Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
392s -
max time network
394s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 14:20
Static task
static1
Behavioral task
behavioral1
Sample
35683740082d9d1598ff9bb34553468caf86c5e97dd73a57d1086a045178475a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
35683740082d9d1598ff9bb34553468caf86c5e97dd73a57d1086a045178475a.exe
Resource
win10v2004-20221111-en
General
-
Target
35683740082d9d1598ff9bb34553468caf86c5e97dd73a57d1086a045178475a.exe
-
Size
72KB
-
MD5
023457d70aee38eb4431b2b99063d814
-
SHA1
1104c468ea90ce907bcbdcceb62238f7fee3781f
-
SHA256
35683740082d9d1598ff9bb34553468caf86c5e97dd73a57d1086a045178475a
-
SHA512
1fa4eef0089e2c45681e337180a430257060ef5fddb7d9ee8ebfd00a96018d8d6c0e368b10ae1bee965e02b3cd42023c6144c039c5db7ab45b6e4927f43f6fde
-
SSDEEP
384:i6wayA+1mwnA353BXR+oGfP5d/ZBHXME+l93qPAqee/w6yJ/wWD+S83BXR+oGf2B:ipQNwC3BEddsEqOt/hyJF+x3BEJwRrPV
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 35683740082d9d1598ff9bb34553468caf86c5e97dd73a57d1086a045178475a.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" backup.exe -
Disables RegEdit via registry modification 8 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 35683740082d9d1598ff9bb34553468caf86c5e97dd73a57d1086a045178475a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 35683740082d9d1598ff9bb34553468caf86c5e97dd73a57d1086a045178475a.exe Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe -
Executes dropped EXE 6 IoCs
pid Process 4556 backup.exe 1640 backup.exe 2908 backup.exe 508 backup.exe 4072 backup.exe 2972 backup.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2284 35683740082d9d1598ff9bb34553468caf86c5e97dd73a57d1086a045178475a.exe 4556 backup.exe 1640 backup.exe 508 backup.exe 2908 backup.exe 4072 backup.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2284 wrote to memory of 4556 2284 35683740082d9d1598ff9bb34553468caf86c5e97dd73a57d1086a045178475a.exe 80 PID 2284 wrote to memory of 4556 2284 35683740082d9d1598ff9bb34553468caf86c5e97dd73a57d1086a045178475a.exe 80 PID 2284 wrote to memory of 4556 2284 35683740082d9d1598ff9bb34553468caf86c5e97dd73a57d1086a045178475a.exe 80 PID 2284 wrote to memory of 1640 2284 35683740082d9d1598ff9bb34553468caf86c5e97dd73a57d1086a045178475a.exe 81 PID 2284 wrote to memory of 1640 2284 35683740082d9d1598ff9bb34553468caf86c5e97dd73a57d1086a045178475a.exe 81 PID 2284 wrote to memory of 1640 2284 35683740082d9d1598ff9bb34553468caf86c5e97dd73a57d1086a045178475a.exe 81 PID 4556 wrote to memory of 2908 4556 backup.exe 83 PID 4556 wrote to memory of 2908 4556 backup.exe 83 PID 4556 wrote to memory of 2908 4556 backup.exe 83 PID 2284 wrote to memory of 508 2284 35683740082d9d1598ff9bb34553468caf86c5e97dd73a57d1086a045178475a.exe 84 PID 2284 wrote to memory of 508 2284 35683740082d9d1598ff9bb34553468caf86c5e97dd73a57d1086a045178475a.exe 84 PID 2284 wrote to memory of 508 2284 35683740082d9d1598ff9bb34553468caf86c5e97dd73a57d1086a045178475a.exe 84 PID 2284 wrote to memory of 4072 2284 35683740082d9d1598ff9bb34553468caf86c5e97dd73a57d1086a045178475a.exe 85 PID 2284 wrote to memory of 4072 2284 35683740082d9d1598ff9bb34553468caf86c5e97dd73a57d1086a045178475a.exe 85 PID 2284 wrote to memory of 4072 2284 35683740082d9d1598ff9bb34553468caf86c5e97dd73a57d1086a045178475a.exe 85 PID 2908 wrote to memory of 2972 2908 backup.exe 86 PID 2908 wrote to memory of 2972 2908 backup.exe 86 PID 2908 wrote to memory of 2972 2908 backup.exe 86 -
