Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
26/11/2022, 01:30
Static task
static1
Behavioral task
behavioral1
Sample
d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265.exe
Resource
win7-20220901-en
General
-
Target
d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265.exe
-
Size
241KB
-
MD5
eaa627127b87d9f59afc00374f43583e
-
SHA1
83d1a134a9e6dcb198aeaca9030b4f058d9ff39e
-
SHA256
d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265
-
SHA512
4bc56f70e5ed758054f741274ccf47135d7b66a80c99a7a650dd15cc82a2ed3ab12ac8f751038d762049dd676e8b6440438a32a360b17302135f7badb5533b33
-
SSDEEP
6144:5LX6FrQvq9ZrumBFSOzVCdyQEDvTX2qFWdbq:57698IZqKFS8cdBivTGLb
Malware Config
Extracted
nanocore
1.2.1.1
testalerlynch2.ddns.net:19302
eddce1db-ede3-4767-a9cb-101e86025cdd
-
activate_away_mode
true
- backup_connection_host
- backup_dns_server
-
buffer_size
65535
-
build_time
2014-10-21T19:21:49.770516936Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
19302
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
eddce1db-ede3-4767-a9cb-101e86025cdd
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
testalerlynch2.ddns.net
- primary_dns_server
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.1.1
-
wan_timeout
8000
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1636 Filename.exe 752 csrss.exe -
Loads dropped DLL 4 IoCs
pid Process 1720 d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265.exe 1720 d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265.exe 1636 Filename.exe 1636 Filename.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ RegistryKey = "C:\\Users\\Admin\\AppData\\Roaming\\MicrosoftServices\\MicrosoftServices\\Filename.exe" Filename.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ RegistryKey = "C:\\Users\\Admin\\AppData\\Roaming\\MicrosoftServices\\MicrosoftServices\\Filename.exe" Filename.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\ RegistryKey = "C:\\Users\\Admin\\AppData\\Roaming\\MicrosoftServices\\MicrosoftServices\\Filename.exe" csrss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ RegistryKey = "C:\\Users\\Admin\\AppData\\Roaming\\MicrosoftServices\\MicrosoftServices\\Filename.exe" csrss.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1636 set thread context of 1788 1636 Filename.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NTFS ADS 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\MicrosoftServices\MicrosoftServices\Filename.exe\:ZONE.identifier:$DATA d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265.exe File opened for modification C:\Users\Admin\AppData\Roaming\MicrosoftServices\MicrosoftServices\Filename.exe:ZONE.identifier cmd.exe File created C:\Users\Admin\AppData\Roaming\MicrosoftServices\MicrosoftServices\csrss.exe\:ZONE.identifier:$DATA Filename.exe File created C:\Users\Admin\AppData\Local\Temp\d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265.exe:ZONE.identifier cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1788 RegSvcs.exe 1788 RegSvcs.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe 752 csrss.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1788 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1636 Filename.exe Token: SeDebugPrivilege 1788 RegSvcs.exe Token: SeDebugPrivilege 752 csrss.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1720 wrote to memory of 1868 1720 d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265.exe 27 PID 1720 wrote to memory of 1868 1720 d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265.exe 27 PID 1720 wrote to memory of 1868 1720 d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265.exe 27 PID 1720 wrote to memory of 1868 1720 d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265.exe 27 PID 1720 wrote to memory of 1636 1720 d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265.exe 29 PID 1720 wrote to memory of 1636 1720 d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265.exe 29 PID 1720 wrote to memory of 1636 1720 d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265.exe 29 PID 1720 wrote to memory of 1636 1720 d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265.exe 29 PID 1636 wrote to memory of 2020 1636 Filename.exe 30 PID 1636 wrote to memory of 2020 1636 Filename.exe 30 PID 1636 wrote to memory of 2020 1636 Filename.exe 30 PID 1636 wrote to memory of 2020 1636 Filename.exe 30 PID 1636 wrote to memory of 1788 1636 Filename.exe 32 PID 1636 wrote to memory of 1788 1636 Filename.exe 32 PID 1636 wrote to memory of 1788 1636 Filename.exe 32 PID 1636 wrote to memory of 1788 1636 Filename.exe 32 PID 1636 wrote to memory of 1788 1636 Filename.exe 32 PID 1636 wrote to memory of 1788 1636 Filename.exe 32 PID 1636 wrote to memory of 1788 1636 Filename.exe 32 PID 1636 wrote to memory of 1788 1636 Filename.exe 32 PID 1636 wrote to memory of 1788 1636 Filename.exe 32 PID 1636 wrote to memory of 1788 1636 Filename.exe 32 PID 1636 wrote to memory of 1788 1636 Filename.exe 32 PID 1636 wrote to memory of 1788 1636 Filename.exe 32 PID 1636 wrote to memory of 752 1636 Filename.exe 33 PID 1636 wrote to memory of 752 1636 Filename.exe 33 PID 1636 wrote to memory of 752 1636 Filename.exe 33 PID 1636 wrote to memory of 752 1636 Filename.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265.exe"C:\Users\Admin\AppData\Local\Temp\d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265.exe"1⤵
