Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
154s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 18:00
Static task
static1
Behavioral task
behavioral1
Sample
a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe
Resource
win10v2004-20220812-en
General
-
Target
a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe
-
Size
202KB
-
MD5
01e5e010bef7c10fe7dd883e699f4eac
-
SHA1
2f419d25f05fdde66e34eb226bf7f5fb9a9bfeaa
-
SHA256
a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26
-
SHA512
fc5c2e90bb5964e4b6dd1632e5eedca831d17d1ed6a74a3d9858bded3f3cf6b6397a5652569c4463aec0cad92db62bb10ca687fe45f9d6d999d76fbe5b693520
-
SSDEEP
6144:uJkgf0fCW3Nk+FF8VHsCIbRgS1m92wql+czAhr0+B:uJ+acNkyFoHs1Ns2v+wGr0+
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe:*:Enabled:Windows Messanger" reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\ZBS.exe = "C:\\Users\\Admin\\AppData\\Roaming\\ZBS.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\ZBS.exe" a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe -
Loads dropped DLL 1 IoCs
pid Process 4992 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\ZBS.exe" a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\ZBS.exe" a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4992 set thread context of 1996 4992 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe 79 PID 1996 set thread context of 4124 1996 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe 80 -
Program crash 1 IoCs
pid pid_target Process procid_target 228 1996 WerFault.exe 79 -
Modifies registry key 1 TTPs 4 IoCs
pid Process 2348 reg.exe 208 reg.exe 308 reg.exe 2804 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe Token: SeCreateTokenPrivilege 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe Token: SeAssignPrimaryTokenPrivilege 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe Token: SeLockMemoryPrivilege 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe Token: SeIncreaseQuotaPrivilege 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe Token: SeMachineAccountPrivilege 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe Token: SeTcbPrivilege 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe Token: SeSecurityPrivilege 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe Token: SeTakeOwnershipPrivilege 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe Token: SeLoadDriverPrivilege 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe Token: SeSystemProfilePrivilege 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe Token: SeSystemtimePrivilege 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe Token: SeProfSingleProcessPrivilege 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe Token: SeIncBasePriorityPrivilege 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe Token: SeCreatePagefilePrivilege 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe Token: SeCreatePermanentPrivilege 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe Token: SeBackupPrivilege 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe Token: SeRestorePrivilege 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe Token: SeShutdownPrivilege 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe Token: SeDebugPrivilege 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe Token: SeAuditPrivilege 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe Token: SeSystemEnvironmentPrivilege 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe Token: SeChangeNotifyPrivilege 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe Token: SeRemoteShutdownPrivilege 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe Token: SeUndockPrivilege 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe Token: SeSyncAgentPrivilege 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe Token: SeEnableDelegationPrivilege 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe Token: SeManageVolumePrivilege 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe Token: SeImpersonatePrivilege 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe Token: SeCreateGlobalPrivilege 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe Token: 31 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe Token: 32 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe Token: 33 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe Token: 34 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe Token: 35 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe Token: SeDebugPrivilege 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4992 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 4992 wrote to memory of 1996 4992 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe 79 PID 4992 wrote to memory of 1996 4992 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe 79 PID 4992 wrote to memory of 1996 4992 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe 79 PID 4992 wrote to memory of 1996 4992 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe 79 PID 4992 wrote to memory of 1996 4992 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe 79 PID 4992 wrote to memory of 1996 4992 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe 79 PID 4992 wrote to memory of 1996 4992 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe 79 PID 1996 wrote to memory of 4124 1996 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe 80 PID 1996 wrote to memory of 4124 1996 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe 80 PID 1996 wrote to memory of 4124 1996 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe 80 PID 1996 wrote to memory of 4124 1996 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe 80 PID 1996 wrote to memory of 4124 1996 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe 80 PID 1996 wrote to memory of 4124 1996 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe 80 PID 1996 wrote to memory of 4124 1996 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe 80 PID 1996 wrote to memory of 4124 1996 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe 80 PID 4124 wrote to memory of 3596 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe 82 PID 4124 wrote to memory of 3596 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe 82 PID 4124 wrote to memory of 3596 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe 82 PID 4124 wrote to memory of 3728 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe 83 PID 4124 wrote to memory of 3728 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe 83 PID 4124 wrote to memory of 3728 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe 83 PID 4124 wrote to memory of 628 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe 85 PID 4124 wrote to memory of 628 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe 85 PID 4124 wrote to memory of 628 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe 85 PID 4124 wrote to memory of 1148 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe 87 PID 4124 wrote to memory of 1148 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe 87 PID 4124 wrote to memory of 1148 4124 a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe 87 PID 3596 wrote to memory of 2348 3596 cmd.exe 89 PID 3596 wrote to memory of 2348 3596 cmd.exe 89 PID 3596 wrote to memory of 2348 3596 cmd.exe 89 PID 3728 wrote to memory of 208 3728 cmd.exe 91 PID 3728 wrote to memory of 208 3728 cmd.exe 91 PID 3728 wrote to memory of 208 3728 cmd.exe 91 PID 1148 wrote to memory of 308 1148 cmd.exe 93 PID 1148 wrote to memory of 308 1148 cmd.exe 93 PID 1148 wrote to memory of 308 1148 cmd.exe 93 PID 628 wrote to memory of 2804 628 cmd.exe 94 PID 628 wrote to memory of 2804 628 cmd.exe 94 PID 628 wrote to memory of 2804 628 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe"C:\Users\Admin\AppData\Local\Temp\a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe"C:\Users\Admin\AppData\Local\Temp\a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe"C:\Users\Admin\AppData\Local\Temp\a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe"3⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:2348
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe:*:Enabled:Windows Messanger" /f4⤵
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\a075708e22f9516638363f162c5c13c15edc9ff228715b3f23eeec329806fa26.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:208
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:2804
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\ZBS.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\ZBS.exe:*:Enabled:Windows Messanger" /f4⤵
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\ZBS.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\ZBS.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:308
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 3443⤵
- Program crash
PID:228
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1996 -ip 19961⤵PID:1300
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD57d789ed47fe14ba828e907e46035499d
SHA17b5fe9025f5fffc1639c604b3784db333de2c459
SHA256b286ea5967864bdd4188e60d22830ebd92cedb7ba1f5119b313eb03b2b174a19
SHA512afc27bbc66b740d8dc8e82639ab1487d486e2fd002c21edfd78e791877569168906243048ee23e86a9cd1cd365579e279340221b9181d055b1334f90053d4541