Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 15:10
Static task
static1
Behavioral task
behavioral1
Sample
db37ced8bcdbc873cfe11a02e07246a0ecdab2c9f3aa19dfba7cfdfe0bda000f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
db37ced8bcdbc873cfe11a02e07246a0ecdab2c9f3aa19dfba7cfdfe0bda000f.exe
Resource
win10v2004-20220812-en
General
-
Target
db37ced8bcdbc873cfe11a02e07246a0ecdab2c9f3aa19dfba7cfdfe0bda000f.exe
-
Size
17KB
-
MD5
06f674637cfdc9f7834a01e6baf43656
-
SHA1
f52856a11263140376e61363692204e4caddb5af
-
SHA256
db37ced8bcdbc873cfe11a02e07246a0ecdab2c9f3aa19dfba7cfdfe0bda000f
-
SHA512
f81d798108060530ed06ae1268351e9945839a3f5ffe2e639f93f7037106390ff300724eb838632db080eb45946261a3aff81a2a4bb8186465d379793d85557e
-
SSDEEP
384:lXR6Rh3ztmrRjqpOgVvIvRjENNJkZSsP3Ns2LigCjS9iz:lXQRztm1NgdIdyXkYs62ij2A
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1436 kernelwind32.exe -
Modifies Windows Firewall 1 TTPs 2 IoCs
pid Process 4344 netsh.exe 2256 netsh.exe -
Sets service image path in registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Driver\ImagePath = "\\??\\C:\\Windows\\system32\\kernelw.sys" kernelwind32.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Driver\ImagePath = "\\??\\C:\\Windows\\system32\\kernelw.sys" db37ced8bcdbc873cfe11a02e07246a0ecdab2c9f3aa19dfba7cfdfe0bda000f.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Windows\\system32\\kernelwind32.exe" db37ced8bcdbc873cfe11a02e07246a0ecdab2c9f3aa19dfba7cfdfe0bda000f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Windows\\system32\\kernelwind32.exe" kernelwind32.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\kernelwind32.exe kernelwind32.exe File opened for modification C:\Windows\SysWOW64\dllh8jkd1q8.exe kernelwind32.exe File opened for modification C:\Windows\SysWOW64\kernelw.sys db37ced8bcdbc873cfe11a02e07246a0ecdab2c9f3aa19dfba7cfdfe0bda000f.exe File created C:\Windows\SysWOW64\kernelwind32.exe db37ced8bcdbc873cfe11a02e07246a0ecdab2c9f3aa19dfba7cfdfe0bda000f.exe File opened for modification C:\Windows\SysWOW64\kernelwind32.exe db37ced8bcdbc873cfe11a02e07246a0ecdab2c9f3aa19dfba7cfdfe0bda000f.exe File opened for modification C:\Windows\SysWOW64\kernelw.sys kernelwind32.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 4824 db37ced8bcdbc873cfe11a02e07246a0ecdab2c9f3aa19dfba7cfdfe0bda000f.exe 1436 kernelwind32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeLoadDriverPrivilege 4824 db37ced8bcdbc873cfe11a02e07246a0ecdab2c9f3aa19dfba7cfdfe0bda000f.exe Token: SeLoadDriverPrivilege 1436 kernelwind32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4824 wrote to memory of 2256 4824 db37ced8bcdbc873cfe11a02e07246a0ecdab2c9f3aa19dfba7cfdfe0bda000f.exe 81 PID 4824 wrote to memory of 2256 4824 db37ced8bcdbc873cfe11a02e07246a0ecdab2c9f3aa19dfba7cfdfe0bda000f.exe 81 PID 4824 wrote to memory of 2256 4824 db37ced8bcdbc873cfe11a02e07246a0ecdab2c9f3aa19dfba7cfdfe0bda000f.exe 81 PID 4824 wrote to memory of 1436 4824 db37ced8bcdbc873cfe11a02e07246a0ecdab2c9f3aa19dfba7cfdfe0bda000f.exe 83 PID 4824 wrote to memory of 1436 4824 db37ced8bcdbc873cfe11a02e07246a0ecdab2c9f3aa19dfba7cfdfe0bda000f.exe 83 PID 4824 wrote to memory of 1436 4824 db37ced8bcdbc873cfe11a02e07246a0ecdab2c9f3aa19dfba7cfdfe0bda000f.exe 83 PID 1436 wrote to memory of 4344 1436 kernelwind32.exe 84 PID 1436 wrote to memory of 4344 1436 kernelwind32.exe 84 PID 1436 wrote to memory of 4344 1436 kernelwind32.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\db37ced8bcdbc873cfe11a02e07246a0ecdab2c9f3aa19dfba7cfdfe0bda000f.exe"C:\Users\Admin\AppData\Local\Temp\db37ced8bcdbc873cfe11a02e07246a0ecdab2c9f3aa19dfba7cfdfe0bda000f.exe"1⤵
- Sets service image path in registry
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set allowedprogram 'C:\Users\Admin\AppData\Local\Temp\db37ced8bcdbc873cfe11a02e07246a0ecdab2c9f3aa19dfba7cfdfe0bda000f.exe' enable2⤵
- Modifies Windows Firewall
PID:2256
-
-
C:\Windows\SysWOW64\kernelwind32.exeC:\Windows\system32\kernelwind32.exe2⤵
- Executes dropped EXE
- Sets service image path in registry
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set allowedprogram 'C:\Windows\SysWOW64\kernelwind32.exe' enable3⤵
- Modifies Windows Firewall
PID:4344
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5cc43010c40ec6907f2d0526c55495c16
SHA104f9b28b79824e20c77db44189db718b683971cf
SHA2563b3fd4601090089980c93ff7607e9d3e863ce51155c56e0093871493f7a0f875
SHA512b21ec29fc85f124a47ce46fb15f47643a4dc2ff521548746ca6a0d39030353c95b2cda4afe7372a85568ba464f162bf3c8060ec469e63f41775731994a6cb8f3
-
Filesize
17KB
MD506f674637cfdc9f7834a01e6baf43656
SHA1f52856a11263140376e61363692204e4caddb5af
SHA256db37ced8bcdbc873cfe11a02e07246a0ecdab2c9f3aa19dfba7cfdfe0bda000f
SHA512f81d798108060530ed06ae1268351e9945839a3f5ffe2e639f93f7037106390ff300724eb838632db080eb45946261a3aff81a2a4bb8186465d379793d85557e
-
Filesize
17KB
MD506f674637cfdc9f7834a01e6baf43656
SHA1f52856a11263140376e61363692204e4caddb5af
SHA256db37ced8bcdbc873cfe11a02e07246a0ecdab2c9f3aa19dfba7cfdfe0bda000f
SHA512f81d798108060530ed06ae1268351e9945839a3f5ffe2e639f93f7037106390ff300724eb838632db080eb45946261a3aff81a2a4bb8186465d379793d85557e