Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
38s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 11:09
Static task
static1
Behavioral task
behavioral1
Sample
c5f6a13df2fa54c0b9ea0cbb3af832fe7e7cea4fef6e7b523877768955350935.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c5f6a13df2fa54c0b9ea0cbb3af832fe7e7cea4fef6e7b523877768955350935.exe
Resource
win10v2004-20220812-en
General
-
Target
c5f6a13df2fa54c0b9ea0cbb3af832fe7e7cea4fef6e7b523877768955350935.exe
-
Size
57KB
-
MD5
172f8f458b8590b2eb430b6e33fd23d0
-
SHA1
2cd000a7c7843858733675f4980d4f711023e158
-
SHA256
c5f6a13df2fa54c0b9ea0cbb3af832fe7e7cea4fef6e7b523877768955350935
-
SHA512
8d67f3d163860c382e91b290622f362b88c2587e6e60acfd95546276b07b32e77817b9934b4bf0dcdc7ebe10e28a095dcc3bad9ad7ac340de33d7f5f523e21b4
-
SSDEEP
1536:mUuXeVMdMikFVhxp2EK5X96Mb1kHSNlL0:mUuXeVMf1NJ1kHmo
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\explorer.exe c5f6a13df2fa54c0b9ea0cbb3af832fe7e7cea4fef6e7b523877768955350935.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Explorer\ExplorerStartupLog.etl explorer.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz explorer.exe -
Modifies data under HKEY_USERS 20 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\WebView = "1" explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\SeparateProcess = "0" explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\IconsOnly = "0" explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{11DBB47C-A525-400B-9E80-A54615A090C0} {7F9185B0-CB92-43C5-80A9-92277A4F7B54} 0xFFFF = 0100000000000000102eeade6e09d901 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Hidden = "2" explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\DontPrettyPath = "0" explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowInfoTip = "1" explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Filter = "0" explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\AutoCheckSelect = "0" explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowTypeOverlay = "1" explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\ExplorerStartupTraceRecorded = "1" explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\MapNetDrvBtn = "0" explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellState = 240000003028000000000000000000000000000001000000120000000000000022000000 explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowCompColor = "1" explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideIcons = "0" explorer.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\SuperHidden = "0" explorer.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 944 c5f6a13df2fa54c0b9ea0cbb3af832fe7e7cea4fef6e7b523877768955350935.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 944 c5f6a13df2fa54c0b9ea0cbb3af832fe7e7cea4fef6e7b523877768955350935.exe 944 c5f6a13df2fa54c0b9ea0cbb3af832fe7e7cea4fef6e7b523877768955350935.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5f6a13df2fa54c0b9ea0cbb3af832fe7e7cea4fef6e7b523877768955350935.exe"C:\Users\Admin\AppData\Local\Temp\c5f6a13df2fa54c0b9ea0cbb3af832fe7e7cea4fef6e7b523877768955350935.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:944
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Modifies data under HKEY_USERS
PID:1892
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{682159d9-c321-47ca-b3f1-30e36b2ec8b9} -Embedding1⤵PID:940