Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
163s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 20:41
Static task
static1
Behavioral task
behavioral1
Sample
98dae5d33c5c679a7a43cfad922a0cb8986ed4551499cd810b74a35756068a83.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
98dae5d33c5c679a7a43cfad922a0cb8986ed4551499cd810b74a35756068a83.exe
Resource
win10v2004-20220812-en
General
-
Target
98dae5d33c5c679a7a43cfad922a0cb8986ed4551499cd810b74a35756068a83.exe
-
Size
198KB
-
MD5
dbf6d37c76471c54d72c32d6aa5e53bc
-
SHA1
29f86010b5329da4bd91fdeb6bf6180425067030
-
SHA256
98dae5d33c5c679a7a43cfad922a0cb8986ed4551499cd810b74a35756068a83
-
SHA512
c5af371f7be116613cf1f29a699e1aaa1b42cee9c6daf7206dd0612505fbac00e3228a493dc210e583dc8e672d2b054b6fb83c0770de24c2a0a8ae786917cea9
-
SSDEEP
6144:wABMlUdmTKWTE6xkKZ4CDtvhbdApS9TUIItnJIWS6:wDMWTE+HbmpS9ARnJIj6
Malware Config
Signatures
-
Modifies system executable filetype association 2 TTPs 17 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\DefaultIcon\ = "%1" okx.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\start okx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\ = "Application" okx.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\open\command okx.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\runas okx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" okx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" okx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" okx.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\DefaultIcon okx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\okx.exe\" -a \"%1\" %*" okx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" okx.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\start\command okx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\Content Type = "application/x-msdownload" okx.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\open okx.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\runas\command okx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" okx.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell okx.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 936 okx.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
pid Process 936 okx.exe -
Loads dropped DLL 2 IoCs
pid Process 856 98dae5d33c5c679a7a43cfad922a0cb8986ed4551499cd810b74a35756068a83.exe 856 98dae5d33c5c679a7a43cfad922a0cb8986ed4551499cd810b74a35756068a83.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\ctfmon.exe = "C:\\WINDOWS\\system32\\ctfmon.exe" okx.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run okx.exe -
Modifies registry class 41 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.exe\shell\runas\command okx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.exe\shell\start\command\ = "\"%1\" %*" okx.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\DefaultIcon okx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" okx.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\start okx.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.exe\shell\open okx.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.exe\shell\start\command okx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\DefaultIcon\ = "%1" okx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\okx.exe\" -a \"%1\" %*" okx.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.exe\shell\open\command okx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\okx.exe\" -a \"%1\" %*" okx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" okx.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile okx.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\open okx.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.exe\shell\start okx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\ = "Application" okx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\Content Type = "application/x-msdownload" okx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" okx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" okx.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\start\command okx.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_Classes\Local Settings explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.exe\Content Type = "application/x-msdownload" okx.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.exe\shell\runas okx.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\runas okx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" okx.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.exe\shell okx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.exe\shell\start\command\IsolatedCommand = "\"%1\" %*" okx.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell okx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.exe\DefaultIcon\ = "%1" okx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" okx.