Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
193s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 18:11
Static task
static1
Behavioral task
behavioral1
Sample
c36b1547ba41e9fa854455d809d394c5b46a3512324d0733c083cf2843f9ea2c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c36b1547ba41e9fa854455d809d394c5b46a3512324d0733c083cf2843f9ea2c.exe
Resource
win10v2004-20220812-en
General
-
Target
c36b1547ba41e9fa854455d809d394c5b46a3512324d0733c083cf2843f9ea2c.exe
-
Size
154KB
-
MD5
582b5d008b33aec694043c3e5c47f421
-
SHA1
166c22d5f5dde4b5021b5001927fd03bf73cc63e
-
SHA256
c36b1547ba41e9fa854455d809d394c5b46a3512324d0733c083cf2843f9ea2c
-
SHA512
ddddd2bdb95ec4c9da09c52423b7038b27670815f7ec989d20fa462d10c9631df18bd7250a5ebdcd85b0cda4d2698b641ae29bc0d2da58cd7c65b9b364c46971
-
SSDEEP
3072:D0uILepp/gZx2DMVI2X5db4T0pMEqEWx7LAqRfwqtqz34Epfbz1L2S1:uep2Z2+5dsaMEqEWx78IfwI0bzRz
Malware Config
Signatures
-
Modifies security service 2 TTPs 10 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Security services.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Start = "4" services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\IPTLSOut services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\RPC-EPMap services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\Teredo services.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\DeleteFlag = "1" services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\DHCP services.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\MpsSvc\Parameters\PortKeywords\IPTLSIn services.exe -
Executes dropped EXE 2 IoCs
pid Process 1376 Explorer.EXE 464 services.exe -
Registers COM server for autorun 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InprocServer32 c36b1547ba41e9fa854455d809d394c5b46a3512324d0733c083cf2843f9ea2c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InprocServer32\ThreadingModel = "Both" c36b1547ba41e9fa854455d809d394c5b46a3512324d0733c083cf2843f9ea2c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InprocServer32\ = "C:\\$Recycle.Bin\\S-1-5-21-3385717845-2518323428-350143044-1000\\$f6ae883d87b28e9233b2e7745dda3830\\n." c36b1547ba41e9fa854455d809d394c5b46a3512324d0733c083cf2843f9ea2c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5839FCA9-774D-42A1-ACDA-D6A79037F57F}\InprocServer32\ = "C:\\$Recycle.Bin\\S-1-5-18\\$f6ae883d87b28e9233b2e7745dda3830\\n." c36b1547ba41e9fa854455d809d394c5b46a3512324d0733c083cf2843f9ea2c.exe -
Deletes itself 1 IoCs
pid Process 1276 cmd.exe -
Unexpected DNS network traffic destination 18 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 91.195.254.70 Destination IP 91.195.254.70 Destination IP 66.85.130.234 Destination IP 91.195.254.70 Destination IP 66.85.130.234 Destination IP 91.195.254.70 Destination IP 91.195.254.70 Destination IP 66.85.130.234 Destination IP 66.85.130.234 Destination IP 66.85.130.234 Destination IP 66.85.130.234 Destination IP 91.195.254.70 Destination IP 91.195.254.70 Destination IP 66.85.130.234 Destination IP 66.85.130.234 Destination IP 91.195.254.70 Destination IP 66.85.130.234 Destination IP 91.195.254.70 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1788 set thread context of 1276 1788 c36b1547ba41e9fa854455d809d394c5b46a3512324d0733c083cf2843f9ea2c.exe 28 -
Modifies registry class 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InprocServer32\ = "C:\\$Recycle.Bin\\S-1-5-21-3385717845-2518323428-350143044-1000\\$f6ae883d87b28e9233b2e7745dda3830\\n." c36b1547ba41e9fa854455d809d394c5b46a3512324d0733c083cf2843f9ea2c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{5839FCA9-774D-42A1-ACDA-D6A79037F57F}\InprocServer32\ = "C:\\$Recycle.Bin\\S-1-5-18\\$f6ae883d87b28e9233b2e7745dda3830\\n." c36b1547ba41e9fa854455d809d394c5b46a3512324d0733c083cf2843f9ea2c.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\clsid c36b1547ba41e9fa854455d809d394c5b46a3512324d0733c083cf2843f9ea2c.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9} c36b1547ba41e9fa854455d809d394c5b46a3512324d0733c083cf2843f9ea2c.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InprocServer32 c36b1547ba41e9fa854455d809d394c5b46a3512324d0733c083cf2843f9ea2c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000_CLASSES\CLSID\{fbeb8a05-beee-4442-804e-409d6c4515e9}\InprocServer32\ThreadingModel = "Both" c36b1547ba41e9fa854455d809d394c5b46a3512324d0733c083cf2843f9ea2c.