Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
220s -
max time network
276s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 11:58
Static task
static1
Behavioral task
behavioral1
Sample
a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe
Resource
win10v2004-20221111-en
General
-
Target
a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe
-
Size
1.1MB
-
MD5
53f03e54600ad28c18c3baee560c4d6e
-
SHA1
4d1967c7bd413359175db965d3e098747253923f
-
SHA256
a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3
-
SHA512
7f59ecb46927a7b60cf499990fff03bb54485f3f575cca2dd30a33bacb5c6f39ab10c65f9b57ed50b9cac3598bf6aa250b48a85783d5e95b3442f5308e5e8bc6
-
SSDEEP
12288:mJeJfEuGstUg/Tjp98zvpie5tojX0vBSVP+zBUWb9lx/9:mJeJfAqTjp98zvpieToL0BC29nPx/
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe " a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe regsvr.exe" a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe -
Disables Task Manager via registry modification
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Msn Messsenger = "C:\\Windows\\system32\\regsvr.exe" a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/892-54-0x0000000000400000-0x00000000004DB000-memory.dmp autoit_exe behavioral1/memory/892-62-0x0000000000400000-0x00000000004DB000-memory.dmp autoit_exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\28463 a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe File created C:\Windows\SysWOW64\regsvr.exe a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe File opened for modification C:\Windows\SysWOW64\regsvr.exe a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe File created C:\Windows\SysWOW64\svchost .exe a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe File opened for modification C:\Windows\SysWOW64\svchost .exe a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe File opened for modification C:\Windows\SysWOW64\setup.ini a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\regsvr.exe a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe File opened for modification C:\Windows\regsvr.exe a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 892 wrote to memory of 1244 892 a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe 28 PID 892 wrote to memory of 1244 892 a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe 28 PID 892 wrote to memory of 1244 892 a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe 28 PID 892 wrote to memory of 1244 892 a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe 28 PID 1244 wrote to memory of 468 1244 cmd.exe 30 PID 1244 wrote to memory of 468 1244 cmd.exe 30 PID 1244 wrote to memory of 468 1244 cmd.exe 30 PID 1244 wrote to memory of 468 1244 cmd.exe 30 PID 892 wrote to memory of 840 892 a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe 31 PID 892 wrote to memory of 840 892 a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe 31 PID 892 wrote to memory of 840 892 a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe 31 PID 892 wrote to memory of 840 892 a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe 31 PID 840 wrote to memory of 1012 840 cmd.exe 33 PID 840 wrote to memory of 1012 840 cmd.exe 33 PID 840 wrote to memory of 1012 840 cmd.exe 33 PID 840 wrote to memory of 1012 840 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe"C:\Users\Admin\AppData\Local\Temp\a66a5c0b59c3602277e625bb86be57c372dea75597bb2ff5840f2ce316ec0fd3.exe"1⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT /delete /yes2⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\at.exeAT /delete /yes3⤵PID:468
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\svchost .exe2⤵
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\at.exeAT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\svchost .exe3⤵PID:1012
-
-