28e
-
SHA512
363a3b8c24c1b83b2a920b15e23979ab1a5576c57d64d98daeadcee67b36dbf3bd70347d8f44866ccbce13b2693779322e1e4795c9d988ca3eed6f4592e30f7e
-
SSDEEP
3072:KS8gDju0Q2HeDpr4uiEbhMIKOZvqfm9oO:NO0BeDuuiYZJEfaoO
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 6c2a5c.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 6c2a5c.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 6c2a5c.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6c2a5c.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 6c2a5c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 6c2a5c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 6c2a5c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 6c2a5c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 6c2a5c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 6c2a5c.exe -
Executes dropped EXE 3 IoCs
pid Process 960 6c2a5c.exe 1952 6c2c01.exe 1912 6c4f3a.exe -
resource yara_rule behavioral1/memory/960-61-0x00000000005E0000-0x000000000169A000-memory.dmp upx behavioral1/memory/960-69-0x00000000005E0000-0x000000000169A000-memory.dmp upx behavioral1/memory/960-84-0x00000000005E0000-0x000000000169A000-memory.dmp upx behavioral1/memory/960-86-0x00000000005E0000-0x000000000169A000-memory.dmp upx behavioral1/memory/1952-88-0x0000000000980000-0x0000000001A3A000-memory.dmp upx behavioral1/memory/1912-91-0x0000000000950000-0x0000000001A0A000-memory.dmp upx -
Loads dropped DLL 6 IoCs
pid Process 968 rundll32.exe 968 rundll32.exe 968 rundll32.exe 968 rundll32.exe 968 rundll32.exe 968 rundll32.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 6c2a5c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 6c2a5c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 6c2a5c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 6c2a5c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 6c2a5c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 6c2a5c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc 6c2a5c.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6c2a5c.exe -
Enumerates connected drives 3 TTPs 8 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: 6c2a5c.exe File opened (read-only) \??\L: 6c2a5c.exe File opened (read-only) \??\E: 6c2a5c.exe File opened (read-only) \??\F: 6c2a5c.exe File opened (read-only) \??\G: 6c2a5c.exe File opened (read-only) \??\H: 6c2a5c.exe File opened (read-only) \??\I: 6c2a5c.exe File opened (read-only) \??\J: 6c2a5c.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\6c2b84 6c2a5c.exe File opened for modification C:\Windows\SYSTEM.INI 6c2a5c.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 960 6c2a5c.exe 960 6c2a5c.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeDebugPrivilege 960 6c2a5c.exe Token: SeDebugPrivilege 960 6c2a5c.exe Token: SeDebugPrivilege 960 6c2a5c.exe Token: SeDebugPrivilege 960 6c2a5c.exe Token: SeDebugPrivilege 960 6c2a5c.exe Token: SeDebugPrivilege 960 6c2a5c.exe Token: SeDebugPrivilege 960 6c2a5c.exe Token: SeDebugPrivilege 960 6c2a5c.exe Token: SeDebugPrivilege 960 6c2a5c.exe Token: SeDebugPrivilege 960 6c2a5c.exe Token: SeDebugPrivilege 960 6c2a5c.exe Token: SeDebugPrivilege 960 6c2a5c.exe Token: SeDebugPrivilege 960 6c2a5c.exe Token: SeDebugPrivilege 960 6c2a5c.exe Token: SeDebugPrivilege 960 6c2a5c.exe Token: SeDebugPrivilege 960 6c2a5c.exe Token: SeDebugPrivilege 960 6c2a5c.exe Token: SeDebugPrivilege 960 6c2a5c.exe Token: SeDebugPrivilege 960 6c2a5c.exe Token: SeDebugPrivilege 960 6c2a5c.exe Token: SeDebugPrivilege 960 6c2a5c.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1728 wrote to memory of 968 1728 rundll32.exe 28 PID 1728 wrote to memory of 968 1728 rundll32.exe 28 PID 1728 wrote to memory of 968 1728 rundll32.exe 28 PID 1728 wrote to memory of 968 1728 rundll32.exe 28 PID 1728 wrote to memory of 968 1728 rundll32.exe 28 PID 1728 wrote to memory of 968 1728 rundll32.exe 28 PID 1728 wrote to memory of 968 1728 rundll32.exe 28 PID 968 wrote to memory of 960 968 rundll32.exe 29 PID 968 wrote to memory of 960 968 rundll32.exe 29 PID 968 wrote to memory of 960 968 rundll32.exe 29 PID 968 wrote to memory of 960 968 rundll32.exe 29 PID 960 wrote to memory of 1128 960 6c2a5c.exe 17 PID 960 wrote to memory of 1188 960 6c2a5c.exe 8 PID 960 wrote to memory of 1216 960 6c2a5c.exe 15 PID 960 wrote to memory of 1728 960 6c2a5c.exe 16 PID 960 wrote to memory of 968 960 6c2a5c.exe 28 PID 960 wrote to memory of 968 960 6c2a5c.exe 28 PID 968 wrote to memory