Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 20:34
Static task
static1
Behavioral task
behavioral1
Sample
ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe
Resource
win10v2004-20220812-en
General
-
Target
ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe
-
Size
516KB
-
MD5
45abdf6f2f3367a7239e75b6f24335de
-
SHA1
dfbd21d6124ceb24f93ec786c40cf49a8bf434d7
-
SHA256
ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a
-
SHA512
fbe2f5fb6869fe16c78e6858ab902975e5eeaba06dc7bae37ab30c18d5dc0f61c3a6f9dfeef9f8e708a3e6ed927011a9d62cf66b2b044b2ea3d1fe8ca84cd159
-
SSDEEP
12288:djWIBsILBzZfU2UB9Hx8keZgx7CvzT4iOmW1FgYgnWs7dyax9I9gv:djWIBsezZs2MxPIbT41/gR0cIo
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\WA0GBAV1MQ.exe = "C:\\Users\\Admin\\AppData\\Roaming\\WA0GBAV1MQ.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1388 set thread context of 1928 1388 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe 27 -
Modifies registry key 1 TTPs 4 IoCs
pid Process 1980 reg.exe 1764 reg.exe 1644 reg.exe 1752 reg.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: 1 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe Token: SeCreateTokenPrivilege 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe Token: SeAssignPrimaryTokenPrivilege 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe Token: SeLockMemoryPrivilege 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe Token: SeIncreaseQuotaPrivilege 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe Token: SeMachineAccountPrivilege 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe Token: SeTcbPrivilege 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe Token: SeSecurityPrivilege 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe Token: SeTakeOwnershipPrivilege 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe Token: SeLoadDriverPrivilege 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe Token: SeSystemProfilePrivilege 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe Token: SeSystemtimePrivilege 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe Token: SeProfSingleProcessPrivilege 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe Token: SeIncBasePriorityPrivilege 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe Token: SeCreatePagefilePrivilege 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe Token: SeCreatePermanentPrivilege 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe Token: SeBackupPrivilege 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe Token: SeRestorePrivilege 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe Token: SeShutdownPrivilege 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe Token: SeDebugPrivilege 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe Token: SeAuditPrivilege 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe Token: SeSystemEnvironmentPrivilege 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe Token: SeChangeNotifyPrivilege 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe Token: SeRemoteShutdownPrivilege 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe Token: SeUndockPrivilege 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe Token: SeSyncAgentPrivilege 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe Token: SeEnableDelegationPrivilege 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe Token: SeManageVolumePrivilege 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe Token: SeImpersonatePrivilege 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe Token: SeCreateGlobalPrivilege 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe Token: 31 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe Token: 32 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe Token: 33 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe Token: 34 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe Token: 35 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1388 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 1388 wrote to memory of 1928 1388 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe 27 PID 1388 wrote to memory of 1928 1388 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe 27 PID 1388 wrote to memory of 1928 1388 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe 27 PID 1388 wrote to memory of 1928 1388 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe 27 PID 1388 wrote to memory of 1928 1388 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe 27 PID 1388 wrote to memory of 1928 1388 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe 27 PID 1388 wrote to memory of 1928 1388 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe 27 PID 1388 wrote to memory of 1928 1388 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe 27 PID 1388 wrote to memory of 1928 1388 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe 27 PID 1928 wrote to memory of 1584 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe 28 PID 1928 wrote to memory of 1584 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe 28 PID 1928 wrote to memory of 1584 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe 28 PID 1928 wrote to memory of 1584 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe 28 PID 1928 wrote to memory of 1164 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe 29 PID 1928 wrote to memory of 1164 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe 29 PID 1928 wrote to memory of 1164 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe 29 PID 1928 wrote to memory of 1164 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe 29 PID 1928 wrote to memory of 1340 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe 32 PID 1928 wrote to memory of 1340 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe 32 PID 1928 wrote to memory of 1340 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe 32 PID 1928 wrote to memory of 1340 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe 32 PID 1928 wrote to memory of 840 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe 34 PID 1928 wrote to memory of 840 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe 34 PID 1928 wrote to memory of 840 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe 34 PID 1928 wrote to memory of 840 1928 ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe 34 PID 1584 wrote to memory of 1980 1584 cmd.exe 36 PID 1584 wrote to memory of 1980 1584 cmd.exe 36 PID 1584 wrote to memory of 1980 1584 cmd.exe 36 PID 1584 wrote to memory of 1980 1584 cmd.exe 36 PID 1164 wrote to memory of 1764 1164 cmd.exe 37 PID 1164 wrote to memory of 1764 1164 cmd.exe 37 PID 1164 wrote to memory of 1764 1164 cmd.exe 37 PID 1164 wrote to memory of 1764 1164 cmd.exe 37 PID 1340 wrote to memory of 1644 1340 cmd.exe 38 PID 1340 wrote to memory of 1644 1340 cmd.exe 38 PID 1340 wrote to memory of 1644 1340 cmd.exe 38 PID 1340 wrote to memory of 1644 1340 cmd.exe 38 PID 840 wrote to memory of 1752 840 cmd.exe 39 PID 840 wrote to memory of 1752 840 cmd.exe 39 PID 840 wrote to memory of 1752 840 cmd.exe 39 PID 840 wrote to memory of 1752 840 cmd.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe"C:\Users\Admin\AppData\Local\Temp\ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exeC:\Users\Admin\AppData\Local\Temp\ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:1980
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe:*:Enabled:Windows Messanger" /f3⤵
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\ac1336be026c33c2653a7106e7781a1a0b6593173b5c97b091f60af51f9b9d4a.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:1764
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:1644
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\WA0GBAV1MQ.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WA0GBAV1MQ.exe:*:Enabled:Windows Messanger" /f3⤵
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\WA0GBAV1MQ.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\WA0GBAV1MQ.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:1752
-
-
-