Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
104s -
max time network
197s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 21:55
Static task
static1
Behavioral task
behavioral1
Sample
1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe
Resource
win10v2004-20220812-en
General
-
Target
1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe
-
Size
939KB
-
MD5
3f87c5fe1471cd8fca27923c3e28fba0
-
SHA1
a6eb75d64f1cc7fca6c9e541ca815b44796394ea
-
SHA256
1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b
-
SHA512
df1e508611a278d05f627a254d5e94a8d43f96934694b934d673a031c2e7f993a3cbc9d0956007d66ec255590b6a012f725fe16840b1faf1184269c832b6fb25
-
SSDEEP
24576:113aQvCBCUWjbUnvEG7YSvsrdkS1s1msZhxTT40qeKK:H3aQ6MUWscaYSUSS1s1mihxTTvq+
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{6YY5FVND-LA48-R77O-H0W4-VT1438Q564C5} iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6YY5FVND-LA48-R77O-H0W4-VT1438Q564C5}\StubPath = "C:\\Windows\\system32\\svchost\\server.exe Restart" iexplore.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{6YY5FVND-LA48-R77O-H0W4-VT1438Q564C5} iexplore.exe -
resource yara_rule behavioral1/memory/560-72-0x0000000010410000-0x00000000104D4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\rg+g4+rg4eg4eg4r4h44he4h+564he4h = "C:\\Windows\\system32\\svchost\\server.exe" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\ge54g564g5454h54h5+4ht5r4h54th54h = "C:\\Windows\\system32\\svchost\\server.exe" iexplore.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\svchost\plugin.dat iexplore.exe File created C:\Windows\SysWOW64\svchost\logs.dat iexplore.exe File opened for modification C:\Windows\SysWOW64\svchost\logs.dat iexplore.exe File created C:\Windows\SysWOW64\svchost\plugin.dat iexplore.exe File opened for modification C:\Windows\SysWOW64\svchost\ iexplore.exe File created C:\Windows\SysWOW64\svchost\server.exe iexplore.exe File opened for modification C:\Windows\SysWOW64\svchost\server.exe iexplore.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 296 set thread context of 560 296 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 28 -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 296 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 296 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 296 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 296 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 296 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 296 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 296 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 296 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 296 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 296 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 296 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 296 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 560 cvtres.exe 560 cvtres.exe 560 cvtres.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 296 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe Token: SeDebugPrivilege 560 cvtres.exe Token: SeDebugPrivilege 560 cvtres.exe Token: SeDebugPrivilege 560 cvtres.exe Token: SeDebugPrivilege 560 cvtres.exe Token: SeDebugPrivilege 1636 iexplore.exe Token: SeDebugPrivilege 1636 iexplore.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 296 wrote to memory of 560 296 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 28 PID 296 wrote to memory of 560 296 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 28 PID 296 wrote to memory of 560 296 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 28 PID 296 wrote to memory of 560 296 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 28 PID 296 wrote to memory of 560 296 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 28 PID 296 wrote to memory of 560 296 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 28 PID 296 wrote to memory of 560 296 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 28 PID 296 wrote to memory of 560 296 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 28 PID 296 wrote to memory of 560 296 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 28 PID 296 wrote to memory of 560 296 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 28 PID 296 wrote to memory of 560 296 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 28 PID 296 wrote to memory of 560 296 1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe 28 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29 PID 560 wrote to memory of 1636 560 cvtres.exe 29
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:472
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:108
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:1092
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:744
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1120
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1040
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:300
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:856
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:832
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:788
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:732
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:656
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:580
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe1⤵PID:480
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe1⤵PID:1984
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R1⤵PID:1932
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe"C:\Users\Admin\AppData\Local\Temp\1a4356ba0f341550c45b648ff35c9f9a27dfeb5c8e5afb3713741eee75a17c3b.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:296 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"4⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1636
-
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1224
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:416
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:380
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:368
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:332
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:260