System policy modification 1 TTPs 16 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 35683740082d9d1598ff9bb34553468caf86c5e97dd73a57d1086a045178475a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" 35683740082d9d1598ff9bb34553468caf86c5e97dd73a57d1086a045178475a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 35683740082d9d1598ff9bb34553468caf86c5e97dd73a57d1086a045178475a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 35683740082d9d1598ff9bb34553468caf86c5e97dd73a57d1086a045178475a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" backup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System backup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\35683740082d9d1598ff9bb34553468caf86c5e97dd73a57d1086a045178475a.exe"C:\Users\Admin\AppData\Local\Temp\35683740082d9d1598ff9bb34553468caf86c5e97dd73a57d1086a045178475a.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\774104419\backup.exeC:\Users\Admin\AppData\Local\Temp\774104419\backup.exe C:\Users\Admin\AppData\Local\Temp\774104419\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4556 -
C:\backup.exe\backup.exe \3⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2908 -
C:\odt\backup.exeC:\odt\backup.exe C:\odt\4⤵
- Executes dropped EXE
PID:2972
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exeC:\Users\Admin\AppData\Local\Temp\acrocef_low\backup.exe C:\Users\Admin\AppData\Local\Temp\acrocef_low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1640
-
-
C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exeC:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\backup.exe C:\Users\Admin\AppData\Local\Temp\hsperfdata_Admin\2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:508
-
-
C:\Users\Admin\AppData\Local\Temp\Low\backup.exeC:\Users\Admin\AppData\Local\Temp\Low\backup.exe C:\Users\Admin\AppData\Local\Temp\Low\2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4072
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD58c8dacea438e266e625650d897deeedb
SHA1dfc282d008484056c47df6d7974e71ee0d552dbb
SHA256e374fc8fa1017f91b38d931749072bf517cf32f10072ed64193e7dd9c9e76f16
SHA5121880af7f44600d9d4bb25bbff56267c8be61cbb15ef6e54bf56d9668a34bee35621cea17128779aef9ea32bf97a0b0b2e3041e97b386fbd5781a251f5ccacb13
-
Filesize
72KB
MD58c8dacea438e266e625650d897deeedb
SHA1dfc282d008484056c47df6d7974e71ee0d552dbb
SHA256e374fc8fa1017f91b38d931749072bf517cf32f10072ed64193e7dd9c9e76f16
SHA5121880af7f44600d9d4bb25bbff56267c8be61cbb15ef6e54bf56d9668a34bee35621cea17128779aef9ea32bf97a0b0b2e3041e97b386fbd5781a251f5ccacb13
-
Filesize
72KB
