Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
226s -
max time network
264s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 17:09
Static task
static1
Behavioral task
behavioral1
Sample
86cf60cbedcfc12834bf8f981f835fca618eb873b9c8fd67d16a405ff45d6900.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
86cf60cbedcfc12834bf8f981f835fca618eb873b9c8fd67d16a405ff45d6900.exe
Resource
win10v2004-20230915-en
General
-
Target
86cf60cbedcfc12834bf8f981f835fca618eb873b9c8fd67d16a405ff45d6900.exe
-
Size
15.3MB
-
MD5
ffc6ec71fdb2cec54fcf1a14082fcc16
-
SHA1
944d80d71dddb441f75c716e50810ea317671c58
-
SHA256
86cf60cbedcfc12834bf8f981f835fca618eb873b9c8fd67d16a405ff45d6900
-
SHA512
6f7cd64fe69091e548252965965e938d94534f53c13a8f9afe717a9021896a6fd7e7e3e59b788de2ed5c32160b5cfaf42481b477b2ae25204cd5a549360646a1
-
SSDEEP
393216:mWwdrW0M4mjWU1P33PF9R8wjRUG3SyRMK4a:mW2rFaWU1fPr9RG+wa
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2544 08C11B36.exe -
Loads dropped DLL 2 IoCs
pid Process 1620 86cf60cbedcfc12834bf8f981f835fca618eb873b9c8fd67d16a405ff45d6900.exe 2544 08C11B36.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 86cf60cbedcfc12834bf8f981f835fca618eb873b9c8fd67d16a405ff45d6900.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 86cf60cbedcfc12834bf8f981f835fca618eb873b9c8fd67d16a405ff45d6900.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 86cf60cbedcfc12834bf8f981f835fca618eb873b9c8fd67d16a405ff45d6900.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 86cf60cbedcfc12834bf8f981f835fca618eb873b9c8fd67d16a405ff45d6900.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct 86cf60cbedcfc12834bf8f981f835fca618eb873b9c8fd67d16a405ff45d6900.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\DOMStorage\fk58qa.top 08C11B36.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\DOMStorage 08C11B36.exe Set value (int) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\DOMStorage\fk58qa.top\NumberOfSubdomains = "1" 08C11B36.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total 08C11B36.exe Set value (int) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\DOMStorage\dlq.fk58qa.top\ = "63" 08C11B36.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\Main 08C11B36.exe Key created \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\DOMStorage\dlq.fk58qa.top 08C11B36.exe Set value (int) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\DOMStorage\fk58qa.top\Total = "63" 08C11B36.exe Set value (int) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "63" 08C11B36.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2544 08C11B36.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1620 86cf60cbedcfc12834bf8f981f835fca618eb873b9c8fd67d16a405ff45d6900.exe 1620 86cf60cbedcfc12834bf8f981f835fca618eb873b9c8fd67d16a405ff45d6900.exe 2544 08C11B36.exe 2544 08C11B36.exe 2544 08C11B36.exe 2544 08C11B36.