Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
92s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 08:50
Static task
static1
Behavioral task
behavioral1
Sample
f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe
Resource
win10v2004-20220812-en
General
-
Target
f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe
-
Size
136KB
-
MD5
fb9e829aa297d5563b52bd4c23cea20f
-
SHA1
507722663b4c12ea7749b50fe59bc53b0fbc74a1
-
SHA256
f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886
-
SHA512
cd97a65902bf92da9a3552a0292a77fb1e517ea2c607333aa505e47a11227c3224a50a5a529af8c15b84dfe9b3e630bc8a02527c25dc3557da8bb0d9b12601ae
-
SSDEEP
3072:4HXJr2sw7dtCkGdDYjWL1/jfAv6z1GUOH1wSMBGEbBsM27Pf:4HXh2sw7dtCkdwXz1G3HbB7
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" win32Runtime.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" win32Runtime.exe -
Executes dropped EXE 5 IoCs
pid Process 1072 win32Runtime.exe 452 rundlll.exe 1912 AvProtector.exe 724 scvhost.exe 664 rundlll.exe -
Modifies Windows Firewall 1 TTPs 2 IoCs
pid Process 1732 netsh.exe 1760 netsh.exe -
Loads dropped DLL 4 IoCs
pid Process 832 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 832 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 832 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 832 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe -
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\win32Runtime = "\"C:\\Users\\Admin\\AppData\\Roaming\\win32Runtime.exe\"" f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\win32Runtime = "\"C:\\Users\\Admin\\AppData\\Roaming\\win32Runtime.exe\"" f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunServices f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\*win32Runtime = "\"C:\\Users\\Admin\\AppData\\Roaming\\win32Runtime.exe\"" f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunServices\win32Runtime = "\"C:\\Users\\Admin\\AppData\\Roaming\\win32Runtime.exe\"" f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunServices\win32Runtime = "\"C:\\Users\\Admin\\AppData\\Roaming\\win32Runtime.exe\"" f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\*win32Runtime = "\"C:\\Users\\Admin\\AppData\\Roaming\\win32Runtime.exe\"" f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" win32Runtime.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\win.ini f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe File opened for modification C:\Windows\system.ini f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 832 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 832 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 832 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 1072 win32Runtime.exe 1072 win32Runtime.exe 1072 win32Runtime.exe 452 rundlll.exe 452 rundlll.exe 452 rundlll.exe 452 rundlll.exe 1912 AvProtector.exe 1912 AvProtector.exe 1912 AvProtector.exe 1912 AvProtector.exe 724 scvhost.exe 724 scvhost.exe 724 scvhost.exe 724 scvhost.exe 452 rundlll.exe 452 rundlll.exe 1912 AvProtector.exe 1912 AvProtector.exe 724 scvhost.exe 724 scvhost.exe 452 rundlll.exe 452 rundlll.exe 664 rundlll.exe 664 rundlll.exe 664 rundlll.exe 664 rundlll.exe 1912 AvProtector.exe 1912 AvProtector.exe 724 scvhost.exe 724 scvhost.exe 452 rundlll.exe 452 rundlll.exe 664 rundlll.exe 664 rundlll.exe 1912 AvProtector.exe 1912 AvProtector.exe 724 scvhost.exe 724 scvhost.exe 452 rundlll.exe 452 rundlll.exe 664 rundlll.exe 664 rundlll.exe 1912 AvProtector.exe 1912 AvProtector.exe 724 scvhost.exe 724 scvhost.exe 452 rundlll.exe 452 rundlll.exe 664 rundlll.exe 664 rundlll.exe 1912 AvProtector.exe 1912 AvProtector.exe 724 scvhost.exe 724 scvhost.exe 452 rundlll.exe 452 rundlll.exe 664 rundlll.exe 664 rundlll.exe 1912 AvProtector.exe 1912 AvProtector.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 832 wrote to memory of 1256 832 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 29 PID 832 wrote to memory of 1256 832 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 29 PID 832 wrote to memory of 1256 832 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 29 PID 832 wrote to memory of 1256 832 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 29 PID 1256 wrote to memory of 1732 1256 cmd.exe 30 PID 1256 wrote to memory of 1732 1256 cmd.exe 30 PID 1256 wrote to memory of 1732 1256 cmd.exe 30 PID 1256 wrote to memory of 1732 1256 cmd.exe 30 PID 832 wrote to memory of 1072 832 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 31 PID 832 wrote to memory of 1072 832 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 31 PID 832 wrote to memory of 1072 832 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 31 PID 832 wrote to memory of 1072 832 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 31 PID 832 wrote to memory of 452 832 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 32 PID 832 wrote to memory of 452 832 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 32 PID 832 wrote to memory of 452 832 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 32 PID 832 wrote to memory of 452 832 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 32 PID 832 wrote to memory of 1912 832 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 33 PID 832 wrote to memory of 1912 832 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 33 PID 832 wrote to memory of 1912 832 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 33 PID 832 wrote to memory of 1912 