Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
69s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 02:17
Static task
static1
Behavioral task
behavioral1
Sample
eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe
Resource
win10v2004-20220812-en
General
-
Target
eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe
-
Size
603KB
-
MD5
81065bd2f8f783eaabc3ce5c6d922fe0
-
SHA1
1d8b9371820b51ab95b2bd907c19b3deb9c53321
-
SHA256
eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff
-
SHA512
5531b12121346ee98b227627dc5840a38727d2e71c400cd354cd332401b57ec4fcb2f36ead4e459695df919816d67b7545eae8d5a0ac081f63f8bd86b7d7583f
-
SSDEEP
12288:U3TdtLW5WIj1dSSdFxsySXyMzBUWb9lx/9AgFLo8OW+rB:eDsj1YEcycJ9nPx/igxp+
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe regsvr.exe" eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe -
Disables Task Manager via registry modification
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Msn Messsenger = "C:\\Windows\\system32\\regsvr.exe" eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\f: eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe File opened (read-only) \??\o: eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe File opened (read-only) \??\q: eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe File opened (read-only) \??\s: eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe File opened (read-only) \??\t: eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe File opened (read-only) \??\r: eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe File opened (read-only) \??\u: eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe File opened (read-only) \??\v: eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe File opened (read-only) \??\b: eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe File opened (read-only) \??\j: eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe File opened (read-only) \??\k: eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe File opened (read-only) \??\l: eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe File opened (read-only) \??\n: eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe File opened (read-only) \??\x: eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe File opened (read-only) \??\y: eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe File opened (read-only) \??\z: eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe File opened (read-only) \??\h: eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe File opened (read-only) \??\i: eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe File opened (read-only) \??\m: eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe File opened (read-only) \??\p: eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe File opened (read-only) \??\w: eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe File opened (read-only) \??\a: eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe File opened (read-only) \??\e: eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe File opened (read-only) \??\g: eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1228-58-0x0000000000400000-0x00000000004BB000-memory.dmp autoit_exe behavioral1/memory/1228-62-0x0000000000400000-0x00000000004BB000-memory.dmp autoit_exe -
Drops file in System32 directory 10 IoCs
description ioc Process File created C:\Windows\SysWOW64\regsvr.exe eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe File opened for modification C:\Windows\SysWOW64\regsvr.exe eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe File created C:\Windows\SysWOW64\svchost .exe eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe File opened for modification C:\Windows\SysWOW64\svchost .exe eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe File created C:\Windows\SysWOW64\setting.ini eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe File opened for modification C:\Windows\SysWOW64\setting.ini eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe File created C:\Windows\SysWOW64\28463\svchost.001 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe File opened for modification C:\Windows\SysWOW64\28463\svchost.001 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe File opened for modification C:\Windows\SysWOW64\setup.ini eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe File opened for modification C:\Windows\SysWOW64\28463 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\regsvr.exe eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe File created C:\Windows\regsvr.exe eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 040000000100000010000000d474de575c39b2d39c8583c5c065498a0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc25190000000100000010000000ba4f3972e7aed9dccdc210db59da13c92000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1228 wrote to memory of 896 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 27 PID 1228 wrote to memory of 896 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 27 PID 1228 wrote to memory of 896 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 27 PID 1228 wrote to memory of 896 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 27 PID 896 wrote to memory of 1356 896 cmd.exe 29 PID 896 wrote to memory of 1356 896 cmd.exe 29 PID 896 wrote to memory of 1356 896 cmd.exe 29 PID 896 wrote to memory of 1356 896 cmd.exe 29 PID 1228 wrote to memory of 1184 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 30 PID 1228 wrote to memory of 1184 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 30 PID 1228 wrote to memory of 1184 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 30 PID 1228 wrote to memory of 1184 1228 eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe 30 PID 1184 wrote to memory of 2024 1184 cmd.exe 31 PID 1184 wrote to memory of 2024 1184 cmd.exe 31 PID 1184 wrote to memory of 2024 1184 cmd.exe 31 PID 1184 wrote to memory of 2024 1184 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe"C:\Users\Admin\AppData\Local\Temp\eba54685344fb75ce7cc1c1bbab125a287eb139640a8b9dbabe975a1270684ff.exe"1⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT /delete /yes2⤵
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\SysWOW64\at.exeAT /delete /yes3⤵PID:1356
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\svchost .exe2⤵
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\at.exeAT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\svchost .exe3⤵PID:2024
-
-