Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
55s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
24/11/2022, 09:50
Static task
static1
Behavioral task
behavioral1
Sample
f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba.exe
Resource
win10v2004-20221111-en
General
-
Target
f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba.exe
-
Size
185KB
-
MD5
87da96422cbb87d1d5dddf3020bdf113
-
SHA1
ace3f2d581e2f0467c81701624db41097624e3e6
-
SHA256
f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba
-
SHA512
8bdeb2df947aca2f321c8949c22b41a324ef0ea40fb7d2167246eb99e0a0d5d87e827578cc2277f9d5bea36ad7d23a61e0b1d2dbb152ccd5a2f5371bdecb5b75
-
SSDEEP
1536:uXFdueBTNWCTQ/kZaEGLU+D7lDAj/70+ZdD7TB1LW7ecPL1k3Urrrrh:kdlBTwCT2kZaED+DJYjNZlB14BOA
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, C:\\Program Files (x86)\\Microsoft Services\\symgr.exe" symgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, C:\\Program Files (x86)\\Microsoft Services\\symgr.exe" symgr.exe -
Executes dropped EXE 3 IoCs
pid Process 484 symgr.exe 1700 symgr.exe 1928 wd.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\svchost\ImagePath = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" symgr.exe -
Loads dropped DLL 4 IoCs
pid Process 268 f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba.exe 268 f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba.exe 1700 symgr.exe 988 dw20.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\WindowsUpdate = "C:\\Program Files (x86)\\Microsoft Services\\symgr.exe -rundll32 /SYSTEM32 \"C:\\Windows\\System32\\taskmgr.exe\" \"C:\\Program Files\\Microsoft\\Windows\"" symgr.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Microsoft.com symgr.exe File opened for modification C:\Windows\SysWOW64\Microsoft.com symgr.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1768 set thread context of 268 1768 f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba.exe 28 PID 484 set thread context of 1700 484 symgr.exe 30 -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Services\ f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba.exe File created C:\Program Files (x86)\Microsoft Services\symgr.exe f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba.exe File opened for modification C:\Program Files (x86)\Microsoft Services\symgr.exe f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 268 f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba.exe 1700 symgr.exe 1700 symgr.exe 1700 symgr.exe 1700 symgr.exe 1928 wd.exe 1700 symgr.exe 1700 symgr.exe 1700 symgr.exe 1700 symgr.exe 1700 symgr.exe 1928 wd.exe 1700 symgr.exe 1700 symgr.exe 1700 symgr.exe 1700 symgr.exe 1928 wd.exe 1700 symgr.exe 1700 symgr.exe 1700 symgr.exe 1700 symgr.exe 1700 symgr.exe 1928 wd.exe 1700 symgr.exe 1700 symgr.exe 1700 symgr.exe 1700 symgr.exe 1700 symgr.exe 1700 symgr.exe 1928 wd.exe 1700 symgr.exe 1700 symgr.exe 1700 symgr.exe 1700 symgr.exe 1928 wd.exe 1700 symgr.exe 1700 symgr.exe 1700 symgr.exe 1700 symgr.exe 1928 wd.exe 1700 symgr.exe 1700 symgr.exe 1700 symgr.exe 1700 symgr.exe 1928 wd.exe 1700 symgr.exe 1700 symgr.exe 1700 symgr.exe 1700 symgr.exe 1928 wd.exe 1700 symgr.exe 1700 symgr.exe 1700 symgr.exe 1700 symgr.exe 1928 wd.exe 1700 symgr.exe 1700 symgr.exe 1700 symgr.exe 1700 symgr.exe 1928 wd.exe 1700 symgr.exe 1700 symgr.exe 1700 symgr.exe 1700 symgr.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 268 f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 268 f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba.exe Token: SeDebugPrivilege 1700 symgr.exe Token: SeDebugPrivilege 1928 wd.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1768 wrote to memory of 268 1768 f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba.exe 28 PID 1768 wrote to memory of 268 1768 f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba.exe 28 PID 1768 wrote to memory of 268 1768 f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba.exe 28 PID 1768 wrote to memory of 268 1768 f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba.exe 28 PID 1768 wrote to memory of 268 1768 f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba.exe 28 PID 1768 wrote to memory of 268 1768 f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba.exe 28 PID 1768 wrote to memory of 268 1768 f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba.exe 28 PID 1768 wrote to memory of 268 1768 f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba.exe 28 PID 1768 wrote to memory of 268 1768 f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba.exe 28 PID 268 wrote to memory of 484 268 f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba.exe 29 PID 268 wrote to memory