Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

03/03/2023, 01:44

230303-b6arcsfc9s 10

03/03/2023, 01:42

230303-b4nv7sfc7z 7

03/03/2023, 01:39

230303-b2ymmafg72 8

Analysis

  • max time kernel
    44s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    03/03/2023, 01:42

General

  • Target

    regdelete-readme-edits.zip

  • Size

    102KB

  • MD5

    c311b0155c1b4b6fa69907535561ab6e

  • SHA1

    6f67ac188a59afe75c9823aa67c71f5965da3ed5

  • SHA256

    0f74f24a5c1b60aca05d1292e91b351243b3cd95dda66cd6dfdd13e8fd0c26a0

  • SHA512

    85fed902be923a86c69320568c2bf7e122a415f83cb82f414b4928da744d037e2096f2121289e988f6462da52a84bd8b0c70814e30e1f5182d64454a1c9d8484

  • SSDEEP

    3072:YmKFecO/Q3TWn8N2ArDlz4N7/82WXYAikEC:0xO/Ln8RGNL8xriJC

Score
7/10

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 41 IoCs
  • Registers COM server for autorun 1 TTPs 64 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\regdelete-readme-edits.zip
    1⤵
      PID:936
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      1⤵
        PID:1212
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x558
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1760
      • C:\Users\Admin\Desktop\regdelete-readme-edits\hell9o.exe
        "C:\Users\Admin\Desktop\regdelete-readme-edits\hell9o.exe"
        1⤵
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1216
        • C:\Windows\system32\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\regdel.CMD
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2036
          • C:\Windows\system32\reg.exe
            reg DELETE HKEY_CLASSES_ROOT /f
            3⤵
            • Modifies system executable filetype association
            • Registers COM server for autorun
            • Modifies registry class
            PID:1736
          • C:\Windows\system32\reg.exe
            reg DELETE HKEY_CURRENT_USER /f
            3⤵
              PID:1616
            • C:\Windows\system32\reg.exe
              reg DELETE HKEY_LOCAL_MACHINE /f
              3⤵
                PID:1764
              • C:\Windows\system32\reg.exe
                reg DELETE HKEY_USERS /f
                3⤵
                  PID:628
                • C:\Windows\system32\reg.exe
                  reg DELETE HKEY_CURRENT_CONFIG /f
                  3⤵
                    PID:1448
                • C:\Windows\system32\cmd.exe
                  cmd /c C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\regdel.CMD
                  2⤵
                    PID:1584
                • C:\Users\Admin\Desktop\regdelete-readme-edits\hell9o.exe
                  "C:\Users\Admin\Desktop\regdelete-readme-edits\hell9o.exe"
                  1⤵
                  • Adds Run key to start application
                  • Suspicious use of WriteProcessMemory
                  PID:2004
                  • C:\Windows\system32\cmd.exe
                    cmd /c C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\regdel.CMD
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:992
                    • C:\Windows\system32\reg.exe
                      reg DELETE HKEY_CLASSES_ROOT /f
                      3⤵
                      • Modifies system executable filetype association
                      • Registers COM server for autorun
                      • Modifies registry class
                      PID:1020
                    • C:\Windows\system32\reg.exe
                      reg DELETE HKEY_CURRENT_USER /f
                      3⤵
                        PID:1968
                      • C:\Windows\system32\reg.exe
                        reg DELETE HKEY_LOCAL_MACHINE /f
                        3⤵
                          PID:1204
                        • C:\Windows\system32\reg.exe
                          reg DELETE HKEY_USERS /f
                          3⤵
                            PID:1732
                          • C:\Windows\system32\reg.exe
                            reg DELETE HKEY_CURRENT_CONFIG /f
                            3⤵
                              PID:1716
                          • C:\Windows\system32\cmd.exe
                            cmd /c C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\regdel.CMD
                            2⤵
                              PID:1536
                          • C:\Program Files\Windows Sidebar\sidebar.exe
                            "C:\Program Files\Windows Sidebar\sidebar.exe" /showGadgets
                            1⤵
                              PID:1724
                            • C:\Windows\system32\LogonUI.exe
                              "LogonUI.exe" /flags:0x0
                              1⤵
                                PID:1116
                              • C:\Windows\system32\LogonUI.exe
                                "LogonUI.exe" /flags:0x0
                                1⤵
                                  PID:1560

                                Network

                                MITRE ATT&CK Enterprise v6

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\regdel.CMD

                                  Filesize

                                  159B

                                  MD5

                                  e26bcceba32f987399a0decf331f0697

                                  SHA1

                                  64540b56c5ff6dbb963faa50a85159c62edf7365

                                  SHA256

                                  0fd1b221f5a865fd9d796857f51724ad6460d409e2cffe8cfaef091daa689d05

                                  SHA512

                                  d96236da499970dfd6702150a5140e947547e50e3ec6b5ee3d7923ddcc637a01a9e747ecac0b81d4268cbe1a7788c63d5b4ec1373fc46318d8a5d676f510d508

                                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\regdel.CMD

                                  Filesize

                                  159B

                                  MD5

                                  e26bcceba32f987399a0decf331f0697

                                  SHA1

                                  64540b56c5ff6dbb963faa50a85159c62edf7365

                                  SHA256

                                  0fd1b221f5a865fd9d796857f51724ad6460d409e2cffe8cfaef091daa689d05

                                  SHA512

                                  d96236da499970dfd6702150a5140e947547e50e3ec6b5ee3d7923ddcc637a01a9e747ecac0b81d4268cbe1a7788c63d5b4ec1373fc46318d8a5d676f510d508

                                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\regdel.CMD

                                  Filesize

                                  159B

                                  MD5

                                  e26bcceba32f987399a0decf331f0697

                                  SHA1

                                  64540b56c5ff6dbb963faa50a85159c62edf7365

                                  SHA256

                                  0fd1b221f5a865fd9d796857f51724ad6460d409e2cffe8cfaef091daa689d05

                                  SHA512

                                  d96236da499970dfd6702150a5140e947547e50e3ec6b5ee3d7923ddcc637a01a9e747ecac0b81d4268cbe1a7788c63d5b4ec1373fc46318d8a5d676f510d508