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1620 wrote to memory of 2544 1620 86cf60cbedcfc12834bf8f981f835fca618eb873b9c8fd67d16a405ff45d6900.exe 28 PID 1620 wrote to memory of 2544 1620 86cf60cbedcfc12834bf8f981f835fca618eb873b9c8fd67d16a405ff45d6900.exe 28 PID 1620 wrote to memory of 2544 1620 86cf60cbedcfc12834bf8f981f835fca618eb873b9c8fd67d16a405ff45d6900.exe 28 PID 1620 wrote to memory of 2544 1620 86cf60cbedcfc12834bf8f981f835fca618eb873b9c8fd67d16a405ff45d6900.exe 28 PID 2544 wrote to memory of 1588 2544 08C11B36.exe 30 PID 2544 wrote to memory of 1588 2544 08C11B36.exe 30 PID 2544 wrote to memory of 1588 2544 08C11B36.exe 30 PID 2544 wrote to memory of 1588 2544 08C11B36.exe 30 PID 2544 wrote to memory of 1592 2544 08C11B36.exe 31 PID 2544 wrote to memory of 1592 2544 08C11B36.exe 31 PID 2544 wrote to memory of 1592 2544 08C11B36.exe 31 PID 2544 wrote to memory of 1592 2544 08C11B36.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\86cf60cbedcfc12834bf8f981f835fca618eb873b9c8fd67d16a405ff45d6900.exe"C:\Users\Admin\AppData\Local\Temp\86cf60cbedcfc12834bf8f981f835fca618eb873b9c8fd67d16a405ff45d6900.exe"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\08C11B36.exeC:\Users\Admin\AppData\Local\Temp\08C11B36.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\\*.exe"3⤵PID:1588
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\\*.dll"3⤵PID:1592
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.5MB
MD57ee08644c2578347d894d74a7339e07d
SHA12984dc83d6bb0eec2de893388f5948915c57d46d
SHA25685b776cec7644866df06ba496bd49506cdc7f61a05c9402278299061d53810ca
SHA51236f599e489f8a6a9cf21cfc689a6403c1fe8e177bddd3065310c2c79dfdd94e564ac556fbefb042524fbf1c66087e50c21bb721a00d3f95a02a2bc5dcd8317aa
-
Filesize
14.5MB
MD57ee08644c2578347d894d74a7339e07d
SHA12984dc83d6bb0eec2de893388f5948915c57d46d
SHA25685b776cec7644866df06ba496bd49506cdc7f61a05c9402278299061d53810ca
SHA51236f599e489f8a6a9cf21cfc689a6403c1fe8e177bddd3065310c2c79dfdd94e564ac556fbefb042524fbf1c66087e50c21bb721a00d3f95a02a2bc5dcd8317aa
-
Filesize
2KB
MD58b26a59dda868c8c80893010699ad6c0
SHA1a7d2a2449a937bfe1f582532d7b45c72f7536f4a
SHA256832c061cf735e4d10685136d26f78a6ec21ffc50f4de477f39652291eb6cc423
SHA5127c4f032ae0fb858614717fd43ba12a5eb1ce6723fb52afd220f5ed8f87b3acadc8030406c3201576f1bcadec600dd7cc725c9509a058c57eac92ab417e173c0f
-
Filesize
1KB
MD5e031f4c1d0e785fdaf57722209db4c2f
SHA1796976bc93402f9c6fc69f5e9e4da15353b6c8b9
SHA256f6cd1744ab2d7eb6e071ae76f8a9ccee394088564d1b8b1b98fd732dc09f33b9
SHA5120158b310e36cb06ade5b320756534199008aa996e01ebb82a664e3f1d27f2ae63f63d6ca4e2f30b6e64e65fd3babb25a9ee20dd46e7731fb19ed684a200d72a2
-
Filesize
1KB
MD58a097fdbe7ebbaf26404fcd04fe42379
SHA15ac06e5079cce795ee78853ba19a2adba7662550
SHA256888aa2c0cc55820056057651328b70cc927c25f4fac021ae6db0f40067c5bf27
SHA512a48c46fd9735f7992e24d8f366757bac7e94294967b8d443aac0cb244f7b07befc6b5b408e9b26976e2daf59a9a33c879534930d758b50cfa8940817d7e2dc45
-
Filesize
14.5MB
MD57ee08644c2578347d894d74a7339e07d
SHA12984dc83d6bb0eec2de893388f5948915c57d46d
SHA25685b776cec7644866df06ba496bd49506cdc7f61a05c9402278299061d53810ca
SHA51236f599e489f8a6a9cf21cfc689a6403c1fe8e177bddd3065310c2c79dfdd94e564ac556fbefb042524fbf1c66087e50c21bb721a00d3f95a02a2bc5dcd8317aa
-
Filesize
14.5MB
MD57ee08644c2578347d894d74a7339e07d
SHA12984dc83d6bb0eec2de893388f5948915c57d46d
SHA25685b776cec7644866df06ba496bd49506cdc7f61a05c9402278299061d53810ca
SHA51236f599e489f8a6a9cf21cfc689a6403c1fe8e177bddd3065310c2c79dfdd94e564ac556fbefb042524fbf1c66087e50c21bb721a00d3f95a02a2bc5dcd8317aa