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\runas\command okx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.exe\ = "exefile" okx.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.exe\DefaultIcon okx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" okx.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\open\command okx.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" okx.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\.exe okx.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 856 98dae5d33c5c679a7a43cfad922a0cb8986ed4551499cd810b74a35756068a83.exe 856 98dae5d33c5c679a7a43cfad922a0cb8986ed4551499cd810b74a35756068a83.exe 856 98dae5d33c5c679a7a43cfad922a0cb8986ed4551499cd810b74a35756068a83.exe 856 98dae5d33c5c679a7a43cfad922a0cb8986ed4551499cd810b74a35756068a83.exe 856 98dae5d33c5c679a7a43cfad922a0cb8986ed4551499cd810b74a35756068a83.exe 856 98dae5d33c5c679a7a43cfad922a0cb8986ed4551499cd810b74a35756068a83.exe 856 98dae5d33c5c679a7a43cfad922a0cb8986ed4551499cd810b74a35756068a83.exe 856 98dae5d33c5c679a7a43cfad922a0cb8986ed4551499cd810b74a35756068a83.exe 856 98dae5d33c5c679a7a43cfad922a0cb8986ed4551499cd810b74a35756068a83.exe 936 okx.exe 936 okx.exe 936 okx.exe 936 okx.exe 936 okx.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1744 explorer.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeShutdownPrivilege 1744 explorer.exe Token: SeShutdownPrivilege 1744 explorer.exe Token: SeShutdownPrivilege 1744 explorer.exe Token: SeShutdownPrivilege 1744 explorer.exe Token: SeShutdownPrivilege 1744 explorer.exe Token: SeShutdownPrivilege 1744 explorer.exe Token: SeShutdownPrivilege 1744 explorer.exe Token: SeShutdownPrivilege 1744 explorer.exe Token: SeShutdownPrivilege 1744 explorer.exe Token: SeShutdownPrivilege 1744 explorer.exe Token: 33 756 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 756 AUDIODG.EXE Token: 33 756 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 756 AUDIODG.EXE Token: SeShutdownPrivilege 1744 explorer.exe Token: SeShutdownPrivilege 1744 explorer.exe Token: SeShutdownPrivilege 1744 explorer.exe Token: SeShutdownPrivilege 1744 explorer.exe -
Suspicious use of FindShellTrayWindow 31 IoCs
pid Process 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 936 okx.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 936 okx.exe 1744 explorer.exe 1744 explorer.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 1744 explorer.exe 936 okx.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 856 wrote to memory of 936 856 98dae5d33c5c679a7a43cfad922a0cb8986ed4551499cd810b74a35756068a83.exe 27 PID 856 wrote to memory of 936 856 98dae5d33c5c679a7a43cfad922a0cb8986ed4551499cd810b74a35756068a83.exe 27 PID 856 wrote to memory of 936 856 98dae5d33c5c679a7a43cfad922a0cb8986ed4551499cd810b74a35756068a83.exe 27 PID 856 wrote to memory of 936 856 98dae5d33c5c679a7a43cfad922a0cb8986ed4551499cd810b74a35756068a83.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\98dae5d33c5c679a7a43cfad922a0cb8986ed4551499cd810b74a35756068a83.exe"C:\Users\Admin\AppData\Local\Temp\98dae5d33c5c679a7a43cfad922a0cb8986ed4551499cd810b74a35756068a83.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\okx.exe"C:\Users\Admin\AppData\Local\okx.exe" -gav C:\Users\Admin\AppData\Local\Temp\98dae5d33c5c679a7a43cfad922a0cb8986ed4551499cd810b74a35756068a83.exe2⤵
- Modifies system executable filetype association
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:936
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1744
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5581⤵
- Suspicious use of AdjustPrivilegeToken
PID:756
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198KB
MD5494a5e774ab9f2749d830eb5c9a0ba98
SHA1ce23beb22725b6cb54146fee82628454ee1cfc1d
SHA256736ddddbf2df4f96bbad0e5c001c008f2fec771c16d85587d49bfaaf5008825a
SHA512225137697305cb785afea2630ff723c86decd5fdb7caffccfdb930040a38dba167e550281df309b266c319423364699c9163cbebff2895f0670526d075ed56cf
-
Filesize
198KB
MD5494a5e774ab9f2749d830eb5c9a0ba98
SHA1ce23beb22725b6cb54146fee82628454ee1cfc1d
SHA256736ddddbf2df4f96bbad0e5c001c008f2fec771c16d85587d49bfaaf5008825a
SHA512225137697305cb785afea2630ff723c86decd5fdb7caffccfdb930040a38dba167e550281df309b266c319423364699c9163cbebff2895f0670526d075ed56cf
-
Filesize
198KB
MD5494a5e774ab9f2749d830eb5c9a0ba98
SHA1ce23beb22725b6cb54146fee82628454ee1cfc1d
SHA256736ddddbf2df4f96bbad0e5c001c008f2fec771c16d85587d49bfaaf5008825a
SHA512225137697305cb785afea2630ff723c86decd5fdb7caffccfdb930040a38dba167e550281df309b266c319423364699c9163cbebff2895f0670526d075ed56cf
-
Filesize
198KB
MD5494a5e774ab9f2749d830eb5c9a0ba98
SHA1ce23beb22725b6cb54146fee82628454ee1cfc1d
SHA256736ddddbf2df4f96bbad0e5c001c008f2fec771c16d85587d49bfaaf5008825a
SHA512225137697305cb785afea2630ff723c86decd5fdb7caffccfdb930040a38dba167e550281df309b266c319423364699c9163cbebff2895f0670526d075ed56cf