of 484 268 f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba.exe 29 PID 268 wrote to memory of 484 268 f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba.exe 29 PID 268 wrote to memory of 484 268 f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba.exe 29 PID 484 wrote to memory of 1700 484 symgr.exe 30 PID 484 wrote to memory of 1700 484 symgr.exe 30 PID 484 wrote to memory of 1700 484 symgr.exe 30 PID 484 wrote to memory of 1700 484 symgr.exe 30 PID 484 wrote to memory of 1700 484 symgr.exe 30 PID 484 wrote to memory of 1700 484 symgr.exe 30 PID 484 wrote to memory of 1700 484 symgr.exe 30 PID 484 wrote to memory of 1700 484 symgr.exe 30 PID 484 wrote to memory of 1700 484 symgr.exe 30 PID 1700 wrote to memory of 1928 1700 symgr.exe 31 PID 1700 wrote to memory of 1928 1700 symgr.exe 31 PID 1700 wrote to memory of 1928 1700 symgr.exe 31 PID 1700 wrote to memory of 1928 1700 symgr.exe 31 PID 1700 wrote to memory of 988 1700 symgr.exe 33 PID 1700 wrote to memory of 988 1700 symgr.exe 33 PID 1700 wrote to memory of 988 1700 symgr.exe 33 PID 1700 wrote to memory of 988 1700 symgr.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba.exe"C:\Users\Admin\AppData\Local\Temp\f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba.exe"C:\Users\Admin\AppData\Local\Temp\f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba.exe"2⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Program Files (x86)\Microsoft Services\symgr.exe"C:\Program Files (x86)\Microsoft Services\symgr.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Program Files (x86)\Microsoft Services\symgr.exe"C:\Program Files (x86)\Microsoft Services\symgr.exe"4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Sets service image path in registry
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Roaming\wd.exe"C:\Users\Admin\AppData\Roaming\wd.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 10365⤵
- Loads dropped DLL
PID:988
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
185KB
MD587da96422cbb87d1d5dddf3020bdf113
SHA1ace3f2d581e2f0467c81701624db41097624e3e6
SHA256f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba
SHA5128bdeb2df947aca2f321c8949c22b41a324ef0ea40fb7d2167246eb99e0a0d5d87e827578cc2277f9d5bea36ad7d23a61e0b1d2dbb152ccd5a2f5371bdecb5b75
-
Filesize
185KB
MD587da96422cbb87d1d5dddf3020bdf113
SHA1ace3f2d581e2f0467c81701624db41097624e3e6
SHA256f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba
SHA5128bdeb2df947aca2f321c8949c22b41a324ef0ea40fb7d2167246eb99e0a0d5d87e827578cc2277f9d5bea36ad7d23a61e0b1d2dbb152ccd5a2f5371bdecb5b75
-
Filesize
185KB
MD587da96422cbb87d1d5dddf3020bdf113
SHA1ace3f2d581e2f0467c81701624db41097624e3e6
SHA256f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba
SHA5128bdeb2df947aca2f321c8949c22b41a324ef0ea40fb7d2167246eb99e0a0d5d87e827578cc2277f9d5bea36ad7d23a61e0b1d2dbb152ccd5a2f5371bdecb5b75
-
Filesize
6KB
MD58958d73eee15ff6566a97afb119b41d6
SHA1f43d25ad3a587746108d2863c97512d7f15ce0b2
SHA256a4897d3b6ab56138ece84246e7635df1c71adf900fedeaf9a724dac4bc17d4bd
SHA512ca9d48cf490fbc7fec8d1814023cc5ca3b6a12a97165fb57781b72bf5211865c68468b16b223ae2495a472d713b95a544a357d199efff861f5ee390dbf16f255
-
Filesize
6KB
MD58958d73eee15ff6566a97afb119b41d6
SHA1f43d25ad3a587746108d2863c97512d7f15ce0b2
SHA256a4897d3b6ab56138ece84246e7635df1c71adf900fedeaf9a724dac4bc17d4bd
SHA512ca9d48cf490fbc7fec8d1814023cc5ca3b6a12a97165fb57781b72bf5211865c68468b16b223ae2495a472d713b95a544a357d199efff861f5ee390dbf16f255
-
Filesize
185KB
MD587da96422cbb87d1d5dddf3020bdf113
SHA1ace3f2d581e2f0467c81701624db41097624e3e6
SHA256f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba
SHA5128bdeb2df947aca2f321c8949c22b41a324ef0ea40fb7d2167246eb99e0a0d5d87e827578cc2277f9d5bea36ad7d23a61e0b1d2dbb152ccd5a2f5371bdecb5b75
-
Filesize
185KB
MD587da96422cbb87d1d5dddf3020bdf113
SHA1ace3f2d581e2f0467c81701624db41097624e3e6
SHA256f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba
SHA5128bdeb2df947aca2f321c8949c22b41a324ef0ea40fb7d2167246eb99e0a0d5d87e827578cc2277f9d5bea36ad7d23a61e0b1d2dbb152ccd5a2f5371bdecb5b75
-
Filesize
185KB
MD587da96422cbb87d1d5dddf3020bdf113
SHA1ace3f2d581e2f0467c81701624db41097624e3e6
SHA256f9ca96cb7a06f5aef062c233e4059201d84c27011e6bef3da291c46d118e67ba
SHA5128bdeb2df947aca2f321c8949c22b41a324ef0ea40fb7d2167246eb99e0a0d5d87e827578cc2277f9d5bea36ad7d23a61e0b1d2dbb152ccd5a2f5371bdecb5b75
-
Filesize
6KB
MD58958d73eee15ff6566a97afb119b41d6
SHA1f43d25ad3a587746108d2863c97512d7f15ce0b2
SHA256a4897d3b6ab56138ece84246e7635df1c71adf900fedeaf9a724dac4bc17d4bd
SHA512ca9d48cf490fbc7fec8d1814023cc5ca3b6a12a97165fb57781b72bf5211865c68468b16b223ae2495a472d713b95a544a357d199efff861f5ee390dbf16f255