Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
127s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
14/11/2023, 09:48
Static task
static1
Behavioral task
behavioral1
Sample
stager.chm
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
stager.chm
Resource
win10v2004-20231020-en
General
-
Target
stager.chm
-
Size
215KB
-
MD5
f7175168cef18a6a30722d40424e3e60
-
SHA1
1895b257c271f8b582a321e18790c5487e5f1b9f
-
SHA256
238b585f1b49eca8b4342a626e4480d8754bbbd75fcf8ac7307ff3cf642812e5
-
SHA512
32cb9b717c387eb97229d37d0ee14896980d31fef77c517494c8e468909a4cc207d35343f2cd76eee8af4c989b3c1c9b948606299310adc7cf8cd86d8e01c2f9
-
SSDEEP
3072:rTDyc8klHgSnHNVTj0h0qlmD1QKoJc3kKcAVm/6iG1yjfJuOjF8Tse69RsWni1Pv:rTDXhHc1YJtoTKUPG1yjf6ZysWiJ
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" svchost.exe -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 2772 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2772 svchost.exe 2772 svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Main hh.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1320 hh.exe 1320 hh.exe 2772 svchost.exe 2772 svchost.exe 2772 svchost.exe 1320 hh.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1320 hh.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1320 hh.exe 1320 hh.exe -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" svchost.exe
Processes
-
C:\Windows\hh.exe"C:\Windows\hh.exe" C:\Users\Admin\AppData\Local\Temp\stager.chm1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1320
-
C:\Users\Admin\Searchesfox\jtkkBrCqKURWuziqkaH2YjenVMTCnli7YbxK0WOzlQvE9Dg9lZ\svchost.exe"C:\Users\Admin\Searchesfox\jtkkBrCqKURWuziqkaH2YjenVMTCnli7YbxK0WOzlQvE9Dg9lZ\svchost.exe" d2ire2ct2dir2ec2td2ir2ect1⤵
- UAC bypass
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- System policy modification
PID:2772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
573KB
MD5f717c0c79474763e15688af2ddc61278
SHA10156d35142b05f870ef41577a6d59e42573f09e0
SHA256f7cedac2f5478eae1ea16b19672f602a74f271106f115ca28b7a768bc94cfefa
SHA512b753cf065bfd9dcacf1fbf16a37b78cb36c17a62b5e3f6e35472196cb2356947c0fcb6ba3d8dae12bf9e99e7f167b9fd66b1579f54ae8e6139f7ff3cb2e08adb
-
Filesize
8.9MB
MD59cf910fca5c1e977b3816cf86f1c699f
SHA16161f239764f904491cdcafa88c56fa22ce48ac7
SHA256d30527fe2046455512c374449b422de6162d5e27b1952985ff50404142e1a5d2
SHA5123c6fdcbde182ff9b15bd692529f5206a1d8da2ee93b3fb33d1b4c037cab156f33eb4c7100b4dfd1d0c359b87fea4d7b1befd4d89a17dab05dbaf750c2a3fdf31
-
Filesize
978KB
MD58e945aaf7128bb3db83e51f3c2356637
SHA1bcc64335efc63cb46e14cc330e105520391e2b00
SHA2564fcf6394b14e24d830b04209a0ede1dcc911d199740a55d12c8ab8aeabb84073
SHA512150636eea0cab3e738f5e94ae910d189622fa3221aca1cecc05bf0f5a80f2fab055adeafd99eab7a2a1d3911ff2784cf521a2681e5ddf7737f4363b915b8c2a8
-
Filesize
978KB
MD58e945aaf7128bb3db83e51f3c2356637
SHA1bcc64335efc63cb46e14cc330e105520391e2b00
SHA2564fcf6394b14e24d830b04209a0ede1dcc911d199740a55d12c8ab8aeabb84073
SHA512150636eea0cab3e738f5e94ae910d189622fa3221aca1cecc05bf0f5a80f2fab055adeafd99eab7a2a1d3911ff2784cf521a2681e5ddf7737f4363b915b8c2a8
-
Filesize
978KB
MD58e945aaf7128bb3db83e51f3c2356637
SHA1bcc64335efc63cb46e14cc330e105520391e2b00
SHA2564fcf6394b14e24d830b04209a0ede1dcc911d199740a55d12c8ab8aeabb84073
SHA512150636eea0cab3e738f5e94ae910d189622fa3221aca1cecc05bf0f5a80f2fab055adeafd99eab7a2a1d3911ff2784cf521a2681e5ddf7737f4363b915b8c2a8
-
Filesize
9.9MB
MD547de7a7979344e34beb77c829c2a1ca6
SHA153a002efbf671908bae9f09a9bfd55bcf5825806
SHA2566ce46851f01776a39081db8d6cd10421b5e920b723a235590d94162e0fa18a47
SHA51280826cbbe7fcc7f119ddba9ab1bfe1025bed1dff147512d7564d9ee06dcd231067f6c4d7ec722120ac839c744866888e8ff52594dcc4e228da740cf9b77c1118
-
Filesize
978KB
MD58e945aaf7128bb3db83e51f3c2356637
SHA1bcc64335efc63cb46e14cc330e105520391e2b00
SHA2564fcf6394b14e24d830b04209a0ede1dcc911d199740a55d12c8ab8aeabb84073
SHA512150636eea0cab3e738f5e94ae910d189622fa3221aca1cecc05bf0f5a80f2fab055adeafd99eab7a2a1d3911ff2784cf521a2681e5ddf7737f4363b915b8c2a8