MD5db96b04a1be595dbaa34703f42eab370
SHA110c585b8a162224ec79fb2a3bd94de7af6b0aca6
SHA256faf6a5ffbebb0bb0ce6fbd765f5e85230cac11a449d3cd1d89c0a4c40e956ff3
SHA5125ae86bb17f1c67c23871e66f873c69f9775f48773992874efc087b8d406b02d10cf2f860146448301a6ac15920f630ed91a5cd4d0b5fff7e2c748607893ba78c
-
Filesize
72KB
MD5db96b04a1be595dbaa34703f42eab370
SHA110c585b8a162224ec79fb2a3bd94de7af6b0aca6
SHA256faf6a5ffbebb0bb0ce6fbd765f5e85230cac11a449d3cd1d89c0a4c40e956ff3
SHA5125ae86bb17f1c67c23871e66f873c69f9775f48773992874efc087b8d406b02d10cf2f860146448301a6ac15920f630ed91a5cd4d0b5fff7e2c748607893ba78c
-
Filesize
72KB
MD58c8dacea438e266e625650d897deeedb
SHA1dfc282d008484056c47df6d7974e71ee0d552dbb
SHA256e374fc8fa1017f91b38d931749072bf517cf32f10072ed64193e7dd9c9e76f16
SHA5121880af7f44600d9d4bb25bbff56267c8be61cbb15ef6e54bf56d9668a34bee35621cea17128779aef9ea32bf97a0b0b2e3041e97b386fbd5781a251f5ccacb13
-
Filesize
72KB
MD58c8dacea438e266e625650d897deeedb
SHA1dfc282d008484056c47df6d7974e71ee0d552dbb
SHA256e374fc8fa1017f91b38d931749072bf517cf32f10072ed64193e7dd9c9e76f16
SHA5121880af7f44600d9d4bb25bbff56267c8be61cbb15ef6e54bf56d9668a34bee35621cea17128779aef9ea32bf97a0b0b2e3041e97b386fbd5781a251f5ccacb13
-
Filesize
72KB
MD5d26698983ab00edf23b035f44cb5b73f
SHA1b2c345f584bab5a48daf33495e61ce3a91891297
SHA256f4fe73d75700ce6ebfd41367f025d183077794ea30155a5d848251c12eea020e
SHA512225f10c4cc11e12b1e6a4cf10449fd3f8950c2ba3b140cc45f29e7b58dc58beac8c1b3b8aea99426ba09c43530e5310dc952b01c279402ffc244e8ee1da8757b
-
Filesize
72KB
MD5d26698983ab00edf23b035f44cb5b73f
SHA1b2c345f584bab5a48daf33495e61ce3a91891297
SHA256f4fe73d75700ce6ebfd41367f025d183077794ea30155a5d848251c12eea020e
SHA512225f10c4cc11e12b1e6a4cf10449fd3f8950c2ba3b140cc45f29e7b58dc58beac8c1b3b8aea99426ba09c43530e5310dc952b01c279402ffc244e8ee1da8757b
-
Filesize
72KB
MD519eb3a888ba99bfbf93e258917d07cd3
SHA112dfe16d0756b2708daaed92ebfe291fde46b274
SHA25695afd32ebdbc3ee45d8587ecb661be314f294a96a520816f95c7fcb3a0f9ce83
SHA5124309f80c3dc626667f68021680d4a8de20605f45c8aa75bcec7fbd9808958365df368a37ad9b3be3602339e0f4923ece6085580fbe0ff21eeb500169d0a495c3
-
Filesize
72KB
MD519eb3a888ba99bfbf93e258917d07cd3
SHA112dfe16d0756b2708daaed92ebfe291fde46b274
SHA25695afd32ebdbc3ee45d8587ecb661be314f294a96a520816f95c7fcb3a0f9ce83
SHA5124309f80c3dc626667f68021680d4a8de20605f45c8aa75bcec7fbd9808958365df368a37ad9b3be3602339e0f4923ece6085580fbe0ff21eeb500169d0a495c3
-
Filesize
72KB
MD506c8175714f101122dfb35a6d8da7195
SHA1c3f4903ead85997c758049dd4cfabc225ff775a4
SHA25678e47f461a7ae86822f4f4179bba077096a8d6b3ba84b35efefbe503442b0672
SHA51251b3df7cc28b4fe8e8dc3ec81e8bcb073b27545c88cec94d09a321695bc8f95537483ff193b184ea052b3fc60f0b785aa71acd7aac23cd49124495b624974d77
-
Filesize
72KB
MD506c8175714f101122dfb35a6d8da7195
SHA1c3f4903ead85997c758049dd4cfabc225ff775a4
SHA25678e47f461a7ae86822f4f4179bba077096a8d6b3ba84b35efefbe503442b0672
SHA51251b3df7cc28b4fe8e8dc3ec81e8bcb073b27545c88cec94d09a321695bc8f95537483ff193b184ea052b3fc60f0b785aa71acd7aac23cd49124495b624974d77