Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
18/08/2023, 19:37
Static task
static1
Behavioral task
behavioral1
Sample
1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe
Resource
win10v2004-20230703-en
General
-
Target
1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe
-
Size
3.9MB
-
MD5
af58c0932b4f8dc9d5b42d082e54a1c4
-
SHA1
0e08f0ed47bfba13b331760558d5729563e02bee
-
SHA256
1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d
-
SHA512
fd27a582e1949138d1f20c666da8efcd5bf80d92dc02409c61c2677564f09aa6acd381103a38b359e73fe1f497787b587a9a23c9f30e5ea58984b087a594fedc
-
SSDEEP
98304:W8REG2CFkZenqAd2JwB3hVzcpm13KI2qmKuLlly:FREcSZ+td2JLpi6I2qYy
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 1900 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe 1900 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe 1900 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe 1900 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 27 IoCs
pid Process 1900 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe 1900 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe 1900 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe 1900 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe 1900 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe 1900 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe 1900 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe 1900 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe 1900 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe 1900 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe 1900 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe 1900 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe 1900 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe 1900 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe 1900 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe 1900 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe 1900 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe 1900 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe 1900 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe 1900 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe 1900 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe 1900 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe 1900 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe 1900 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe 1900 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe 1900 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe 1900 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 1900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491d00000001000000100000002e0d6875874a44c820912e85e964cfdb140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b40b00000001000000180000004300b7004f00b7004d00b7004f00b7004400b7004f00000053000000010000002600000030243022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2660 WMIC.exe Token: SeSecurityPrivilege 2660 WMIC.exe Token: SeTakeOwnershipPrivilege 2660 WMIC.exe Token: SeLoadDriverPrivilege 2660 WMIC.exe Token: SeSystemProfilePrivilege 2660 WMIC.exe Token: SeSystemtimePrivilege 2660 WMIC.exe Token: SeProfSingleProcessPrivilege 2660 WMIC.exe Token: SeIncBasePriorityPrivilege 2660 WMIC.exe Token: SeCreatePagefilePrivilege 2660 WMIC.exe Token: SeBackupPrivilege 2660 WMIC.exe Token: SeRestorePrivilege 2660 WMIC.exe Token: SeShutdownPrivilege 2660 WMIC.exe Token: SeDebugPrivilege 2660 WMIC.exe Token: SeSystemEnvironmentPrivilege 2660 WMIC.exe Token: SeRemoteShutdownPrivilege 2660 WMIC.exe Token: SeUndockPrivilege 2660 WMIC.exe Token: SeManageVolumePrivilege 2660 WMIC.exe Token: 33 2660 WMIC.exe Token: 34 2660 WMIC.exe Token: 35 2660 WMIC.exe Token: SeIncreaseQuotaPrivilege 2660 WMIC.exe Token: SeSecurityPrivilege 2660 WMIC.exe Token: SeTakeOwnershipPrivilege 2660 WMIC.exe Token: SeLoadDriverPrivilege 2660 WMIC.exe Token: SeSystemProfilePrivilege 2660 WMIC.exe Token: SeSystemtimePrivilege 2660 WMIC.exe Token: SeProfSingleProcessPrivilege 2660 WMIC.exe Token: SeIncBasePriorityPrivilege 2660 WMIC.exe Token: SeCreatePagefilePrivilege 2660 WMIC.exe Token: SeBackupPrivilege 2660 WMIC.exe Token: SeRestorePrivilege 2660 WMIC.exe Token: SeShutdownPrivilege 2660 WMIC.exe Token: SeDebugPrivilege 2660 WMIC.exe Token: SeSystemEnvironmentPrivilege 2660 WMIC.exe Token: SeRemoteShutdownPrivilege 2660 WMIC.exe Token: SeUndockPrivilege 2660 WMIC.exe Token: SeManageVolumePrivilege 2660 WMIC.exe Token: 33 2660 WMIC.exe Token: 34 2660 WMIC.exe Token: 35 2660 WMIC.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1900 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe 1900 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2296 1900 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe 30 PID 1900 wrote to memory of 2296 1900 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe 30 PID 1900 wrote to memory of 2296 1900 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe 30 PID 1900 wrote to memory of 2296 1900 1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe 30 PID 2296 wrote to memory of 2660 2296 cmd.exe 32 PID 2296 wrote to memory of 2660 2296 cmd.exe 32 PID 2296 wrote to memory of 2660 2296 cmd.exe 32 PID 2296 wrote to memory of 2660 2296 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe"C:\Users\Admin\AppData\Local\Temp\1bed47ad74390ce8a0851540d51dff6f0ab4ece886fa498caa46dba19472e33d.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies system certificate store
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\cmd.exe/c wmic diskdrive get serialnumber2⤵
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic diskdrive get serialnumber3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
67KB
MD53b8cc8eaaca02cb308c85c7280852ade
SHA15813f4d3f28c00e744856860e2fdda1818f60680
SHA256cb22ff7b7dc5235a7d749499dcbcbac10047f2fc9568ecdbafefe7b8f7f760c1
SHA512e1a2b1e595f1099f0b141e33905f050104924c5a6f87b6bb4fc77274441926d826bda035bbfae51bd75d22a207415aca35526270c7005b5545ead636a80e82b0
-
Filesize
2.1MB
MD5c091a823c41bb5bc6c5a1ab6c926504c
SHA17b358a9211f8f5e3ce22f38075caf605fc4d2032
SHA256c58334cb8bd8e7a2c998d0717fff8bacbd873ab949e40a0e5f053dd51b67cca4
SHA512742ea0c78115f602c16a793d6d34ea97f0ff8bd4fc1ab28b90b7b7a3dc6fe6b921615ce97c0b23839e18f632d8e09f4319052de532dd9d31b70a22f12b7cc68d
-
Filesize
67KB
MD53b8cc8eaaca02cb308c85c7280852ade
SHA15813f4d3f28c00e744856860e2fdda1818f60680
SHA256cb22ff7b7dc5235a7d749499dcbcbac10047f2fc9568ecdbafefe7b8f7f760c1
SHA512e1a2b1e595f1099f0b141e33905f050104924c5a6f87b6bb4fc77274441926d826bda035bbfae51bd75d22a207415aca35526270c7005b5545ead636a80e82b0
-
Filesize
67KB
MD53b8cc8eaaca02cb308c85c7280852ade
SHA15813f4d3f28c00e744856860e2fdda1818f60680
SHA256cb22ff7b7dc5235a7d749499dcbcbac10047f2fc9568ecdbafefe7b8f7f760c1
SHA512e1a2b1e595f1099f0b141e33905f050104924c5a6f87b6bb4fc77274441926d826bda035bbfae51bd75d22a207415aca35526270c7005b5545ead636a80e82b0
-
Filesize
67KB
MD53b8cc8eaaca02cb308c85c7280852ade
SHA15813f4d3f28c00e744856860e2fdda1818f60680
SHA256cb22ff7b7dc5235a7d749499dcbcbac10047f2fc9568ecdbafefe7b8f7f760c1
SHA512e1a2b1e595f1099f0b141e33905f050104924c5a6f87b6bb4fc77274441926d826bda035bbfae51bd75d22a207415aca35526270c7005b5545ead636a80e82b0