Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
22/10/2023, 06:42
Static task
static1
Behavioral task
behavioral1
Sample
84a99d43fda151111d3f40f0d58b8274e7872e619afc7e17d68e23976dd3e10b.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
84a99d43fda151111d3f40f0d58b8274e7872e619afc7e17d68e23976dd3e10b.exe
Resource
win10v2004-20231020-en
General
-
Target
84a99d43fda151111d3f40f0d58b8274e7872e619afc7e17d68e23976dd3e10b.exe
-
Size
3.4MB
-
MD5
aba255b06b62fda9c856e400af869451
-
SHA1
ba9c204aa198d4b654aaa3e06424c8018e02e8c7
-
SHA256
84a99d43fda151111d3f40f0d58b8274e7872e619afc7e17d68e23976dd3e10b
-
SHA512
1045d13c00fecb4e1c39845e58ecc7f0470ab8ea2e3a50289010f40edcb0a81a4614d7a4952d53ad017bd7b2faffc02a96948205352a897ac2519c100922b03a
-
SSDEEP
49152:D7TvfU+8X9GrNOsva5RbKhF3ANkTTlHYNwMdqj4SJdfNVGdFrY+fkV1p2us:Q+8X9G3vP3AM6VedOncx2p
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3986878123-1347213090-2173403696-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3986878123-1347213090-2173403696-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3986878123-1347213090-2173403696-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3986878123-1347213090-2173403696-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3986878123-1347213090-2173403696-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3986878123-1347213090-2173403696-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2156 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2156 explorer.exe Token: SeShutdownPrivilege 2156 explorer.exe Token: SeShutdownPrivilege 2156 explorer.exe Token: SeShutdownPrivilege 2156 explorer.exe Token: SeShutdownPrivilege 2156 explorer.exe Token: SeShutdownPrivilege 2156 explorer.exe Token: SeShutdownPrivilege 2156 explorer.exe Token: SeShutdownPrivilege 2156 explorer.exe Token: SeShutdownPrivilege 2156 explorer.exe Token: SeShutdownPrivilege 2156 explorer.exe Token: SeShutdownPrivilege 2156 explorer.exe Token: SeShutdownPrivilege 2156 explorer.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe -
Suspicious use of SendNotifyMessage 18 IoCs
pid Process 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe 2156 explorer.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\84a99d43fda151111d3f40f0d58b8274e7872e619afc7e17d68e23976dd3e10b.exe"C:\Users\Admin\AppData\Local\Temp\84a99d43fda151111d3f40f0d58b8274e7872e619afc7e17d68e23976dd3e10b.exe"1⤵PID:1824
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2156