Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
81s -
platform
windows7_x64 -
resource
win7-20230705-en -
resource tags
arch:x64arch:x86image:win7-20230705-enlocale:en-usos:windows7-x64system -
submitted
11/07/2023, 06:54
Static task
static1
Behavioral task
behavioral1
Sample
e450ee62441e90exeexeexeex.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
e450ee62441e90exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
e450ee62441e90exeexeexeex.exe
-
Size
327KB
-
MD5
e450ee62441e907892f392726da24822
-
SHA1
924d2915171af5293b2109ebbe1bc99945a20bad
-
SHA256
0cedd5f9e64e15622c2e237d16de0df469d651583c3476c4eb881a707a5e77f9
-
SHA512
db4d534707624a4587beaf094482fe843efbd2b3d36618bfd542d9a3a5f84372bed3a251f520db8ecde77568a8cad19199b27dcab4c7e9ffc72c5bd6fce8b8b6
-
SSDEEP
6144:+2+JS2sFafI8U0obHCW/2a7XQcsPMjVWrG8KgbPzDh:+2TFafJiHCWBWPMjVWrXK0
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2932 winit32.exe 2064 winit32.exe -
Loads dropped DLL 3 IoCs
pid Process 2304 e450ee62441e90exeexeexeex.exe 2304 e450ee62441e90exeexeexeex.exe 2304 e450ee62441e90exeexeexeex.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 28 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000_CLASSES\ntdriver\shell e450ee62441e90exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000_CLASSES\.exe\shell\runas\command e450ee62441e90exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000_CLASSES\.exe\shell\runas e450ee62441e90exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000_CLASSES\ntdriver\DefaultIcon e450ee62441e90exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000_CLASSES\ntdriver\Content-Type = "application/x-msdownload" e450ee62441e90exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000_CLASSES\.exe e450ee62441e90exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000_CLASSES\.exe\DefaultIcon e450ee62441e90exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000_CLASSES\ntdriver e450ee62441e90exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000_CLASSES\ntdriver\shell\open\command e450ee62441e90exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000_CLASSES\ntdriver\shell\open e450ee62441e90exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000_CLASSES\ntdriver\shell\runas e450ee62441e90exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\XMMC\\winit32.exe\" /START \"%1\" %*" e450ee62441e90exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" e450ee62441e90exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000_CLASSES\ntdriver\DefaultIcon\ = "%1" e450ee62441e90exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000_CLASSES\.exe\shell e450ee62441e90exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000_CLASSES\ntdriver\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\XMMC\\winit32.exe\" /START \"%1\" %*" e450ee62441e90exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000_CLASSES\ntdriver\shell\runas\command\IsolatedCommand = "\"%1\" %*" e450ee62441e90exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000_CLASSES\.exe\ = "ntdriver" e450ee62441e90exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" e450ee62441e90exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000_CLASSES\.exe\DefaultIcon\ = "%1" e450ee62441e90exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000_CLASSES\ntdriver\shell\open\command\IsolatedCommand = "\"%1\" %*" e450ee62441e90exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" e450ee62441e90exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" e450ee62441e90exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000_CLASSES\ntdriver\shell\runas\command\ = "\"%1\" %*" e450ee62441e90exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000_CLASSES\ntdriver\shell\runas\command e450ee62441e90exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000_CLASSES\.exe\shell\open\command e450ee62441e90exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000_CLASSES\.exe\shell\open e450ee62441e90exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-511725148-388773979-2853099937-1000_CLASSES\ntdriver\ = "Application" e450ee62441e90exeexeexeex.