Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
16/10/2023, 06:04
Static task
static1
Behavioral task
behavioral1
Sample
93772e83bb06173d0e647e8bca3c5ed2c52b2a941c980ee683856f65e085609d.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
93772e83bb06173d0e647e8bca3c5ed2c52b2a941c980ee683856f65e085609d.exe
Resource
win10v2004-20230915-en
General
-
Target
93772e83bb06173d0e647e8bca3c5ed2c52b2a941c980ee683856f65e085609d.exe
-
Size
3.3MB
-
MD5
b2171406ffa17b1d144a2225f88a3f1f
-
SHA1
549c858c23f6c3112bdb1dabb6cd45cf1ab825e2
-
SHA256
93772e83bb06173d0e647e8bca3c5ed2c52b2a941c980ee683856f65e085609d
-
SHA512
fc90c1336b9ef4134c888cf520d2aa60995fa849a70b64bc5b02ed0987d120bc2aa40d0410769be6893d31cdc430fd69c04465a1b102abee9a4cb62106ac330e
-
SSDEEP
49152:H7TvfU+8X9GrNOsva5RbKhF3ANkTTlMkBBtjYV8Lt226E:c+8X9G3vP3AMnBtkV8Lt22X
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3016 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 3016 explorer.exe Token: SeShutdownPrivilege 3016 explorer.exe Token: SeShutdownPrivilege 3016 explorer.exe Token: SeShutdownPrivilege 3016 explorer.exe Token: SeShutdownPrivilege 3016 explorer.exe Token: SeShutdownPrivilege 3016 explorer.exe Token: SeShutdownPrivilege 3016 explorer.exe Token: SeShutdownPrivilege 3016 explorer.exe Token: SeShutdownPrivilege 3016 explorer.exe Token: SeShutdownPrivilege 3016 explorer.exe Token: SeShutdownPrivilege 3016 explorer.exe Token: SeShutdownPrivilege 3016 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe 3016 explorer.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\93772e83bb06173d0e647e8bca3c5ed2c52b2a941c980ee683856f65e085609d.exe"C:\Users\Admin\AppData\Local\Temp\93772e83bb06173d0e647e8bca3c5ed2c52b2a941c980ee683856f65e085609d.exe"1⤵PID:1736
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3016