Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
163s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 20:05
Static task
static1
Behavioral task
behavioral1
Sample
f7437e22fdf06fec7d499f362c2d1217eddcf12cf214981bc8b49689bbf942f4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f7437e22fdf06fec7d499f362c2d1217eddcf12cf214981bc8b49689bbf942f4.exe
Resource
win10v2004-20221111-en
General
-
Target
f7437e22fdf06fec7d499f362c2d1217eddcf12cf214981bc8b49689bbf942f4.exe
-
Size
332KB
-
MD5
8975ed6d41fca450a0cbfd1d917b69a4
-
SHA1
57c0b3f45b0617b8ef860d4e094bf04e9b92e964
-
SHA256
f7437e22fdf06fec7d499f362c2d1217eddcf12cf214981bc8b49689bbf942f4
-
SHA512
2437c7c66479e7eca42e32a504923e5b1037fa23567aa7f00a8117eb6c26a4f721904b8e5858f3762cc43ce84d78ba13156b64e7707db8959a6c10912252ad53
-
SSDEEP
6144:AQUqwvU+Zm6DDNMzyqRic/tfgo4DIbaZhjp5u+puN+Ra0ZW1a+SqkvpU:wkgMzyg1KIK7u+pOttS/pU
Malware Config
Signatures
-
Modifies system executable filetype association 2 TTPs 17 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\exefile\shell\runas\command rua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" rua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\exefile\DefaultIcon\ = "%1" rua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" rua.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\exefile\shell\runas rua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" rua.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\exefile\shell\open rua.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\exefile\shell\open\command rua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\rua.exe\" -a \"%1\" %*" rua.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\exefile\shell\start\command rua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\exefile\Content Type = "application/x-msdownload" rua.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\exefile\DefaultIcon rua.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\exefile\shell rua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" rua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\exefile\ = "Application" rua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" rua.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\exefile\shell\start rua.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1732 rua.exe -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
pid Process 1732 rua.exe -
Loads dropped DLL 1 IoCs
pid Process 1904 f7437e22fdf06fec7d499f362c2d1217eddcf12cf214981bc8b49689bbf942f4.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run rua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\ctfmon.exe = "C:\\WINDOWS\\system32\\ctfmon.exe" rua.exe -
Modifies registry class 41 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\.exe\shell\runas\command rua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\.exe\Content Type = "application/x-msdownload" rua.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\.exe\shell\open\command rua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\rua.exe\" -a \"%1\" %*" rua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" rua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\exefile\DefaultIcon\ = "%1" rua.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\.exe rua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" rua.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\exefile rua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\exefile\ = "Application" rua.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\exefile\shell\open\command rua.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" rua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\.exe\shell\start\command\IsolatedCommand = "\"%1\" %*" rua.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\exefile\shell\open rua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\rua.exe\" -a \"%1\" %*" rua.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\.exe\ = "exefile" rua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\.exe\DefaultIcon\ = "%1" rua.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\.exe\shell\start\command rua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" rua.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\.exe\shell\runas rua.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\.exe\shell\start rua.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\exefile\shell rua.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\.exe\DefaultIcon rua.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\.exe\shell rua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" rua.