Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 23:59
Static task
static1
Behavioral task
behavioral1
Sample
627a8f66ca021eb8a619af54c640ab7be315d020fa2520d4bc92dbb125a63d3d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
627a8f66ca021eb8a619af54c640ab7be315d020fa2520d4bc92dbb125a63d3d.exe
Resource
win10v2004-20221111-en
General
-
Target
627a8f66ca021eb8a619af54c640ab7be315d020fa2520d4bc92dbb125a63d3d.exe
-
Size
216KB
-
MD5
ab2dd7793af3276096a3b0b886135ebc
-
SHA1
26c7020a3f276412c751138bfff62b59343a61a9
-
SHA256
627a8f66ca021eb8a619af54c640ab7be315d020fa2520d4bc92dbb125a63d3d
-
SHA512
7de1e7eb21c4f800154774b7805d2026c0d73b0457722bc453a08270c36bc4a726bcf17c941fcfab3392b1fa15ed5a94bd303aa85f57a24b7dfc3985f336f456
-
SSDEEP
6144:iyKJEPV/zuy6j5pD/bDi6EyfjWu4aU3hkl4uHACTuwFPf:i3K/zuy6j5l/SyfCuA0hxf
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 868 msnat4f0f42ff.exe -
resource yara_rule behavioral1/memory/1708-56-0x0000000000400000-0x0000000001400000-memory.dmp upx behavioral1/memory/868-65-0x0000000000400000-0x0000000001400000-memory.dmp upx behavioral1/memory/1708-68-0x0000000000400000-0x000000000043E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\msnat64f218f = "C:\\Users\\Admin\\AppData\\Local\\Temp\\msnat1c9f41f.exe" reg.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\msnat4f0f42ff.exe 627a8f66ca021eb8a619af54c640ab7be315d020fa2520d4bc92dbb125a63d3d.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357 svchost.exe File opened for modification C:\Windows\SysWOW64\msnat4f0f42ff.exe 627a8f66ca021eb8a619af54c640ab7be315d020fa2520d4bc92dbb125a63d3d.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 svchost.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357 svchost.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-3e-3e-d0-0f-44\WpadDecision = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6ECFCAC3-D841-49AF-AC7D-5BE7CB93B33F}\WpadDecision = "0" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-3e-3e-d0-0f-44\WpadDecisionReason = "1" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-3e-3e-d0-0f-44\WpadDecisionTime = a0c390109201d901 svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6ECFCAC3-D841-49AF-AC7D-5BE7CB93B33F} svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f004b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CTLs svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Disallowed\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust svchost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6ECFCAC3-D841-49AF-AC7D-5BE7CB93B33F}\WpadDecisionTime = a0c390109201d901 svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-3e-3e-d0-0f-44 svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\TrustedPeople\Certificates svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6ECFCAC3-D841-49AF-AC7D-5BE7CB93B33F}\WpadNetworkName = "Network 2" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\CRLs svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6ECFCAC3-D841-49AF-AC7D-5BE7CB93B33F}\WpadDecisionReason = "1" svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CTLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\Certificates svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6ECFCAC3-D841-49AF-AC7D-5BE7CB93B33F}\8a-3e-3e-d0-0f-44 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1708 wrote to memory of 1972 1708 627a8f66ca021eb8a619af54c640ab7be315d020fa2520d4bc92dbb125a63d3d.exe 28 PID 1708 wrote to memory of 1972 1708 627a8f66ca021eb8a619af54c640ab7be315d020fa2520d4bc92dbb125a63d3d.exe 28 PID 1708 wrote to memory of 1972 1708 627a8f66ca021eb8a619af54c640ab7be315d020fa2520d4bc92dbb125a63d3d.exe 28 PID 1708 wrote to memory of 1972 1708 627a8f66ca021eb8a619af54c640ab7be315d020fa2520d4bc92dbb125a63d3d.exe 28 PID 1708 wrote to memory of 340 1708 627a8f66ca021eb8a619af54c640ab7be315d020fa2520d4bc92dbb125a63d3d.exe 30 PID 1708 wrote to memory of 340 1708 627a8f66ca021eb8a619af54c640ab7be315d020fa2520d4bc92dbb125a63d3d.exe 30 PID 1708 wrote to memory of 340 1708 627a8f66ca021eb8a619af54c640ab7be315d020fa2520d4bc92dbb125a63d3d.exe 30 PID 1708 wrote to memory of 340 1708 627a8f66ca021eb8a619af54c640ab7be315d020fa2520d4bc92dbb125a63d3d.exe 30 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33 PID 868 wrote to memory of 520 868 msnat4f0f42ff.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\627a8f66ca021eb8a619af54c640ab7be315d020fa2520d4bc92dbb125a63d3d.exe"C:\Users\Admin\AppData\Local\Temp\627a8f66ca021eb8a619af54c640ab7be315d020fa2520d4bc92dbb125a63d3d.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\reg.exereg.exe add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows" /t REG_SZ /f /v load /d "C:\Users\Admin\AppData\Local\Temp\msnat1c9f41f.exe"2⤵PID:1972
-
-
C:\Windows\SysWOW64\reg.exereg.exe add "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /t REG_SZ /f /v msnat64f218f /d "C:\Users\Admin\AppData\Local\Temp\msnat1c9f41f.exe"2⤵
- Adds Run key to start application
PID:340
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:1464
-
-
C:\Windows\SysWOW64\msnat4f0f42ff.exeC:\Windows\SysWOW64\msnat4f0f42ff.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:520
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD5ab2dd7793af3276096a3b0b886135ebc
SHA126c7020a3f276412c751138bfff62b59343a61a9
SHA256627a8f66ca021eb8a619af54c640ab7be315d020fa2520d4bc92dbb125a63d3d
SHA5127de1e7eb21c4f800154774b7805d2026c0d73b0457722bc453a08270c36bc4a726bcf17c941fcfab3392b1fa15ed5a94bd303aa85f57a24b7dfc3985f336f456