Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 19:52
Static task
static1
Behavioral task
behavioral1
Sample
9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe
Resource
win10v2004-20220901-en
General
-
Target
9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe
-
Size
284KB
-
MD5
5734d6763c7ac808169dbc753afb02ec
-
SHA1
2523ac0705b7ddac7ab183473aa7b11ad91ddb2d
-
SHA256
9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5
-
SHA512
e5e41ac1f9378c160a59de32b54c8ecfe60870640120f65106f25ad96637a4cbca90f24fde36e3c0bdc449d3e58e0f522c197a9dbb0d18923e527882be66c67a
-
SSDEEP
6144:PsDIMNVRb9ChrASE6j61ddLb3S2NZuUBxSh4H4:kDIMvRBorARdvSiZU1
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe\"" 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe\"" lsass.exe -
Executes dropped EXE 3 IoCs
pid Process 4484 lsass.exe 3368 lsass.exe 3556 lsass.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 1240 netsh.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe\"" lsass.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe\"" 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe\"" 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Windows\CurrentVersion\Run lsass.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe\"" lsass.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 lsass.exe File opened for modification \??\PhysicalDrive0 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4956 set thread context of 4416 4956 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 81 PID 4416 set thread context of 2024 4416 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 82 PID 4484 set thread context of 3368 4484 lsass.exe 86 PID 3368 set thread context of 3556 3368 lsass.exe 87 -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4956 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 4416 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 2024 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 4484 lsass.exe 3368 lsass.exe 3556 lsass.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 4956 wrote to memory of 4416 4956 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 81 PID 4956 wrote to memory of 4416 4956 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 81 PID 4956 wrote to memory of 4416 4956 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 81 PID 4956 wrote to memory of 4416 4956 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 81 PID 4956 wrote to memory of 4416 4956 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 81 PID 4956 wrote to memory of 4416 4956 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 81 PID 4956 wrote to memory of 4416 4956 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 81 PID 4956 wrote to memory of 4416 4956 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 81 PID 4416 wrote to memory of 2024 4416 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 82 PID 4416 wrote to memory of 2024 4416 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 82 PID 4416 wrote to memory of 2024 4416 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 82 PID 4416 wrote to memory of 2024 4416 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 82 PID 4416 wrote to memory of 2024 4416 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 82 PID 4416 wrote to memory of 2024 4416 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 82 PID 4416 wrote to memory of 2024 4416 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 82 PID 4416 wrote to memory of 2024 4416 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 82 PID 2024 wrote to memory of 1240 2024 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 83 PID 2024 wrote to memory of 1240 2024 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 83 PID 2024 wrote to memory of 1240 2024 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 83 PID 2024 wrote to memory of 4484 2024 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 85 PID 2024 wrote to memory of 4484 2024 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 85 PID 2024 wrote to memory of 4484 2024 9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe 85 PID 4484 wrote to memory of 3368 4484 lsass.exe 86 PID 4484 wrote to memory of 3368 4484 lsass.exe 86 PID 4484 wrote to memory of 3368 4484 lsass.exe 86 PID 4484 wrote to memory of 3368 4484 lsass.exe 86 PID 4484 wrote to memory of 3368 4484 lsass.exe 86 PID 4484 wrote to memory of 3368 4484 lsass.exe 86 PID 4484 wrote to memory of 3368 4484 lsass.exe 86 PID 4484 wrote to memory of 3368 4484 lsass.exe 86 PID 3368 wrote to memory of 3556 3368 lsass.exe 87 PID 3368 wrote to memory of 3556 3368 lsass.exe 87 PID 3368 wrote to memory of 3556 3368 lsass.exe 87 PID 3368 wrote to memory of 3556 3368 lsass.exe 87 PID 3368 wrote to memory of 3556 3368 lsass.exe 87 PID 3368 wrote to memory of 3556 3368 lsass.exe 87 PID 3368 wrote to memory of 3556 3368 lsass.exe 87 PID 3368 wrote to memory of 3556 3368 lsass.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe"C:\Users\Admin\AppData\Local\Temp\9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe"C:\Users\Admin\AppData\Local\Temp\9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe"2⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe"C:\Users\Admin\AppData\Local\Temp\9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe"3⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\lsass.exe" CityScape Enable4⤵
- Modifies Windows Firewall
PID:1240
-
-
C:\Users\Admin\AppData\Roaming\lsass.exe/d C:\Users\Admin\AppData\Local\Temp\9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Roaming\lsass.exe/d C:\Users\Admin\AppData\Local\Temp\9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe5⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Users\Admin\AppData\Roaming\lsass.exe/d C:\Users\Admin\AppData\Local\Temp\9fbc0b8b304dad3901f2205e6f658bb6b418d6ebffd406b113b4f42cb02b05d5.exe6⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3556
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD553b45b6e6b422bf0ba327fa99a84d8ef
SHA1a073ee37d2620c465b9481adad0b0b7670275d9a
SHA256c32db5364171296322aa9f588601c9b34f231768188e4de183d49b85b6d7fb69
SHA512b9938bdd57ff5bec24039078cb659eb1a35d1e3aceff6af9e34f418c928db72c2994348e6a21c288470d3bb3a3b3d1caf799972db0a2be68ed7aa88439be2fd6
-
Filesize
284KB
MD553b45b6e6b422bf0ba327fa99a84d8ef
SHA1a073ee37d2620c465b9481adad0b0b7670275d9a
SHA256c32db5364171296322aa9f588601c9b34f231768188e4de183d49b85b6d7fb69
SHA512b9938bdd57ff5bec24039078cb659eb1a35d1e3aceff6af9e34f418c928db72c2994348e6a21c288470d3bb3a3b3d1caf799972db0a2be68ed7aa88439be2fd6
-
Filesize
284KB
MD553b45b6e6b422bf0ba327fa99a84d8ef
SHA1a073ee37d2620c465b9481adad0b0b7670275d9a
SHA256c32db5364171296322aa9f588601c9b34f231768188e4de183d49b85b6d7fb69
SHA512b9938bdd57ff5bec24039078cb659eb1a35d1e3aceff6af9e34f418c928db72c2994348e6a21c288470d3bb3a3b3d1caf799972db0a2be68ed7aa88439be2fd6
-
Filesize
284KB
MD553b45b6e6b422bf0ba327fa99a84d8ef
SHA1a073ee37d2620c465b9481adad0b0b7670275d9a
SHA256c32db5364171296322aa9f588601c9b34f231768188e4de183d49b85b6d7fb69
SHA512b9938bdd57ff5bec24039078cb659eb1a35d1e3aceff6af9e34f418c928db72c2994348e6a21c288470d3bb3a3b3d1caf799972db0a2be68ed7aa88439be2fd6