Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
07/11/2022, 19:34
Static task
static1
Behavioral task
behavioral1
Sample
53dfd190f6be73e6d77dcec1137883c3b15855789e11984d77155a94d5f9d021.exe
Resource
win7-20220901-en
General
-
Target
53dfd190f6be73e6d77dcec1137883c3b15855789e11984d77155a94d5f9d021.exe
-
Size
212KB
-
MD5
07460cdabe3cded3f4589a72bf13deea
-
SHA1
560c7f3aba7f66cc33782c595a88586526bb8d60
-
SHA256
53dfd190f6be73e6d77dcec1137883c3b15855789e11984d77155a94d5f9d021
-
SHA512
72b245d5cc9150769196bbffb8067fd02d210f89775131a503ca716262bbfc59bf97d6c7e92070be34ca44503e2cf88f07ed3e1de0edbe49f84a9ea3587953f4
-
SSDEEP
6144:Xs8ZSfWInb7CRu4EjMvQYGayMsq5FK6ts/gS0:Xs8Zac0ayMskPbS0
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 5.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile 5.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications 5.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\WINDOWS\system\5.exe = "C:\\WINDOWS\\system\\5.exe:*:enabled:@shell32.dll,-1" 5.exe -
Executes dropped EXE 2 IoCs
pid Process 5068 1.exe 3496 5.exe -
resource yara_rule behavioral2/files/0x0006000000022e6e-134.dat upx behavioral2/files/0x0006000000022e6e-135.dat upx behavioral2/memory/5068-140-0x0000000000400000-0x0000000000423000-memory.dmp upx -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 53dfd190f6be73e6d77dcec1137883c3b15855789e11984d77155a94d5f9d021.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 1.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\System\1.exe 53dfd190f6be73e6d77dcec1137883c3b15855789e11984d77155a94d5f9d021.exe File opened for modification C:\Windows\System\1.exe 53dfd190f6be73e6d77dcec1137883c3b15855789e11984d77155a94d5f9d021.exe File created C:\Windows\System\6.exe 1.exe File opened for modification C:\Windows\System\6.exe 1.exe File created C:\Windows\System\5.exe 1.exe File opened for modification C:\Windows\System\5.exe 1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe 3496 5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3496 5.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 912 wrote to memory of 5068 912 53dfd190f6be73e6d77dcec1137883c3b15855789e11984d77155a94d5f9d021.exe 81 PID 912 wrote to memory of 5068 912 53dfd190f6be73e6d77dcec1137883c3b15855789e11984d77155a94d5f9d021.exe 81 PID 912 wrote to memory of 5068 912 53dfd190f6be73e6d77dcec1137883c3b15855789e11984d77155a94d5f9d021.exe 81 PID 5068 wrote to memory of 3496 5068 1.exe 82 PID 5068 wrote to memory of 3496 5068 1.exe 82 PID 5068 wrote to memory of 3496 5068 1.exe 82 PID 3496 wrote to memory of 608 3496 5.exe 3 PID 3496 wrote to memory of 608 3496 5.exe 3 PID 3496 wrote to memory of 608 3496 5.exe 3 PID 3496 wrote to memory of 608 3496 5.exe 3 PID 3496 wrote to memory of 608 3496 5.exe 3 PID 3496 wrote to memory of 608 3496 5.exe 3 PID 3496 wrote to memory of 668 3496 5.exe 1 PID 3496 wrote to memory of 668 3496 5.exe 1 PID 3496 wrote to memory of 668 3496 5.exe 1 PID 3496 wrote to memory of 668 3496 5.exe 1 PID 3496 wrote to memory of 668 3496 5.exe 1 PID 3496 wrote to memory of 668 3496 5.exe 1 PID 3496 wrote to memory of 776 3496 5.exe 8 PID 3496 wrote to memory of 776 3496 5.exe 8 PID 3496 wrote to memory of 776 3496 5.exe 8 PID 3496 wrote to memory of 776 3496 5.exe 8 PID 3496 wrote to memory of 776 3496 5.exe 8 PID 3496 wrote to memory of 776 3496 5.exe 8 PID 3496 wrote to memory of 796 3496 5.exe 9 PID 3496 wrote to memory of 796 3496 5.exe 9 PID 3496 wrote to memory of 796 3496 5.exe 9 PID 3496 wrote to memory of 796 3496 5.exe 9 PID 3496 wrote to memory of 796 3496 5.exe 9 PID 3496 wrote to memory of 796 3496 5.exe 9 PID 3496 wrote to memory of 804 3496 5.exe 22 PID 3496 wrote to memory of 804 3496 5.exe 22 PID 3496 wrote to memory of 804 3496 5.exe 22 PID 3496 wrote to memory of 804 3496 5.exe 22 PID 3496 wrote to memory of 804 3496 5.exe 22 PID 3496 wrote to memory of 804 3496 5.exe 22 PID 3496 wrote to memory of 900 3496 5.exe 20 PID 3496 wrote to memory of 900 3496 5.exe 20 PID 3496 wrote to memory of 900 3496 5.exe 20 PID 3496 wrote to memory of 900 3496 5.exe 20 PID 3496 wrote to memory of 900 3496 5.exe 20 PID 3496 wrote to memory of 900 3496 5.exe 20 PID 3496 wrote to memory of 952 3496 5.exe 10 PID 3496 wrote to memory of 952 3496 5.exe 10 PID 3496 wrote to memory of 952 3496 5.exe 10 PID 3496 wrote to memory of 952 3496 5.exe 10 PID 3496 wrote to memory of 952 3496 5.exe 10 PID 3496 wrote to memory of 952 3496 5.exe 10 PID 3496 wrote to memory of 64 3496 5.exe 17 PID 3496 wrote to memory of 64 3496 5.exe 17 PID 3496 wrote to memory of 64 3496 5.exe 17 PID 3496 wrote to memory of 64 3496 5.exe 17 PID 3496 wrote to memory of 64 3496 5.exe 17 PID 3496 wrote to memory of 64 3496 5.exe 17 PID 3496 wrote to memory of 428 3496 5.exe 11 PID 3496 wrote to memory of 428 3496 5.exe 11 PID 3496 wrote to memory of 428 3496 5.exe 11 PID 3496 wrote to memory of 428 3496 5.exe 11 PID 3496 wrote to memory of 428 3496 5.exe 11 PID 3496 wrote to memory of 428 3496 5.exe 11 PID 3496 wrote to memory of 752 3496 5.exe 12 PID 3496 wrote to memory of 752 3496 5.exe 12 PID 3496 wrote to memory of 752 3496 5.exe 12 PID 3496 wrote to memory of 752 3496 5.exe 12
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:668
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:608
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:796
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:64
