Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
168s -
max time network
163s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 02:21
Static task
static1
Behavioral task
behavioral1
Sample
448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe
Resource
win10v2004-20221111-en
General
-
Target
448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe
-
Size
385KB
-
MD5
ba1703dffcc9ab27f2ce70e0f52b617e
-
SHA1
0ff1a187f57e3fa6fe38d660529d9d0d3c1fd0e3
-
SHA256
448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab
-
SHA512
523ac850216b2af6b5c764c0a2b9c704e970cfffc7fee0a4f8abef7698a7c2459f187739decca6bd1b2dd2fccf41b78fc0268cecbe333a4594f7a7dc7643d2ee
-
SSDEEP
6144:1Njs5UHBv5I0YL2jhiCKitsUFK8dHdpF8tAA0Ti33R0:10+YL8DnHMqHF8tAAQinR0
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\lsass.exe" 448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe -
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\MSWUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\lsass.exe" 448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\MSWUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\lsass.exe" 448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe -
Executes dropped EXE 2 IoCs
pid Process 628 lsass.exe 1352 lsass.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 668 netsh.exe -
Loads dropped DLL 2 IoCs
pid Process 1496 448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe 628 lsass.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run 448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\lsass.exe" 448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\lsass.exe" 448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1332 set thread context of 1496 1332 448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe 28 PID 628 set thread context of 1352 628 lsass.exe 32 -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 lsass.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 lsass.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 0f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030853000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c00b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e lsass.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1332 448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe Token: SeDebugPrivilege 628 lsass.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1496 448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe 1352 lsass.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 1332 wrote to memory of 1496 1332 448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe 28 PID 1332 wrote to memory of 1496 1332 448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe 28 PID 1332 wrote to memory of 1496 1332 448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe 28 PID 1332 wrote to memory of 1496 1332 448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe 28 PID 1332 wrote to memory of 1496 1332 448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe 28 PID 1332 wrote to memory of 1496 1332 448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe 28 PID 1332 wrote to memory of 1496 1332 448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe 28 PID 1332 wrote to memory of 1496 1332 448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe 28 PID 1332 wrote to memory of 1496 1332 448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe 28 PID 1332 wrote to memory of 1496 1332 448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe 28 PID 1332 wrote to memory of 1496 1332 448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe 28 PID 1332 wrote to memory of 1496 1332 448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe 28 PID 1496 wrote to memory of 668 1496 448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe 29 PID 1496 wrote to memory of 668 1496 448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe 29 PID 1496 wrote to memory of 668 1496 448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe 29 PID 1496 wrote to memory of 668 1496 448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe 29 PID 1496 wrote to memory of 628 1496 448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe 31 PID 1496 wrote to memory of 628 1496 448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe 31 PID 1496 wrote to memory of 628 1496 448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe 31 PID 1496 wrote to memory of 628 1496 448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe 31 PID 1496 wrote to memory of 628 1496 448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe 31 PID 1496 wrote to memory of 628 1496 448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe 31 PID 1496 wrote to memory of 628 1496 448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe 31 PID 628 wrote to memory of 1352 628 lsass.exe 32 PID 628 wrote to memory of 1352 628 lsass.exe 32 PID 628 wrote to memory of 1352 628 lsass.exe 32 PID 628 wrote to memory of 1352 628 lsass.exe 32 PID 628 wrote to memory of 1352 628 lsass.exe 32 PID 628 wrote to memory of 1352 628 lsass.exe 32 PID 628 wrote to memory of 1352 628 lsass.exe 32 PID 628 wrote to memory of 1352 628 lsass.exe 32 PID 628 wrote to memory of 1352 628 lsass.exe 32 PID 628 wrote to memory of 1352 628 lsass.exe 32 PID 628 wrote to memory of 1352 628 lsass.exe 32 PID 628 wrote to memory of 1352 628 lsass.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe"C:\Users\Admin\AppData\Local\Temp\448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exeC:\Users\Admin\AppData\Local\Temp\448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe2⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\netsh.exenetsh advfirewall firewall add rule name="ImgBurn" dir=in action=allow description="Multimedia suite" program="C:\Users\Admin\AppData\Roaming\Microsoft\lsass.exe" enable=yes3⤵
- Modifies Windows Firewall
PID:668
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\lsass.exe/k C:\Users\Admin\AppData\Local\Temp\448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Roaming\Microsoft\lsass.exeC:\Users\Admin\AppData\Roaming\Microsoft\lsass.exe4⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
PID:1352
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5ba1703dffcc9ab27f2ce70e0f52b617e
SHA10ff1a187f57e3fa6fe38d660529d9d0d3c1fd0e3
SHA256448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab
SHA512523ac850216b2af6b5c764c0a2b9c704e970cfffc7fee0a4f8abef7698a7c2459f187739decca6bd1b2dd2fccf41b78fc0268cecbe333a4594f7a7dc7643d2ee
-
Filesize
385KB
MD5ba1703dffcc9ab27f2ce70e0f52b617e
SHA10ff1a187f57e3fa6fe38d660529d9d0d3c1fd0e3
SHA256448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab
SHA512523ac850216b2af6b5c764c0a2b9c704e970cfffc7fee0a4f8abef7698a7c2459f187739decca6bd1b2dd2fccf41b78fc0268cecbe333a4594f7a7dc7643d2ee
-
Filesize
385KB
MD5ba1703dffcc9ab27f2ce70e0f52b617e
SHA10ff1a187f57e3fa6fe38d660529d9d0d3c1fd0e3
SHA256448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab
SHA512523ac850216b2af6b5c764c0a2b9c704e970cfffc7fee0a4f8abef7698a7c2459f187739decca6bd1b2dd2fccf41b78fc0268cecbe333a4594f7a7dc7643d2ee
-
Filesize
385KB
MD5ba1703dffcc9ab27f2ce70e0f52b617e
SHA10ff1a187f57e3fa6fe38d660529d9d0d3c1fd0e3
SHA256448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab
SHA512523ac850216b2af6b5c764c0a2b9c704e970cfffc7fee0a4f8abef7698a7c2459f187739decca6bd1b2dd2fccf41b78fc0268cecbe333a4594f7a7dc7643d2ee
-
Filesize
385KB
MD5ba1703dffcc9ab27f2ce70e0f52b617e
SHA10ff1a187f57e3fa6fe38d660529d9d0d3c1fd0e3
SHA256448bfbdf276dffcce3d993554a14873ef27df2f53d590090e22f6b878e98baab
SHA512523ac850216b2af6b5c764c0a2b9c704e970cfffc7fee0a4f8abef7698a7c2459f187739decca6bd1b2dd2fccf41b78fc0268cecbe333a4594f7a7dc7643d2ee