Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2023, 17:04
Static task
static1
Behavioral task
behavioral1
Sample
easyMalicious301a0a4c3657.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
easyMalicious301a0a4c3657.exe
Resource
win10v2004-20230703-en
General
-
Target
easyMalicious301a0a4c3657.exe
-
Size
1.1MB
-
MD5
6c9ae6a5faca4239a20338baa3b99914
-
SHA1
fac3a387f9ceea59015838f285267eb8fa7e6172
-
SHA256
a9349ce64063f9ca04d9efcaec3947002a9b71876cd863c581ce0528db4c3a69
-
SHA512
396b2e31ef149d12d66c6980eef33467f774731216ac5aa6779e813e11d2bd598cd09c436213a334f0971687e46d988f2b6d8b5f029cb137ddb3552204625c40
-
SSDEEP
24576:p1b2N67Wx7SsKfSnvgwnc8tbycW7d7u1mxzezX3vErO5eODepB:pwN67q7HJocv1TX3ZEOW
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe sIRC4.exe" easyMalicious301a0a4c3657.exe -
Drops file in System32 directory 43 IoCs
description ioc Process File created C:\Windows\SysWOW64\xdccPrograms\7zG.exe easyMalicious301a0a4c3657.exe File created C:\Windows\SysWOW64\xdccPrograms\InspectorOfficeGadget.exe easyMalicious301a0a4c3657.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\InspectorOfficeGadget.exe easyMalicious301a0a4c3657.exe File created C:\Windows\SysWOW64\DC++ Share\chrome_pwa_launcher.exe easyMalicious301a0a4c3657.exe File created C:\Windows\SysWOW64\DC++ Share\notification_helper.exe easyMalicious301a0a4c3657.exe File created C:\Windows\SysWOW64\DC++ Share\setup.exe easyMalicious301a0a4c3657.exe File created C:\Windows\SysWOW64\sIRC4.exe easyMalicious301a0a4c3657.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\OfficeC2RClient.exe easyMalicious301a0a4c3657.exe File created C:\Windows\SysWOW64\DC++ Share\InputPersonalization.exe easyMalicious301a0a4c3657.exe File created C:\Windows\SysWOW64\DC++ Share\LICLUA.exe easyMalicious301a0a4c3657.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\chrmstp.exe easyMalicious301a0a4c3657.exe File created C:\Windows\SysWOW64\xdccPrograms\AppVShNotify.exe easyMalicious301a0a4c3657.exe File created C:\Windows\SysWOW64\DC++ Share\mip.exe easyMalicious301a0a4c3657.exe File created C:\Windows\SysWOW64\DC++ Share\elevation_service.exe easyMalicious301a0a4c3657.exe File created C:\Windows\SysWOW64\xdccPrograms\appvcleaner.exe easyMalicious301a0a4c3657.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\OfficeClickToRun.exe easyMalicious301a0a4c3657.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\ShapeCollector.exe easyMalicious301a0a4c3657.exe File created C:\Windows\SysWOW64\DC++ Share\TabTip.exe easyMalicious301a0a4c3657.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\LICLUA.exe easyMalicious301a0a4c3657.exe File created C:\Windows\SysWOW64\DC++ Share\OfficeC2RClient.exe easyMalicious301a0a4c3657.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\mip.exe easyMalicious301a0a4c3657.exe File created C:\Windows\SysWOW64\DC++ Share\OSE.exe easyMalicious301a0a4c3657.exe File created C:\Windows\SysWOW64\xdccPrograms\7zFM.exe easyMalicious301a0a4c3657.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\7zFM.exe easyMalicious301a0a4c3657.exe File created C:\Windows\SysWOW64\xdccPrograms\Uninstall.exe easyMalicious301a0a4c3657.exe File created C:\Windows\SysWOW64\xdccPrograms\IntegratedOffice.exe easyMalicious301a0a4c3657.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{A9366A71-5946-4A00-BDF8-B06B306D8CDD}.catalogItem svchost.exe File created C:\Windows\SysWOW64\DC++ Share\VSTOInstaller.exe easyMalicious301a0a4c3657.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\elevation_service.exe easyMalicious301a0a4c3657.exe File created C:\Windows\SysWOW64\DC++ Share\msinfo32.exe easyMalicious301a0a4c3657.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\msinfo32.exe easyMalicious301a0a4c3657.exe File opened for modification C:\Windows\SysWOW64\sIRC4.exe easyMalicious301a0a4c3657.exe File opened for modification C:\Windows\SysWOW64\xdccPrograms\Uninstall.exe easyMalicious301a0a4c3657.exe File created C:\Windows\SysWOW64\DC++ Share\OfficeClickToRun.exe easyMalicious301a0a4c3657.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\InputPersonalization.exe easyMalicious301a0a4c3657.exe File created C:\Windows\SysWOW64\DC++ Share\ShapeCollector.exe easyMalicious301a0a4c3657.exe File created C:\Windows\SysWOW64\DC++ Share\MavInject32.exe easyMalicious301a0a4c3657.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\TabTip.exe easyMalicious301a0a4c3657.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\OSE.exe easyMalicious301a0a4c3657.exe File created C:\Windows\SysWOW64\DC++ Share\chrmstp.exe easyMalicious301a0a4c3657.exe File created C:\Windows\SysWOW64\xdccPrograms\office2016setup.exe easyMalicious301a0a4c3657.exe File created C:\Windows\SysWOW64\xdccPrograms\7z.exe easyMalicious301a0a4c3657.exe File opened for modification C:\Windows\SysWOW64\DC++ Share\VSTOInstaller.exe easyMalicious301a0a4c3657.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\easyMalicious301a0a4c3657.exe"C:\Users\Admin\AppData\Local\Temp\easyMalicious301a0a4c3657.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
PID:1488
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:944
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5c1b35c20f7c978aa8acafa2f9d1c2e36
SHA1d90201d41d0db0624fd9881f546db6919f806b5e
SHA256570808a286c27d509a3224a4700ff5b72df43312afd73ef8aac1070322be600e
SHA512f4201191cdc0257134741ab92cfa42dd5fd7abacd07af9ff62751a2026c7f7ffab01982ce1c241d5707658167c760638aeed3bc89f1f039158c56302155259a2