- Loads dropped DLL
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > "C:\Users\Admin\AppData\Local\Temp\d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265.exe":ZONE.identifier & exit2⤵
- NTFS ADS
PID:1868
-
-
C:\Users\Admin\AppData\Roaming\MicrosoftServices\MicrosoftServices\Filename.exe"C:\Users\Admin\AppData\Roaming\MicrosoftServices\MicrosoftServices\Filename.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c echo [zoneTransfer]ZoneID = 2 > "C:\Users\Admin\AppData\Roaming\MicrosoftServices\MicrosoftServices\Filename.exe":ZONE.identifier & exit3⤵
- NTFS ADS
PID:2020
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"C:\Windows\\Microsoft.NET\\Framework\\v2.0.50727\RegSvcs.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1788
-
-
C:\Users\Admin\AppData\Roaming\MicrosoftServices\MicrosoftServices\csrss.exe"C:\Users\Admin\AppData\Roaming\MicrosoftServices\MicrosoftServices\csrss.exe" -reg C:\Users\Admin\AppData\Roaming\MicrosoftServices\MicrosoftServices\Filename.exe -proc 1788 C:\Users\Admin\AppData\Roaming\MicrosoftServices\MicrosoftServices\Filename.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:752
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265.exe
Filesize241KB
MD5eaa627127b87d9f59afc00374f43583e
SHA183d1a134a9e6dcb198aeaca9030b4f058d9ff39e
SHA256d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265
SHA5124bc56f70e5ed758054f741274ccf47135d7b66a80c99a7a650dd15cc82a2ed3ab12ac8f751038d762049dd676e8b6440438a32a360b17302135f7badb5533b33
-
Filesize
241KB
MD5eaa627127b87d9f59afc00374f43583e
SHA183d1a134a9e6dcb198aeaca9030b4f058d9ff39e
SHA256d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265
SHA5124bc56f70e5ed758054f741274ccf47135d7b66a80c99a7a650dd15cc82a2ed3ab12ac8f751038d762049dd676e8b6440438a32a360b17302135f7badb5533b33
-
Filesize
241KB
MD5eaa627127b87d9f59afc00374f43583e
SHA183d1a134a9e6dcb198aeaca9030b4f058d9ff39e
SHA256d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265
SHA5124bc56f70e5ed758054f741274ccf47135d7b66a80c99a7a650dd15cc82a2ed3ab12ac8f751038d762049dd676e8b6440438a32a360b17302135f7badb5533b33
-
Filesize
241KB
MD5eaa627127b87d9f59afc00374f43583e
SHA183d1a134a9e6dcb198aeaca9030b4f058d9ff39e
SHA256d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265
SHA5124bc56f70e5ed758054f741274ccf47135d7b66a80c99a7a650dd15cc82a2ed3ab12ac8f751038d762049dd676e8b6440438a32a360b17302135f7badb5533b33
-
Filesize
241KB
MD5eaa627127b87d9f59afc00374f43583e
SHA183d1a134a9e6dcb198aeaca9030b4f058d9ff39e
SHA256d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265
SHA5124bc56f70e5ed758054f741274ccf47135d7b66a80c99a7a650dd15cc82a2ed3ab12ac8f751038d762049dd676e8b6440438a32a360b17302135f7badb5533b33
-
Filesize
241KB
MD5eaa627127b87d9f59afc00374f43583e
SHA183d1a134a9e6dcb198aeaca9030b4f058d9ff39e
SHA256d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265
SHA5124bc56f70e5ed758054f741274ccf47135d7b66a80c99a7a650dd15cc82a2ed3ab12ac8f751038d762049dd676e8b6440438a32a360b17302135f7badb5533b33
-
Filesize
241KB
MD5eaa627127b87d9f59afc00374f43583e
SHA183d1a134a9e6dcb198aeaca9030b4f058d9ff39e
SHA256d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265
SHA5124bc56f70e5ed758054f741274ccf47135d7b66a80c99a7a650dd15cc82a2ed3ab12ac8f751038d762049dd676e8b6440438a32a360b17302135f7badb5533b33
-
Filesize
241KB
MD5eaa627127b87d9f59afc00374f43583e
SHA183d1a134a9e6dcb198aeaca9030b4f058d9ff39e
SHA256d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265
SHA5124bc56f70e5ed758054f741274ccf47135d7b66a80c99a7a650dd15cc82a2ed3ab12ac8f751038d762049dd676e8b6440438a32a360b17302135f7badb5533b33
-
Filesize
241KB
MD5eaa627127b87d9f59afc00374f43583e
SHA183d1a134a9e6dcb198aeaca9030b4f058d9ff39e
SHA256d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265
SHA5124bc56f70e5ed758054f741274ccf47135d7b66a80c99a7a650dd15cc82a2ed3ab12ac8f751038d762049dd676e8b6440438a32a360b17302135f7badb5533b33
-
Filesize
241KB
MD5eaa627127b87d9f59afc00374f43583e
SHA183d1a134a9e6dcb198aeaca9030b4f058d9ff39e
SHA256d7f54c4175ed66a686c9164627ab82599c6f734afeb59bca504713021e638265
SHA5124bc56f70e5ed758054f741274ccf47135d7b66a80c99a7a650dd15cc82a2ed3ab12ac8f751038d762049dd676e8b6440438a32a360b17302135f7badb5533b33