Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
06/11/2023, 00:40
Static task
static1
Behavioral task
behavioral1
Sample
51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe
Resource
win10v2004-20231023-en
General
-
Target
51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe
-
Size
7.0MB
-
MD5
4dcc665d1ca0449ca8f3848c6dd4b0d6
-
SHA1
97c601f5d8ce771dcd7c16fae565b24b51bff92f
-
SHA256
51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597
-
SHA512
1e37df75348e3af9730c9d48ed0974e4207a5dd46e8c58ccfde126fef8bb7e4bc83ff7b09dd25b93009d60a091bb18023835b730c973e8252f77373da016cce4
-
SSDEEP
196608:dHVvwWB528rX22T3IjJx+2UTiADupsf+287nQR7L:/BB72sOADuB7nC
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2868 51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies registry class 25 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 740031000000000057570e911100557365727300600008000400efbeee3a851a57570e912a000000e601000000000100000000000000000036000000000055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4c0031000000000066570b05100041646d696e00380008000400efbe57570e9166570b052a0000002e000000000004000000000000000000000000000000410064006d0069006e00000014000000 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\NodeSlot = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff explorer.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2672 notepad.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2868 51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2728 explorer.exe 2868 51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2868 51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe 2868 51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe 2728 explorer.exe 2728 explorer.exe 2728 explorer.exe 2728 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2952 2868 51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe 28 PID 2868 wrote to memory of 2952 2868 51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe 28 PID 2868 wrote to memory of 2952 2868 51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe 28 PID 2952 wrote to memory of 2604 2952 cmd.exe 30 PID 2952 wrote to memory of 2604 2952 cmd.exe 30 PID 2952 wrote to memory of 2604 2952 cmd.exe 30 PID 2868 wrote to memory of 2712 2868 51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe 32 PID 2868 wrote to memory of 2712 2868 51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe 32 PID 2868 wrote to memory of 2712 2868 51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe 32 PID 2712 wrote to memory of 2672 2712 cmd.exe 34 PID 2712 wrote to memory of 2672 2712 cmd.exe 34 PID 2712 wrote to memory of 2672 2712 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe"C:\Users\Admin\AppData\Local\Temp\51f54d87b6c9908b5ed532af24531dd049f2148ce7436904136ca1bd74cbc597.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c explorer/select,C:\Users\Admin\HELanguage.hel2⤵
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\explorer.exeexplorer /select,C:\Users\Admin\HELanguage.hel3⤵PID:2604
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start notepad C:\Users\Admin\HELanguage.hel2⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\system32\notepad.exenotepad C:\Users\Admin\HELanguage.hel3⤵
- Opens file in notepad (likely ransom note)
PID:2672
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD53823c29c8fe18e23a5fae0e3d6b532ed
SHA1d6a6bb56a26f3a7b7a8f894237318b62d5fae432
SHA256a6226bfc3c5765048346a2ca643495269ff8b737a9ccd0b54f3d7e16920a3906
SHA5120fcf14683ecc0d485124f77bb431d1b8344bd3f0d1691ee747964bf3d5c97e48aa146d485d7384c72c776d41aa358835d44381dfe1f00dbbe24405fb0d1aae6d
-
Filesize
71B
MD52f0f98115f17f2869c1f59ba804af077
SHA1ae9c81906afe9cc485d6808c62a7e2fd227ac6c6
SHA2560805dcdc42ca47abdc3d8fe11f8e0c7a108602022f71ab349648cfdd30a75aa6
SHA512e1403027c2f55d2dc4972b35b16e9401d0a9b5e055839e650b242fb12051051f72ef760214bf436ba9dd2b0d67daa2d55a783e782717d53966465b8c291acbfc