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1788 c36b1547ba41e9fa854455d809d394c5b46a3512324d0733c083cf2843f9ea2c.exe 1788 c36b1547ba41e9fa854455d809d394c5b46a3512324d0733c083cf2843f9ea2c.exe 1788 c36b1547ba41e9fa854455d809d394c5b46a3512324d0733c083cf2843f9ea2c.exe 1788 c36b1547ba41e9fa854455d809d394c5b46a3512324d0733c083cf2843f9ea2c.exe 1788 c36b1547ba41e9fa854455d809d394c5b46a3512324d0733c083cf2843f9ea2c.exe 1788 c36b1547ba41e9fa854455d809d394c5b46a3512324d0733c083cf2843f9ea2c.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1376 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 1788 c36b1547ba41e9fa854455d809d394c5b46a3512324d0733c083cf2843f9ea2c.exe Token: SeDebugPrivilege 1788 c36b1547ba41e9fa854455d809d394c5b46a3512324d0733c083cf2843f9ea2c.exe Token: SeDebugPrivilege 1788 c36b1547ba41e9fa854455d809d394c5b46a3512324d0733c083cf2843f9ea2c.exe Token: SeBackupPrivilege 464 services.exe Token: SeRestorePrivilege 464 services.exe Token: SeSecurityPrivilege 464 services.exe Token: SeTakeOwnershipPrivilege 464 services.exe Token: SeBackupPrivilege 464 services.exe Token: SeRestorePrivilege 464 services.exe Token: SeSecurityPrivilege 464 services.exe Token: SeTakeOwnershipPrivilege 464 services.exe Token: SeShutdownPrivilege 1376 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1376 Explorer.EXE 1376 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1376 Explorer.EXE 1376 Explorer.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1788 wrote to memory of 1376 1788 c36b1547ba41e9fa854455d809d394c5b46a3512324d0733c083cf2843f9ea2c.exe 16 PID 1788 wrote to memory of 1376 1788 c36b1547ba41e9fa854455d809d394c5b46a3512324d0733c083cf2843f9ea2c.exe 16 PID 1788 wrote to memory of 464 1788 c36b1547ba41e9fa854455d809d394c5b46a3512324d0733c083cf2843f9ea2c.exe 2 PID 1788 wrote to memory of 1276 1788 c36b1547ba41e9fa854455d809d394c5b46a3512324d0733c083cf2843f9ea2c.exe 28 PID 1788 wrote to memory of 1276 1788 c36b1547ba41e9fa854455d809d394c5b46a3512324d0733c083cf2843f9ea2c.exe 28 PID 1788 wrote to memory of 1276 1788 c36b1547ba41e9fa854455d809d394c5b46a3512324d0733c083cf2843f9ea2c.exe 28 PID 1788 wrote to memory of 1276 1788 c36b1547ba41e9fa854455d809d394c5b46a3512324d0733c083cf2843f9ea2c.exe 28 PID 1788 wrote to memory of 1276 1788 c36b1547ba41e9fa854455d809d394c5b46a3512324d0733c083cf2843f9ea2c.exe 28
Processes
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵
- Modifies security service
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:464
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\c36b1547ba41e9fa854455d809d394c5b46a3512324d0733c083cf2843f9ea2c.exe"C:\Users\Admin\AppData\Local\Temp\c36b1547ba41e9fa854455d809d394c5b46a3512324d0733c083cf2843f9ea2c.exe"2⤵
- Registers COM server for autorun
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Deletes itself
PID:1276
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5a02e18d5a85fa8d7b0402f4e46d230df
SHA1923f5df24f66ed1f04069e13cba0deec03f6c2be
SHA25654ebaa7e809d5921b7a2e6478b4a58e39aeb13db17373af1d6594968c9569cf4
SHA5121f5a4c6a21957c91b0a0f68547ac31892273bad789255712bd1c5ece7b10ed57aca60fe7e5d9cf209127e7562d7494fe6242c2ed575dd1840733b35d0c501de1
-
Filesize
25KB
MD5031f24073b43717e018ba0c5f62cb0c2
SHA1504008e17d774bdfd3996ce8cf521277ca620ca9
SHA2569abdc34bee90330fa2505f0c3f74eda6036e5adf22cc8bcd57192d0bf6f17946
SHA512c9a163bc5cd6171013e38ee418737f0ee383b733090648d8879b259b0659d803c23d2e62b6e34e9897c436f35984ccc4f29d552a975f03292774834279f07d37
-
Filesize
25KB
MD5031f24073b43717e018ba0c5f62cb0c2
SHA1504008e17d774bdfd3996ce8cf521277ca620ca9
SHA2569abdc34bee90330fa2505f0c3f74eda6036e5adf22cc8bcd57192d0bf6f17946
SHA512c9a163bc5cd6171013e38ee418737f0ee383b733090648d8879b259b0659d803c23d2e62b6e34e9897c436f35984ccc4f29d552a975f03292774834279f07d37
-
Filesize
25KB
MD5031f24073b43717e018ba0c5f62cb0c2
SHA1504008e17d774bdfd3996ce8cf521277ca620ca9
SHA2569abdc34bee90330fa2505f0c3f74eda6036e5adf22cc8bcd57192d0bf6f17946
SHA512c9a163bc5cd6171013e38ee418737f0ee383b733090648d8879b259b0659d803c23d2e62b6e34e9897c436f35984ccc4f29d552a975f03292774834279f07d37
-
Filesize
25KB
MD5031f24073b43717e018ba0c5f62cb0c2
SHA1504008e17d774bdfd3996ce8cf521277ca620ca9
SHA2569abdc34bee90330fa2505f0c3f74eda6036e5adf22cc8bcd57192d0bf6f17946
SHA512c9a163bc5cd6171013e38ee418737f0ee383b733090648d8879b259b0659d803c23d2e62b6e34e9897c436f35984ccc4f29d552a975f03292774834279f07d37