of 1952 968 rundll32.exe 30 PID 968 wrote to memory of 1952 968 rundll32.exe 30 PID 968 wrote to memory of 1952 968 rundll32.exe 30 PID 968 wrote to memory of 1952 968 rundll32.exe 30 PID 968 wrote to memory of 1912 968 rundll32.exe 31 PID 968 wrote to memory of 1912 968 rundll32.exe 31 PID 968 wrote to memory of 1912 968 rundll32.exe 31 PID 968 wrote to memory of 1912 968 rundll32.exe 31 PID 960 wrote to memory of 1128 960 6c2a5c.exe 17 PID 960 wrote to memory of 1188 960 6c2a5c.exe 8 PID 960 wrote to memory of 1216 960 6c2a5c.exe 15 PID 960 wrote to memory of 1728 960 6c2a5c.exe 16 PID 960 wrote to memory of 1952 960 6c2a5c.exe 30 PID 960 wrote to memory of 1952 960 6c2a5c.exe 30 PID 960 wrote to memory of 1912 960 6c2a5c.exe 31 PID 960 wrote to memory of 1912 960 6c2a5c.exe 31 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 6c2a5c.exe
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1188
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\21088b0b1c5e6d7eec54fc21e969aee6a1818849094d89d215d7a99596f7c28e.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\21088b0b1c5e6d7eec54fc21e969aee6a1818849094d89d215d7a99596f7c28e.dll,#13⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Users\Admin\AppData\Local\Temp\6c2a5c.exeC:\Users\Admin\AppData\Local\Temp\6c2a5c.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:960
-
-
C:\Users\Admin\AppData\Local\Temp\6c2c01.exeC:\Users\Admin\AppData\Local\Temp\6c2c01.exe4⤵
- Executes dropped EXE
PID:1952
-
-
C:\Users\Admin\AppData\Local\Temp\6c4f3a.exeC:\Users\Admin\AppData\Local\Temp\6c4f3a.exe4⤵
- Executes dropped EXE
PID:1912
-
-
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1128
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97KB
MD58b03c3192f0284c0ebacf3ee289fff05
SHA1010155740bb85aaeafbcc80109ad51aef8fab0a7
SHA256ca95957611984f9c8a03c76f27018a597c37000b59ed83860bbf06fcb8928254
SHA5127b470f8ca8406b18ec21cd953d24c39175701da3c8c829d2551743559168fe70320b729cc2dc4249f094794102852cbda404f194e6ec99108eea7e2db9b5a6f6
-
Filesize
97KB
MD58b03c3192f0284c0ebacf3ee289fff05
SHA1010155740bb85aaeafbcc80109ad51aef8fab0a7
SHA256ca95957611984f9c8a03c76f27018a597c37000b59ed83860bbf06fcb8928254
SHA5127b470f8ca8406b18ec21cd953d24c39175701da3c8c829d2551743559168fe70320b729cc2dc4249f094794102852cbda404f194e6ec99108eea7e2db9b5a6f6
-
Filesize
97KB
MD58b03c3192f0284c0ebacf3ee289fff05
SHA1010155740bb85aaeafbcc80109ad51aef8fab0a7
SHA256ca95957611984f9c8a03c76f27018a597c37000b59ed83860bbf06fcb8928254
SHA5127b470f8ca8406b18ec21cd953d24c39175701da3c8c829d2551743559168fe70320b729cc2dc4249f094794102852cbda404f194e6ec99108eea7e2db9b5a6f6
-
Filesize
97KB
MD58b03c3192f0284c0ebacf3ee289fff05
SHA1010155740bb85aaeafbcc80109ad51aef8fab0a7
SHA256ca95957611984f9c8a03c76f27018a597c37000b59ed83860bbf06fcb8928254
SHA5127b470f8ca8406b18ec21cd953d24c39175701da3c8c829d2551743559168fe70320b729cc2dc4249f094794102852cbda404f194e6ec99108eea7e2db9b5a6f6
-
Filesize
97KB
MD58b03c3192f0284c0ebacf3ee289fff05
SHA1010155740bb85aaeafbcc80109ad51aef8fab0a7
SHA256ca95957611984f9c8a03c76f27018a597c37000b59ed83860bbf06fcb8928254
SHA5127b470f8ca8406b18ec21cd953d24c39175701da3c8c829d2551743559168fe70320b729cc2dc4249f094794102852cbda404f194e6ec99108eea7e2db9b5a6f6
-
Filesize
97KB
MD58b03c3192f0284c0ebacf3ee289fff05
SHA1010155740bb85aaeafbcc80109ad51aef8fab0a7
SHA256ca95957611984f9c8a03c76f27018a597c37000b59ed83860bbf06fcb8928254
SHA5127b470f8ca8406b18ec21cd953d24c39175701da3c8c829d2551743559168fe70320b729cc2dc4249f094794102852cbda404f194e6ec99108eea7e2db9b5a6f6
-
Filesize
97KB
MD58b03c3192f0284c0ebacf3ee289fff05
SHA1010155740bb85aaeafbcc80109ad51aef8fab0a7
SHA256ca95957611984f9c8a03c76f27018a597c37000b59ed83860bbf06fcb8928254
SHA5127b470f8ca8406b18ec21cd953d24c39175701da3c8c829d2551743559168fe70320b729cc2dc4249f094794102852cbda404f194e6ec99108eea7e2db9b5a6f6
-
Filesize
97KB
MD58b03c3192f0284c0ebacf3ee289fff05
SHA1010155740bb85aaeafbcc80109ad51aef8fab0a7
SHA256ca95957611984f9c8a03c76f27018a597c37000b59ed83860bbf06fcb8928254
SHA5127b470f8ca8406b18ec21cd953d24c39175701da3c8c829d2551743559168fe70320b729cc2dc4249f094794102852cbda404f194e6ec99108eea7e2db9b5a6f6
-
Filesize
97KB
MD58b03c3192f0284c0ebacf3ee289fff05
SHA1010155740bb85aaeafbcc80109ad51aef8fab0a7
SHA256ca95957611984f9c8a03c76f27018a597c37000b59ed83860bbf06fcb8928254
SHA5127b470f8ca8406b18ec21cd953d24c39175701da3c8c829d2551743559168fe70320b729cc2dc4249f094794102852cbda404f194e6ec99108eea7e2db9b5a6f6