Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
202s -
max time network
210s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 19:52
Static task
static1
Behavioral task
behavioral1
Sample
9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe
Resource
win10v2004-20220901-en
General
-
Target
9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe
-
Size
284KB
-
MD5
5734d6763c7ac808169dbc753afb02ec
-
SHA1
2523ac0705b7ddac7ab183473aa7b11ad91ddb2d
-
SHA256
9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5
-
SHA512
e5e41ac1f9378c160a59de32b54c8ecfe60870640120f65106f25ad96637a4cbca90f24fde36e3c0bdc449d3e58e0f522c197a9dbb0d18923e527882be66c67a
-
SSDEEP
6144:PsDIMNVRb9ChrASE6j61ddLb3S2NZuUBxSh4H4:kDIMvRBorARdvSiZU1
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe -
Executes dropped EXE 3 IoCs
pid Process 884 svchost.exe 1944 svchost.exe 1544 svchost.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1156 netsh.exe -
Deletes itself 1 IoCs
pid Process 1544 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 864 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 864 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" svchost.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run svchost.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe File opened for modification \??\PhysicalDrive0 svchost.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1776 set thread context of 1964 1776 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 27 PID 1964 set thread context of 864 1964 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 28 PID 884 set thread context of 1944 884 svchost.exe 34 PID 1944 set thread context of 1544 1944 svchost.exe 35 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1776 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 1964 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 864 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 884 svchost.exe 1944 svchost.exe 1544 svchost.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1776 wrote to memory of 1964 1776 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 27 PID 1776 wrote to memory of 1964 1776 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 27 PID 1776 wrote to memory of 1964 1776 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 27 PID 1776 wrote to memory of 1964 1776 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 27 PID 1776 wrote to memory of 1964 1776 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 27 PID 1776 wrote to memory of 1964 1776 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 27 PID 1776 wrote to memory of 1964 1776 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 27 PID 1776 wrote to memory of 1964 1776 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 27 PID 1776 wrote to memory of 1964 1776 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 27 PID 1964 wrote to memory of 864 1964 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 28 PID 1964 wrote to memory of 864 1964 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 28 PID 1964 wrote to memory of 864 1964 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 28 PID 1964 wrote to memory of 864 1964 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 28 PID 1964 wrote to memory of 864 1964 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 28 PID 1964 wrote to memory of 864 1964 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 28 PID 1964 wrote to memory of 864 1964 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 28 PID 1964 wrote to memory of 864 1964 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 28 PID 864 wrote to memory of 1156 864 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 31 PID 864 wrote to memory of 1156 864 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 31 PID 864 wrote to memory of 1156 864 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 31 PID 864 wrote to memory of 1156 864 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 31 PID 864 wrote to memory of 884 864 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 33 PID 864 wrote to memory of 884 864 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 33 PID 864 wrote to memory of 884 864 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 33 PID 864 wrote to memory of 884 864 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 33 PID 884 wrote to memory of 1944 884 svchost.exe 34 PID 884 wrote to memory of 1944 884 svchost.exe 34 PID 884 wrote to memory of 1944 884 svchost.exe 34 PID 884 wrote to memory of 1944 884 svchost.exe 34 PID 884 wrote to memory of 1944 884 svchost.exe 34 PID 884 wrote to memory of 1944 884 svchost.exe 34 PID 884 wrote to memory of 1944 884 svchost.exe 34 PID 884 wrote to memory of 1944 884 svchost.exe 34 PID 884 wrote to memory of 1944 884 svchost.exe 34 PID 1944 wrote to memory of 1544 1944 svchost.exe 35 PID 1944 wrote to memory of 1544 1944 svchost.exe 35 PID 1944 wrote to memory of 1544 1944 svchost.exe 35 PID 1944 wrote to memory of 1544 1944 svchost.exe 35 PID 1944 wrote to memory of 1544 1944 svchost.exe 35 PID 1944 wrote to memory of 1544 1944 svchost.exe 35 PID 1944 wrote to memory of 1544 1944 svchost.exe 35 PID 1944 wrote to memory of 1544 1944 svchost.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe"C:\Users\Admin\AppData\Local\Temp\9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe"C:\Users\Admin\AppData\Local\Temp\9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe"2⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe"C:\Users\Admin\AppData\Local\Temp\9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe"3⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\svchost.exe" CityScape Enable4⤵
- Modifies Windows Firewall
PID:1156
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe/d C:\Users\Admin\AppData\Local\Temp\9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Users\Admin\AppData\Roaming\svchost.exe/d C:\Users\Admin\AppData\Local\Temp\9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe5⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Roaming\svchost.exe/d C:\Users\Admin\AppData\Local\Temp\9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe6⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Deletes itself
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1544
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD553b45b6e6b422bf0ba327fa99a84d8ef
SHA1a073ee37d2620c465b9481adad0b0b7670275d9a
SHA256c32db5364171296322aa9f588601c9b34f231768188e4de183d49b85b6d7fb69
SHA512b9938bdd57ff5bec24039078cb659eb1a35d1e3aceff6af9e34f418c928db72c2994348e6a21c288470d3bb3a3b3d1caf799972db0a2be68ed7aa88439be2fd6
-
Filesize
284KB
MD553b45b6e6b422bf0ba327fa99a84d8ef
SHA1a073ee37d2620c465b9481adad0b0b7670275d9a
SHA256c32db5364171296322aa9f588601c9b34f231768188e4de183d49b85b6d7fb69
SHA512b9938bdd57ff5bec24039078cb659eb1a35d1e3aceff6af9e34f418c928db72c2994348e6a21c288470d3bb3a3b3d1caf799972db0a2be68ed7aa88439be2fd6
-
Filesize
284KB
MD553b45b6e6b422bf0ba327fa99a84d8ef
SHA1a073ee37d2620c465b9481adad0b0b7670275d9a
SHA256c32db5364171296322aa9f588601c9b34f231768188e4de183d49b85b6d7fb69
SHA512b9938bdd57ff5bec24039078cb659eb1a35d1e3aceff6af9e34f418c928db72c2994348e6a21c288470d3bb3a3b3d1caf799972db0a2be68ed7aa88439be2fd6
-
Filesize
284KB
MD553b45b6e6b422bf0ba327fa99a84d8ef
SHA1a073ee37d2620c465b9481adad0b0b7670275d9a
SHA256c32db5364171296322aa9f588601c9b34f231768188e4de183d49b85b6d7fb69
SHA512b9938bdd57ff5bec24039078cb659eb1a35d1e3aceff6af9e34f418c928db72c2994348e6a21c288470d3bb3a3b3d1caf799972db0a2be68ed7aa88439be2fd6
-
Filesize
284KB
MD553b45b6e6b422bf0ba327fa99a84d8ef
SHA1a073ee37d2620c465b9481adad0b0b7670275d9a
SHA256c32db5364171296322aa9f588601c9b34f231768188e4de183d49b85b6d7fb69
SHA512b9938bdd57ff5bec24039078cb659eb1a35d1e3aceff6af9e34f418c928db72c2994348e6a21c288470d3bb3a3b3d1caf799972db0a2be68ed7aa88439be2fd6
-
Filesize
284KB
MD553b45b6e6b422bf0ba327fa99a84d8ef
SHA1a073ee37d2620c465b9481adad0b0b7670275d9a
SHA256c32db5364171296322aa9f588601c9b34f231768188e4de183d49b85b6d7fb69
SHA512b9938bdd57ff5bec24039078cb659eb1a35d1e3aceff6af9e34f418c928db72c2994348e6a21c288470d3bb3a3b3d1caf799972db0a2be68ed7aa88439be2fd6