Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24/11/2022, 04:11
Static task
static1
Behavioral task
behavioral1
Sample
73c230f1470311dd493b8be2c1196632d701c1a8c3ce6e759b902bb6ca7684bf.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
73c230f1470311dd493b8be2c1196632d701c1a8c3ce6e759b902bb6ca7684bf.exe
Resource
win10v2004-20220812-en
General
-
Target
73c230f1470311dd493b8be2c1196632d701c1a8c3ce6e759b902bb6ca7684bf.exe
-
Size
255KB
-
MD5
82a6a151fcb82c69cd78890ea7e7d547
-
SHA1
99d8243705172092dac4584c67b3b81753b7bde6
-
SHA256
73c230f1470311dd493b8be2c1196632d701c1a8c3ce6e759b902bb6ca7684bf
-
SHA512
995b170bc39c763215257b8b41e10024a11dc7ff493b76eb1986e6a90a056eef5721c7c3a5a0ee0bc164de627219e4d2387086185ed4c95a4733ea77e8d52605
-
SSDEEP
6144:7UnITMpSph0lMqqgWoDhujqcQQbxJhVGvkVbOcH4CIMf:7CQMY07qgWo6VVGvkVLAK
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Registers COM server for autorun 1 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1234066A-7A10-4CB5-AFF3-CE6D1D0963F2}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1234066A-7A10-4CB5-AFF3-CE6D1D0963F2}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1234066A-7A10-4CB5-AFF3-CE6D1D0963F2}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1234066A-7A10-4CB5-AFF3-CE6D1D0963F2}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Roaming\\Carefree\\plugin.dat" regsvr32.exe -
resource yara_rule behavioral1/files/0x00090000000133ec-57.dat upx behavioral1/files/0x00090000000133ec-58.dat upx behavioral1/files/0x00090000000133ec-61.dat upx behavioral1/files/0x00090000000133ec-63.dat upx behavioral1/memory/1896-65-0x000007FEFC310000-0x000007FEFC37D000-memory.dmp upx behavioral1/memory/1896-66-0x000007FEFC310000-0x000007FEFC37D000-memory.dmp upx -
Loads dropped DLL 3 IoCs
pid Process 2036 regsvr32.exe 2004 regsvr32.exe 1896 explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 44 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1234066A-7A10-4CB5-AFF3-CE6D1D0963F2}\InprocServer32 regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1234066A-7A10-4CB5-AFF3-CE6D1D0963F2}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3692066A-7A10-4CB5-AFF3-9DDE336E97AB}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{45615F2E-872A-4F2D-9A08-475EC8605620}\TypeLib\Version = "1.0" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1234066A-7A10-4CB5-AFF3-CE6D1D0963F2}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3692066A-7A10-4CB5-AFF3-9DDE336E97AB}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{45615F2E-872A-4F2D-9A08-475EC8605620}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3692066A-7A10-4CB5-AFF3-9DDE336E97AB}\1.0 regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1234066A-7A10-4CB5-AFF3-CE6D1D0963F2}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1234066A-7A10-4CB5-AFF3-CE6D1D0963F2}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{45615F2E-872A-4F2D-9A08-475EC8605620} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{45615F2E-872A-4F2D-9A08-475EC8605620}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{45615F2E-872A-4F2D-9A08-475EC8605620}\ = "ICarefreeIdentifier" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{45615F2E-872A-4F2D-9A08-475EC8605620}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1234066A-7A10-4CB5-AFF3-CE6D1D0963F2}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Roaming\\Carefree\\plugin.dat" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3692066A-7A10-4CB5-AFF3-9DDE336E97AB}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3692066A-7A10-4CB5-AFF3-9DDE336E97AB}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Roaming\\Carefree" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{45615F2E-872A-4F2D-9A08-475EC8605620}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{45615F2E-872A-4F2D-9A08-475EC8605620}\TypeLib regsvr32.