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2932 winit32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2304 wrote to memory of 2932 2304 e450ee62441e90exeexeexeex.exe 28 PID 2304 wrote to memory of 2932 2304 e450ee62441e90exeexeexeex.exe 28 PID 2304 wrote to memory of 2932 2304 e450ee62441e90exeexeexeex.exe 28 PID 2304 wrote to memory of 2932 2304 e450ee62441e90exeexeexeex.exe 28 PID 2932 wrote to memory of 2064 2932 winit32.exe 29 PID 2932 wrote to memory of 2064 2932 winit32.exe 29 PID 2932 wrote to memory of 2064 2932 winit32.exe 29 PID 2932 wrote to memory of 2064 2932 winit32.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\e450ee62441e90exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\e450ee62441e90exeexeexeex.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\winit32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\winit32.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\winit32.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\winit32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\winit32.exe"3⤵
- Executes dropped EXE
PID:2064
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
327KB
MD5dc21b63c6b1ec4e5f534a22d6ebedb03
SHA161f98fb6d39a1f1b39261e90fac233044c578e33
SHA256693b4f8cb2a87ad824162d5c22bada3b3b5bc3f26b7fde15bc109af947a191f2
SHA51233fb99712aa61b93a4acd8c6c3aa37cd083e87456823f6028243ec188ce79a30f5863f8820419affa866024c74e7b097ba90655d2d115769fbe6f66aa73c6bfe
-
Filesize
327KB
MD5dc21b63c6b1ec4e5f534a22d6ebedb03
SHA161f98fb6d39a1f1b39261e90fac233044c578e33
SHA256693b4f8cb2a87ad824162d5c22bada3b3b5bc3f26b7fde15bc109af947a191f2
SHA51233fb99712aa61b93a4acd8c6c3aa37cd083e87456823f6028243ec188ce79a30f5863f8820419affa866024c74e7b097ba90655d2d115769fbe6f66aa73c6bfe
-
Filesize
327KB
MD5dc21b63c6b1ec4e5f534a22d6ebedb03
SHA161f98fb6d39a1f1b39261e90fac233044c578e33
SHA256693b4f8cb2a87ad824162d5c22bada3b3b5bc3f26b7fde15bc109af947a191f2
SHA51233fb99712aa61b93a4acd8c6c3aa37cd083e87456823f6028243ec188ce79a30f5863f8820419affa866024c74e7b097ba90655d2d115769fbe6f66aa73c6bfe
-
Filesize
327KB
MD5dc21b63c6b1ec4e5f534a22d6ebedb03
SHA161f98fb6d39a1f1b39261e90fac233044c578e33
SHA256693b4f8cb2a87ad824162d5c22bada3b3b5bc3f26b7fde15bc109af947a191f2
SHA51233fb99712aa61b93a4acd8c6c3aa37cd083e87456823f6028243ec188ce79a30f5863f8820419affa866024c74e7b097ba90655d2d115769fbe6f66aa73c6bfe
-
Filesize
327KB
MD5dc21b63c6b1ec4e5f534a22d6ebedb03
SHA161f98fb6d39a1f1b39261e90fac233044c578e33
SHA256693b4f8cb2a87ad824162d5c22bada3b3b5bc3f26b7fde15bc109af947a191f2
SHA51233fb99712aa61b93a4acd8c6c3aa37cd083e87456823f6028243ec188ce79a30f5863f8820419affa866024c74e7b097ba90655d2d115769fbe6f66aa73c6bfe
-
Filesize
327KB
MD5dc21b63c6b1ec4e5f534a22d6ebedb03
SHA161f98fb6d39a1f1b39261e90fac233044c578e33
SHA256693b4f8cb2a87ad824162d5c22bada3b3b5bc3f26b7fde15bc109af947a191f2
SHA51233fb99712aa61b93a4acd8c6c3aa37cd083e87456823f6028243ec188ce79a30f5863f8820419affa866024c74e7b097ba90655d2d115769fbe6f66aa73c6bfe
-
Filesize
327KB
MD5dc21b63c6b1ec4e5f534a22d6ebedb03
SHA161f98fb6d39a1f1b39261e90fac233044c578e33
SHA256693b4f8cb2a87ad824162d5c22bada3b3b5bc3f26b7fde15bc109af947a191f2
SHA51233fb99712aa61b93a4acd8c6c3aa37cd083e87456823f6028243ec188ce79a30f5863f8820419affa866024c74e7b097ba90655d2d115769fbe6f66aa73c6bfe