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:776
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:3304
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca2⤵PID:3404
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3472
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3744
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}2⤵PID:4012
-
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:4600
-
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca2⤵PID:3564
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe2⤵PID:2604
-
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding2⤵PID:2912
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:952
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:428
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:752
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:916
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1064
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}2⤵PID:2872
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:1096
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:988
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1168
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1264
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:900
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1300
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:804
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1324
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1372
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1592
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1872
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:1200
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2296
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2404
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2396
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:2504
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2436
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2364
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2520
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2304
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2760
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2140
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:1784
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:1788
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1964
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1916
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1896
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1888
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1744
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2768
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1732
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s FontCache1⤵PID:1616
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1528
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1512
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1400
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1364
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:676
-
C:\Users\Admin\AppData\Local\Temp\53dfd190f6be73e6d77dcec1137883c3b15855789e11984d77155a94d5f9d021.exe"C:\Users\Admin\AppData\Local\Temp\53dfd190f6be73e6d77dcec1137883c3b15855789e11984d77155a94d5f9d021.exe"2⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:912 -
C:\WINDOWS\system\1.exe"C:\WINDOWS\system\1.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\WINDOWS\system\5.exe"C:\WINDOWS\system\5.exe"4⤵
- Modifies firewall policy service
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3496
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3096
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:4532
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵PID:4076
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:4704
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:4944
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:788
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s W32Time1⤵PID:3540
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:1056
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
185KB
MD54645e288bbcfdf811dc809f16fbe8ba9
SHA1ce9aaee40fab24c2082c333e412ab3bc25133b80
SHA256c8930d745a7a6f7db264b7cb088f4d1b2ec3eb2ae308c5834bedc5e468bf75b1
SHA51230718c7ab803c27076f1e24c2278f5eea9036e42713313bc01ec2ad02db206f53ed258c246913fb322984c6b1abff269bd99e1e7ae0fe4f009a527ccc0a01ac0
-
Filesize
114KB
MD51666f26018a9b8374a8d720885b8e8c0
SHA11fa35785b6043513297eeae96ab431fef9c21a85
SHA256e3ac62add205edfea215937b060c84206bc79b1cf3ed15278f36b9e6b5cf872d
SHA512e7b8766ac8c3c8e302bcf6eb907ebdf4af0adb6ca877ff1ad11f7624005917003f9757abcdc321823aa52e2a4fa7bd866f0b172ba2899b60f412e358118e3fe0
-
Filesize
185KB
MD54645e288bbcfdf811dc809f16fbe8ba9
SHA1ce9aaee40fab24c2082c333e412ab3bc25133b80
SHA256c8930d745a7a6f7db264b7cb088f4d1b2ec3eb2ae308c5834bedc5e468bf75b1
SHA51230718c7ab803c27076f1e24c2278f5eea9036e42713313bc01ec2ad02db206f53ed258c246913fb322984c6b1abff269bd99e1e7ae0fe4f009a527ccc0a01ac0
-
Filesize
114KB
MD51666f26018a9b8374a8d720885b8e8c0
SHA11fa35785b6043513297eeae96ab431fef9c21a85
SHA256e3ac62add205edfea215937b060c84206bc79b1cf3ed15278f36b9e6b5cf872d
SHA512e7b8766ac8c3c8e302bcf6eb907ebdf4af0adb6ca877ff1ad11f7624005917003f9757abcdc321823aa52e2a4fa7bd866f0b172ba2899b60f412e358118e3fe0