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3692066A-7A10-4CB5-AFF3-9DDE336E97AB}\1.0\ = "CarefreePluginLib" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3692066A-7A10-4CB5-AFF3-9DDE336E97AB}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Roaming\\Carefree\\plugin.dat" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1234066A-7A10-4CB5-AFF3-CE6D1D0963F2} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1234066A-7A10-4CB5-AFF3-CE6D1D0963F2}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1234066A-7A10-4CB5-AFF3-CE6D1D0963F2}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1234066A-7A10-4CB5-AFF3-CE6D1D0963F2}\Version\ = "1.0" regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1234066A-7A10-4CB5-AFF3-CE6D1D0963F2}\Version regsvr32.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1234066A-7A10-4CB5-AFF3-CE6D1D0963F2} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{45615F2E-872A-4F2D-9A08-475EC8605620}\ = "ICarefreeIdentifier" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{45615F2E-872A-4F2D-9A08-475EC8605620}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1234066A-7A10-4CB5-AFF3-CE6D1D0963F2}\ = "DDICE6D Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3692066A-7A10-4CB5-AFF3-9DDE336E97AB} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3692066A-7A10-4CB5-AFF3-9DDE336E97AB}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{45615F2E-872A-4F2D-9A08-475EC8605620} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{45615F2E-872A-4F2D-9A08-475EC8605620}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1234066A-7A10-4CB5-AFF3-CE6D1D0963F2}\TypeLib\ = "{3692066A-7A10-4CB5-AFF3-9DDE336E97AB}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1234066A-7A10-4CB5-AFF3-CE6D1D0963F2}\Version regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3692066A-7A10-4CB5-AFF3-9DDE336E97AB}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{45615F2E-872A-4F2D-9A08-475EC8605620}\TypeLib\ = "{3692066A-7A10-4CB5-AFF3-9DDE336E97AB}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{45615F2E-872A-4F2D-9A08-475EC8605620}\TypeLib\ = "{3692066A-7A10-4CB5-AFF3-9DDE336E97AB}" regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1236 73c230f1470311dd493b8be2c1196632d701c1a8c3ce6e759b902bb6ca7684bf.exe 1236 73c230f1470311dd493b8be2c1196632d701c1a8c3ce6e759b902bb6ca7684bf.exe 1896 explorer.exe 1896 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1896 explorer.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeShutdownPrivilege 1896 explorer.exe Token: SeShutdownPrivilege 1896 explorer.exe Token: SeShutdownPrivilege 1896 explorer.exe Token: SeShutdownPrivilege 1896 explorer.exe Token: SeShutdownPrivilege 1896 explorer.exe Token: SeShutdownPrivilege 1896 explorer.exe Token: SeShutdownPrivilege 1896 explorer.exe Token: SeShutdownPrivilege 1896 explorer.exe Token: SeShutdownPrivilege 1896 explorer.exe Token: SeShutdownPrivilege 1896 explorer.exe Token: 33 1948 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1948 AUDIODG.EXE Token: 33 1948 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1948 AUDIODG.EXE Token: SeShutdownPrivilege 1896 explorer.exe Token: SeShutdownPrivilege 1896 explorer.