832 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 33 PID 832 wrote to memory of 724 832 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 34 PID 832 wrote to memory of 724 832 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 34 PID 832 wrote to memory of 724 832 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 34 PID 832 wrote to memory of 724 832 f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe 34 PID 1072 wrote to memory of 664 1072 win32Runtime.exe 35 PID 1072 wrote to memory of 664 1072 win32Runtime.exe 35 PID 1072 wrote to memory of 664 1072 win32Runtime.exe 35 PID 1072 wrote to memory of 664 1072 win32Runtime.exe 35 PID 1072 wrote to memory of 1636 1072 win32Runtime.exe 36 PID 1072 wrote to memory of 1636 1072 win32Runtime.exe 36 PID 1072 wrote to memory of 1636 1072 win32Runtime.exe 36 PID 1072 wrote to memory of 1636 1072 win32Runtime.exe 36 PID 1636 wrote to memory of 1760 1636 cmd.exe 37 PID 1636 wrote to memory of 1760 1636 cmd.exe 37 PID 1636 wrote to memory of 1760 1636 cmd.exe 37 PID 1636 wrote to memory of 1760 1636 cmd.exe 37 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System win32Runtime.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" win32Runtime.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" win32Runtime.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe"C:\Users\Admin\AppData\Local\Temp\f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886.exe"1⤵
- UAC bypass
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:832 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh firewall set opmode mode=disable profile=all2⤵
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable profile=all3⤵
- Modifies Windows Firewall
PID:1732
-
-
-
C:\Users\Admin\AppData\Roaming\win32Runtime.exe"C:\Users\Admin\AppData\Roaming\win32Runtime.exe"2⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1072 -
C:\Users\Admin\AppData\Roaming\rundlll.exe"C:\Users\Admin\AppData\Roaming\rundlll.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:664
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c netsh firewall set opmode mode=disable profile=all3⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode mode=disable profile=all4⤵
- Modifies Windows Firewall
PID:1760
-
-
-
-
C:\Users\Admin\AppData\Roaming\rundlll.exe"C:\Users\Admin\AppData\Roaming\rundlll.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:452
-
-
C:\Users\Admin\AppData\Roaming\AvProtector.exe"C:\Users\Admin\AppData\Roaming\AvProtector.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1912
-
-
C:\Users\Admin\AppData\Roaming\scvhost.exe"C:\Users\Admin\AppData\Roaming\scvhost.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:724
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5fb9e829aa297d5563b52bd4c23cea20f
SHA1507722663b4c12ea7749b50fe59bc53b0fbc74a1
SHA256f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886
SHA512cd97a65902bf92da9a3552a0292a77fb1e517ea2c607333aa505e47a11227c3224a50a5a529af8c15b84dfe9b3e630bc8a02527c25dc3557da8bb0d9b12601ae
-
Filesize
136KB
MD5fb9e829aa297d5563b52bd4c23cea20f
SHA1507722663b4c12ea7749b50fe59bc53b0fbc74a1
SHA256f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886
SHA512cd97a65902bf92da9a3552a0292a77fb1e517ea2c607333aa505e47a11227c3224a50a5a529af8c15b84dfe9b3e630bc8a02527c25dc3557da8bb0d9b12601ae
-
Filesize
136KB
MD5fb9e829aa297d5563b52bd4c23cea20f
SHA1507722663b4c12ea7749b50fe59bc53b0fbc74a1
SHA256f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886
SHA512cd97a65902bf92da9a3552a0292a77fb1e517ea2c607333aa505e47a11227c3224a50a5a529af8c15b84dfe9b3e630bc8a02527c25dc3557da8bb0d9b12601ae
-
Filesize
136KB
MD5fb9e829aa297d5563b52bd4c23cea20f
SHA1507722663b4c12ea7749b50fe59bc53b0fbc74a1
SHA256f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886
SHA512cd97a65902bf92da9a3552a0292a77fb1e517ea2c607333aa505e47a11227c3224a50a5a529af8c15b84dfe9b3e630bc8a02527c25dc3557da8bb0d9b12601ae
-
Filesize
136KB
MD5fb9e829aa297d5563b52bd4c23cea20f
SHA1507722663b4c12ea7749b50fe59bc53b0fbc74a1
SHA256f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886
SHA512cd97a65902bf92da9a3552a0292a77fb1e517ea2c607333aa505e47a11227c3224a50a5a529af8c15b84dfe9b3e630bc8a02527c25dc3557da8bb0d9b12601ae
-
Filesize
136KB
MD5fb9e829aa297d5563b52bd4c23cea20f
SHA1507722663b4c12ea7749b50fe59bc53b0fbc74a1
SHA256f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886
SHA512cd97a65902bf92da9a3552a0292a77fb1e517ea2c607333aa505e47a11227c3224a50a5a529af8c15b84dfe9b3e630bc8a02527c25dc3557da8bb0d9b12601ae
-
Filesize
136KB
MD5fb9e829aa297d5563b52bd4c23cea20f
SHA1507722663b4c12ea7749b50fe59bc53b0fbc74a1
SHA256f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886
SHA512cd97a65902bf92da9a3552a0292a77fb1e517ea2c607333aa505e47a11227c3224a50a5a529af8c15b84dfe9b3e630bc8a02527c25dc3557da8bb0d9b12601ae
-
Filesize
136KB
MD5fb9e829aa297d5563b52bd4c23cea20f
SHA1507722663b4c12ea7749b50fe59bc53b0fbc74a1
SHA256f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886
SHA512cd97a65902bf92da9a3552a0292a77fb1e517ea2c607333aa505e47a11227c3224a50a5a529af8c15b84dfe9b3e630bc8a02527c25dc3557da8bb0d9b12601ae
-
Filesize
136KB
MD5fb9e829aa297d5563b52bd4c23cea20f
SHA1507722663b4c12ea7749b50fe59bc53b0fbc74a1
SHA256f26c9ffa3f9ba26a2403a8bf8949f88d7988482a3b7e2270f1e488ffc1df1886
SHA512cd97a65902bf92da9a3552a0292a77fb1e517ea2c607333aa505e47a11227c3224a50a5a529af8c15b84dfe9b3e630bc8a02527c25dc3557da8bb0d9b12601ae