Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
81s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 00:36
Static task
static1
Behavioral task
behavioral1
Sample
9b794e05a9bfe62fda4200f326b1c5af2b3b38dcfb240c1e0b6053db7f6dee77.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9b794e05a9bfe62fda4200f326b1c5af2b3b38dcfb240c1e0b6053db7f6dee77.exe
Resource
win10v2004-20220901-en
General
-
Target
9b794e05a9bfe62fda4200f326b1c5af2b3b38dcfb240c1e0b6053db7f6dee77.exe
-
Size
249KB
-
MD5
4d9982ad876f10228b971ebe94383e79
-
SHA1
602c9cc78e5d5ce29bcc56977580433f4f521472
-
SHA256
9b794e05a9bfe62fda4200f326b1c5af2b3b38dcfb240c1e0b6053db7f6dee77
-
SHA512
bae39101141cdb009fe841d6e3a852a5b95e1f0a5333418e443c694899d2b8a6a6358ef746580fdf2b54e8a8e98b03c125236e1e212c77c8cc6bf266679453d2
-
SSDEEP
6144:GxDC7p/mXYZiFudvV8Bwq/H0ZkavDDqH42x:GxgJZd1YHSvDD+D
Malware Config
Signatures
-
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1304 odv.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
resource yara_rule behavioral1/memory/1200-68-0x0000000000400000-0x00000000004F1000-memory.dmp upx behavioral1/memory/1200-73-0x0000000000400000-0x00000000004F1000-memory.dmp upx behavioral1/memory/1304-90-0x0000000000400000-0x00000000004F1000-memory.dmp upx behavioral1/memory/1304-91-0x0000000000400000-0x00000000004F1000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 1304 odv.exe -
Loads dropped DLL 2 IoCs
pid Process 1200 9b794e05a9bfe62fda4200f326b1c5af2b3b38dcfb240c1e0b6053db7f6dee77.exe 1200 9b794e05a9bfe62fda4200f326b1c5af2b3b38dcfb240c1e0b6053db7f6dee77.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1200 9b794e05a9bfe62fda4200f326b1c5af2b3b38dcfb240c1e0b6053db7f6dee77.exe 1200 9b794e05a9bfe62fda4200f326b1c5af2b3b38dcfb240c1e0b6053db7f6dee77.exe 1200 9b794e05a9bfe62fda4200f326b1c5af2b3b38dcfb240c1e0b6053db7f6dee77.exe 1200 9b794e05a9bfe62fda4200f326b1c5af2b3b38dcfb240c1e0b6053db7f6dee77.exe 1200 9b794e05a9bfe62fda4200f326b1c5af2b3b38dcfb240c1e0b6053db7f6dee77.exe 1200 9b794e05a9bfe62fda4200f326b1c5af2b3b38dcfb240c1e0b6053db7f6dee77.exe 1200 9b794e05a9bfe62fda4200f326b1c5af2b3b38dcfb240c1e0b6053db7f6dee77.exe 1200 9b794e05a9bfe62fda4200f326b1c5af2b3b38dcfb240c1e0b6053db7f6dee77.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1112 explorer.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeShutdownPrivilege 1112 explorer.exe Token: SeShutdownPrivilege 1112 explorer.exe Token: SeShutdownPrivilege 1112 explorer.exe Token: SeShutdownPrivilege 1112 explorer.exe Token: SeShutdownPrivilege 1112 explorer.exe Token: SeShutdownPrivilege 1112 explorer.exe Token: SeShutdownPrivilege 1112 explorer.exe Token: SeShutdownPrivilege 1112 explorer.exe Token: SeShutdownPrivilege 1112 explorer.exe Token: SeShutdownPrivilege 1112 explorer.exe Token: 33 324 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 324 AUDIODG.EXE Token: 33 324 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 324 AUDIODG.EXE Token: SeShutdownPrivilege 1112 explorer.exe Token: SeShutdownPrivilege 1112 explorer.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe -
Suspicious use of SendNotifyMessage 16 IoCs
pid Process 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1200 wrote to memory of 1304 1200 9b794e05a9bfe62fda4200f326b1c5af2b3b38dcfb240c1e0b6053db7f6dee77.exe 27 PID 1200 wrote to memory of 1304 1200 9b794e05a9bfe62fda4200f326b1c5af2b3b38dcfb240c1e0b6053db7f6dee77.exe 27 PID 1200 wrote to memory of 1304 1200 9b794e05a9bfe62fda4200f326b1c5af2b3b38dcfb240c1e0b6053db7f6dee77.exe 27 PID 1200 wrote to memory of 1304 1200 9b794e05a9bfe62fda4200f326b1c5af2b3b38dcfb240c1e0b6053db7f6dee77.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b794e05a9bfe62fda4200f326b1c5af2b3b38dcfb240c1e0b6053db7f6dee77.exe"C:\Users\Admin\AppData\Local\Temp\9b794e05a9bfe62fda4200f326b1c5af2b3b38dcfb240c1e0b6053db7f6dee77.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\odv.exe"C:\Users\Admin\AppData\Local\odv.exe" -gav C:\Users\Admin\AppData\Local\Temp\9b794e05a9bfe62fda4200f326b1c5af2b3b38dcfb240c1e0b6053db7f6dee77.exe2⤵
- Executes dropped EXE
- Deletes itself
PID:1304
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1112
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5981⤵
- Suspicious use of AdjustPrivilegeToken
PID:324
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
249KB
MD54d9982ad876f10228b971ebe94383e79
SHA1602c9cc78e5d5ce29bcc56977580433f4f521472
SHA2569b794e05a9bfe62fda4200f326b1c5af2b3b38dcfb240c1e0b6053db7f6dee77
SHA512bae39101141cdb009fe841d6e3a852a5b95e1f0a5333418e443c694899d2b8a6a6358ef746580fdf2b54e8a8e98b03c125236e1e212c77c8cc6bf266679453d2
-
Filesize
249KB
MD54d9982ad876f10228b971ebe94383e79
SHA1602c9cc78e5d5ce29bcc56977580433f4f521472
SHA2569b794e05a9bfe62fda4200f326b1c5af2b3b38dcfb240c1e0b6053db7f6dee77
SHA512bae39101141cdb009fe841d6e3a852a5b95e1f0a5333418e443c694899d2b8a6a6358ef746580fdf2b54e8a8e98b03c125236e1e212c77c8cc6bf266679453d2
-
Filesize
249KB
MD54d9982ad876f10228b971ebe94383e79
SHA1602c9cc78e5d5ce29bcc56977580433f4f521472
SHA2569b794e05a9bfe62fda4200f326b1c5af2b3b38dcfb240c1e0b6053db7f6dee77
SHA512bae39101141cdb009fe841d6e3a852a5b95e1f0a5333418e443c694899d2b8a6a6358ef746580fdf2b54e8a8e98b03c125236e1e212c77c8cc6bf266679453d2
-
Filesize
249KB
MD54d9982ad876f10228b971ebe94383e79
SHA1602c9cc78e5d5ce29bcc56977580433f4f521472
SHA2569b794e05a9bfe62fda4200f326b1c5af2b3b38dcfb240c1e0b6053db7f6dee77
SHA512bae39101141cdb009fe841d6e3a852a5b95e1f0a5333418e443c694899d2b8a6a6358ef746580fdf2b54e8a8e98b03c125236e1e212c77c8cc6bf266679453d2