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe 1896 explorer.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1236 wrote to memory of 2036 1236 73c230f1470311dd493b8be2c1196632d701c1a8c3ce6e759b902bb6ca7684bf.exe 28 PID 1236 wrote to memory of 2036 1236 73c230f1470311dd493b8be2c1196632d701c1a8c3ce6e759b902bb6ca7684bf.exe 28 PID 1236 wrote to memory of 2036 1236 73c230f1470311dd493b8be2c1196632d701c1a8c3ce6e759b902bb6ca7684bf.exe 28 PID 1236 wrote to memory of 2036 1236 73c230f1470311dd493b8be2c1196632d701c1a8c3ce6e759b902bb6ca7684bf.exe 28 PID 1236 wrote to memory of 2036 1236 73c230f1470311dd493b8be2c1196632d701c1a8c3ce6e759b902bb6ca7684bf.exe 28 PID 1236 wrote to memory of 2036 1236 73c230f1470311dd493b8be2c1196632d701c1a8c3ce6e759b902bb6ca7684bf.exe 28 PID 1236 wrote to memory of 2036 1236 73c230f1470311dd493b8be2c1196632d701c1a8c3ce6e759b902bb6ca7684bf.exe 28 PID 2036 wrote to memory of 2004 2036 regsvr32.exe 29 PID 2036 wrote to memory of 2004 2036 regsvr32.exe 29 PID 2036 wrote to memory of 2004 2036 regsvr32.exe 29 PID 2036 wrote to memory of 2004 2036 regsvr32.exe 29 PID 2036 wrote to memory of 2004 2036 regsvr32.exe 29 PID 2036 wrote to memory of 2004 2036 regsvr32.exe 29 PID 2036 wrote to memory of 2004 2036 regsvr32.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\73c230f1470311dd493b8be2c1196632d701c1a8c3ce6e759b902bb6ca7684bf.exe"C:\Users\Admin\AppData\Local\Temp\73c230f1470311dd493b8be2c1196632d701c1a8c3ce6e759b902bb6ca7684bf.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s "C:\Users\Admin\AppData\Roaming\Carefree\plugin.dat"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\system32\regsvr32.exe/s "C:\Users\Admin\AppData\Roaming\Carefree\plugin.dat"3⤵
- Registers COM server for autorun
- Loads dropped DLL
- Modifies registry class
PID:2004
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1896
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5b01⤵
- Suspicious use of AdjustPrivilegeToken
PID:1948
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
95KB
MD5c5ab6a89bbd88cf4e2ecaddcde4c7ae1
SHA1e4f980ddfb41c48aed1a91b0ae0a7d28ef38a5be
SHA25692c5fc9cb87d67023f26746f1e1e032f4a54c9af17349c5ae2cc8a8c0a99cfde
SHA51200e1fad76495345332b5f0d8c0a501e8a4dbbeb8dd5e3635a1e9553c350d52109a46bbb8b2190fff28e9df10c2c19ad59987b7e8dd8e9c3cc3f8b58af980b00d
-
Filesize
89B
MD582647f94f00552bc201584d835036bca
SHA1e3b5719dc39a0d524cd9f63d22e1de0a4985f987
SHA2564d010eb53c6d31934b2328def4b428cd71cd57f21f8099b5790b475557048ca4
SHA51281e47408abd5154b287e8796ae25a5196a25d2cc645cb0a3dc31c5d99a9f59786c5829c138e71167f9e51e5db4a05be02ca6451d98343e5bee24341e74359cfa
-
Filesize
95KB
MD5c5ab6a89bbd88cf4e2ecaddcde4c7ae1
SHA1e4f980ddfb41c48aed1a91b0ae0a7d28ef38a5be
SHA25692c5fc9cb87d67023f26746f1e1e032f4a54c9af17349c5ae2cc8a8c0a99cfde
SHA51200e1fad76495345332b5f0d8c0a501e8a4dbbeb8dd5e3635a1e9553c350d52109a46bbb8b2190fff28e9df10c2c19ad59987b7e8dd8e9c3cc3f8b58af980b00d
-
Filesize
95KB
MD5c5ab6a89bbd88cf4e2ecaddcde4c7ae1
SHA1e4f980ddfb41c48aed1a91b0ae0a7d28ef38a5be
SHA25692c5fc9cb87d67023f26746f1e1e032f4a54c9af17349c5ae2cc8a8c0a99cfde
SHA51200e1fad76495345332b5f0d8c0a501e8a4dbbeb8dd5e3635a1e9553c350d52109a46bbb8b2190fff28e9df10c2c19ad59987b7e8dd8e9c3cc3f8b58af980b00d
-
Filesize
95KB
MD5c5ab6a89bbd88cf4e2ecaddcde4c7ae1
SHA1e4f980ddfb41c48aed1a91b0ae0a7d28ef38a5be
SHA25692c5fc9cb87d67023f26746f1e1e032f4a54c9af17349c5ae2cc8a8c0a99cfde
SHA51200e1fad76495345332b5f0d8c0a501e8a4dbbeb8dd5e3635a1e9553c350d52109a46bbb8b2190fff28e9df10c2c19ad59987b7e8dd8e9c3cc3f8b58af980b00d