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\exefile\shell\start\command rua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" rua.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\.exe\shell\open rua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\exefile\Content Type = "application/x-msdownload" rua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" rua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" rua.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\exefile\shell\start rua.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\.exe\shell\start\command\ = "\"%1\" %*" rua.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\exefile\DefaultIcon rua.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\exefile\shell\runas rua.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\exefile\shell\runas\command rua.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1904 f7437e22fdf06fec7d499f362c2d1217eddcf12cf214981bc8b49689bbf942f4.exe 1904 f7437e22fdf06fec7d499f362c2d1217eddcf12cf214981bc8b49689bbf942f4.exe 1904 f7437e22fdf06fec7d499f362c2d1217eddcf12cf214981bc8b49689bbf942f4.exe 1904 f7437e22fdf06fec7d499f362c2d1217eddcf12cf214981bc8b49689bbf942f4.exe 1904 f7437e22fdf06fec7d499f362c2d1217eddcf12cf214981bc8b49689bbf942f4.exe 1904 f7437e22fdf06fec7d499f362c2d1217eddcf12cf214981bc8b49689bbf942f4.exe 1904 f7437e22fdf06fec7d499f362c2d1217eddcf12cf214981bc8b49689bbf942f4.exe 1904 f7437e22fdf06fec7d499f362c2d1217eddcf12cf214981bc8b49689bbf942f4.exe 1904 f7437e22fdf06fec7d499f362c2d1217eddcf12cf214981bc8b49689bbf942f4.exe 1732 rua.exe 1732 rua.exe 1732 rua.exe 1732 rua.exe 1732 rua.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeShutdownPrivilege 1212 explorer.exe Token: SeShutdownPrivilege 1212 explorer.exe Token: SeShutdownPrivilege 1212 explorer.exe Token: SeShutdownPrivilege 1212 explorer.exe Token: SeShutdownPrivilege 1212 explorer.exe Token: SeShutdownPrivilege 1212 explorer.exe Token: SeShutdownPrivilege 1212 explorer.exe Token: SeShutdownPrivilege 1212 explorer.exe Token: SeShutdownPrivilege 1212 explorer.exe Token: SeShutdownPrivilege 1212 explorer.exe Token: SeShutdownPrivilege 1212 explorer.exe Token: SeShutdownPrivilege 1212 explorer.exe Token: 33 628 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 628 AUDIODG.EXE Token: 33 628 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 628 AUDIODG.EXE Token: SeShutdownPrivilege 1212 explorer.exe Token: SeShutdownPrivilege 1212 explorer.exe Token: SeShutdownPrivilege 1212 explorer.exe Token: SeShutdownPrivilege 1212 explorer.exe Token: SeShutdownPrivilege 1212 explorer.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1732 rua.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1732 rua.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1212 explorer.exe 1732 rua.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1904 wrote to memory of 1732 1904 f7437e22fdf06fec7d499f362c2d1217eddcf12cf214981bc8b49689bbf942f4.exe 27 PID 1904 wrote to memory of 1732 1904 f7437e22fdf06fec7d499f362c2d1217eddcf12cf214981bc8b49689bbf942f4.exe 27 PID 1904 wrote to memory of 1732 1904 f7437e22fdf06fec7d499f362c2d1217eddcf12cf214981bc8b49689bbf942f4.exe 27 PID 1904 wrote to memory of 1732 1904 f7437e22fdf06fec7d499f362c2d1217eddcf12cf214981bc8b49689bbf942f4.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7437e22fdf06fec7d499f362c2d1217eddcf12cf214981bc8b49689bbf942f4.exe"C:\Users\Admin\AppData\Local\Temp\f7437e22fdf06fec7d499f362c2d1217eddcf12cf214981bc8b49689bbf942f4.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Local\rua.exe"C:\Users\Admin\AppData\Local\rua.exe" -gav C:\Users\Admin\AppData\Local\Temp\f7437e22fdf06fec7d499f362c2d1217eddcf12cf214981bc8b49689bbf942f4.exe2⤵
- Modifies system executable filetype association
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1732
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1212
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4801⤵
- Suspicious use of AdjustPrivilegeToken
PID:628
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
332KB
MD58975ed6d41fca450a0cbfd1d917b69a4
SHA157c0b3f45b0617b8ef860d4e094bf04e9b92e964
SHA256f7437e22fdf06fec7d499f362c2d1217eddcf12cf214981bc8b49689bbf942f4
SHA5122437c7c66479e7eca42e32a504923e5b1037fa23567aa7f00a8117eb6c26a4f721904b8e5858f3762cc43ce84d78ba13156b64e7707db8959a6c10912252ad53
-
Filesize
332KB
MD58975ed6d41fca450a0cbfd1d917b69a4
SHA157c0b3f45b0617b8ef860d4e094bf04e9b92e964
SHA256f7437e22fdf06fec7d499f362c2d1217eddcf12cf214981bc8b49689bbf942f4
SHA5122437c7c66479e7eca42e32a504923e5b1037fa23567aa7f00a8117eb6c26a4f721904b8e5858f3762cc43ce84d78ba13156b64e7707db8959a6c10912252ad53