Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 18:54
Static task
static1
Behavioral task
behavioral1
Sample
f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe
Resource
win7-20220812-en
General
-
Target
f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe
-
Size
283KB
-
MD5
63fe64c62437e3c58b49c0524275dacc
-
SHA1
30a0e544b79c11bb6a62bb0cfba9b0645dfff7ed
-
SHA256
f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2
-
SHA512
abc9039671148cdc7a2593134feb3e80d0b026292707cd3aa95ce46bca8c95d06fc96e1b42dbf99e0884ee1d377940c6eb1d181ac00c8ac16d8dc5a1fc2fb230
-
SSDEEP
6144:w7vXDRS0wfOxqpBW8gto5ZsdZjJMQcYWqz9t/Qs/FvN5c1:ivdS9OxqpBDgOAZV11n9trvN5
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe -
Disables taskbar notifications via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 1564 25BA.tmp -
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
resource yara_rule behavioral1/memory/1376-55-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1644-60-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1376-61-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1292-65-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1376 f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe 1376 f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\513.exe = "C:\\Program Files (x86)\\LP\\6BE1\\513.exe" f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\6BE1\513.exe f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe File opened for modification C:\Program Files (x86)\LP\6BE1\25BA.tmp f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe File opened for modification C:\Program Files (x86)\LP\6BE1\513.exe f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1376 f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe 1376 f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe 1376 f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe 1376 f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe 1376 f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe 1376 f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe 1376 f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe 1376 f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe 1376 f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe 1376 f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe 1376 f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe 1376 f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe 1376 f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe 1376 f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1828 explorer.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeRestorePrivilege 1968 msiexec.exe Token: SeTakeOwnershipPrivilege 1968 msiexec.exe Token: SeSecurityPrivilege 1968 msiexec.exe Token: SeShutdownPrivilege 1828 explorer.exe Token: SeShutdownPrivilege 1828 explorer.exe Token: SeShutdownPrivilege 1828 explorer.exe Token: SeShutdownPrivilege 1828 explorer.exe Token: SeShutdownPrivilege 1828 explorer.exe Token: SeShutdownPrivilege 1828 explorer.exe Token: SeShutdownPrivilege 1828 explorer.exe Token: SeShutdownPrivilege 1828 explorer.exe Token: SeShutdownPrivilege 1828 explorer.exe Token: SeShutdownPrivilege 1828 explorer.exe Token: 33 1820 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1820 AUDIODG.EXE Token: 33 1820 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1820 AUDIODG.EXE Token: SeShutdownPrivilege 1828 explorer.exe Token: SeShutdownPrivilege 1828 explorer.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1828 explorer.exe 1828 explorer.exe 1828 explorer.exe 1828 explorer.exe 1828 explorer.exe 1828 explorer.exe 1828 explorer.exe 1828 explorer.exe 1828 explorer.exe 1828 explorer.exe 1828 explorer.exe 1828 explorer.exe 1828 explorer.exe 1828 explorer.exe 1828 explorer.exe 1828 explorer.exe 1828 explorer.exe 1828 explorer.exe 1828 explorer.exe 1828 explorer.exe 1828 explorer.exe 1828 explorer.exe 1828 explorer.exe 1828 explorer.exe 1828 explorer.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 1828 explorer.exe 1828 explorer.exe 1828 explorer.exe 1828 explorer.exe 1828 explorer.exe 1828 explorer.exe 1828 explorer.exe 1828 explorer.exe 1828 explorer.exe 1828 explorer.exe 1828 explorer.exe 1828 explorer.exe 1828 explorer.exe 1828 explorer.exe 1828 explorer.exe 1828 explorer.exe 1828 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1376 wrote to memory of 1644 1376 f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe 29 PID 1376 wrote to memory of 1644 1376 f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe 29 PID 1376 wrote to memory of 1644 1376 f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe 29 PID 1376 wrote to memory of 1644 1376 f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe 29 PID 1376 wrote to memory of 1292 1376 f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe 34 PID 1376 wrote to memory of 1292 1376 f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe 34 PID 1376 wrote to memory of 1292 1376 f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe 34 PID 1376 wrote to memory of 1292 1376 f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe 34 PID 1376 wrote to memory of 1564 1376 f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe 35 PID 1376 wrote to memory of 1564 1376 f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe 35 PID 1376 wrote to memory of 1564 1376 f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe 35 PID 1376 wrote to memory of 1564 1376 f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe 35 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe"C:\Users\Admin\AppData\Local\Temp\f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exeC:\Users\Admin\AppData\Local\Temp\f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe startC:\Users\Admin\AppData\Roaming\152E8\7186B.exe%C:\Users\Admin\AppData\Roaming\152E82⤵PID:1644
-
-
C:\Users\Admin\AppData\Local\Temp\f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exeC:\Users\Admin\AppData\Local\Temp\f1cf96c3d2f53053d6a4db5b3171fdd9a2651e114b5056f8ea8853e0ad91aef2.exe startC:\Program Files (x86)\E86D2\lvvm.exe%C:\Program Files (x86)\E86D22⤵PID:1292
-
-
C:\Program Files (x86)\LP\6BE1\25BA.tmp"C:\Program Files (x86)\LP\6BE1\25BA.tmp"2⤵
- Executes dropped EXE
PID:1564
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1968
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1828
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5b01⤵
- Suspicious use of AdjustPrivilegeToken
PID:1820
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5f845b0df3da3f24c382cd3031c1c9e3b
SHA10607975a1d3aa4ad8997946a69c907e4f7bcd636
SHA25653dbfb4a4aca0f7b2fe0d1e46579f0f1e28bf0095c1418101e1ea70c3509581a
SHA512bf44d1d6ede8b520f67b47939d422f7272998a9d5bd67ac7fc5ebd44c6971769a3cd83f9cfa15465b42fd8becef5751bc858d642f5e2b1ac36f337a95e9cbb43
-
Filesize
100KB
MD5f845b0df3da3f24c382cd3031c1c9e3b
SHA10607975a1d3aa4ad8997946a69c907e4f7bcd636
SHA25653dbfb4a4aca0f7b2fe0d1e46579f0f1e28bf0095c1418101e1ea70c3509581a
SHA512bf44d1d6ede8b520f67b47939d422f7272998a9d5bd67ac7fc5ebd44c6971769a3cd83f9cfa15465b42fd8becef5751bc858d642f5e2b1ac36f337a95e9cbb43
-
Filesize
100KB
MD5f845b0df3da3f24c382cd3031c1c9e3b
SHA10607975a1d3aa4ad8997946a69c907e4f7bcd636
SHA25653dbfb4a4aca0f7b2fe0d1e46579f0f1e28bf0095c1418101e1ea70c3509581a
SHA512bf44d1d6ede8b520f67b47939d422f7272998a9d5bd67ac7fc5ebd44c6971769a3cd83f9cfa15465b42fd8becef5751bc858d642f5e2b1ac36f337a95e9cbb43