Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
14/11/2023, 19:20
Static task
static1
Behavioral task
behavioral1
Sample
3cd28ca17d10f9d22bc30a4855be4846018b700808792eace49525dc2b255883.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
3cd28ca17d10f9d22bc30a4855be4846018b700808792eace49525dc2b255883.exe
Resource
win10v2004-20231023-en
General
-
Target
3cd28ca17d10f9d22bc30a4855be4846018b700808792eace49525dc2b255883.exe
-
Size
118KB
-
MD5
ef7c4292ab220916f2afa6c1651b1ff4
-
SHA1
d080cc9d52e841647066d8e8e844b6a8a4311a53
-
SHA256
3cd28ca17d10f9d22bc30a4855be4846018b700808792eace49525dc2b255883
-
SHA512
47fb980ea783fbbf54d2a72f9eaf2479babc3fd7be97694a3d99c825d59905a891f06976e3ab4695540870676c43e442fa53f4b15513cb27db687d4e5d93b2cf
-
SSDEEP
3072:WOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPE:WIs9OKofHfHTXQLzgvnzHPowYbvrjD/V
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000b00000001210d-10.dat acprotect behavioral1/files/0x000b00000001210d-33.dat acprotect behavioral1/files/0x000b00000001210d-38.dat acprotect -
Executes dropped EXE 2 IoCs
pid Process 2800 ctfmen.exe 3012 smnss.exe -
Loads dropped DLL 9 IoCs
pid Process 2252 3cd28ca17d10f9d22bc30a4855be4846018b700808792eace49525dc2b255883.exe 2252 3cd28ca17d10f9d22bc30a4855be4846018b700808792eace49525dc2b255883.exe 2252 3cd28ca17d10f9d22bc30a4855be4846018b700808792eace49525dc2b255883.exe 2800 ctfmen.exe 2800 ctfmen.exe 3012 smnss.exe 2580 WerFault.exe 2580 WerFault.exe 2580 WerFault.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ctfmen = "C:\\Windows\\system32\\ctfmen.exe" 3cd28ca17d10f9d22bc30a4855be4846018b700808792eace49525dc2b255883.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ctfmen = "C:\\Windows\\system32\\ctfmen.exe" smnss.exe -
Maps connected drives based on registry 3 TTPs 6 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 smnss.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\1 smnss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 3cd28ca17d10f9d22bc30a4855be4846018b700808792eace49525dc2b255883.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 3cd28ca17d10f9d22bc30a4855be4846018b700808792eace49525dc2b255883.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\1 3cd28ca17d10f9d22bc30a4855be4846018b700808792eace49525dc2b255883.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum smnss.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\grcopy.dll 3cd28ca17d10f9d22bc30a4855be4846018b700808792eace49525dc2b255883.exe File created C:\Windows\SysWOW64\smnss.exe 3cd28ca17d10f9d22bc30a4855be4846018b700808792eace49525dc2b255883.exe File created C:\Windows\SysWOW64\zipfi.dll smnss.exe File opened for modification C:\Windows\SysWOW64\shervans.dll 3cd28ca17d10f9d22bc30a4855be4846018b700808792eace49525dc2b255883.exe File created C:\Windows\SysWOW64\satornas.dll 3cd28ca17d10f9d22bc30a4855be4846018b700808792eace49525dc2b255883.exe File opened for modification C:\Windows\SysWOW64\satornas.dll 3cd28ca17d10f9d22bc30a4855be4846018b700808792eace49525dc2b255883.exe File created C:\Windows\SysWOW64\zipfiaq.dll smnss.exe File created C:\Windows\SysWOW64\ctfmen.exe 3cd28ca17d10f9d22bc30a4855be4846018b700808792eace49525dc2b255883.exe File opened for modification C:\Windows\SysWOW64\ctfmen.exe 3cd28ca17d10f9d22bc30a4855be4846018b700808792eace49525dc2b255883.exe File created C:\Windows\SysWOW64\shervans.dll 3cd28ca17d10f9d22bc30a4855be4846018b700808792eace49525dc2b255883.exe File opened for modification C:\Windows\SysWOW64\grcopy.dll 3cd28ca17d10f9d22bc30a4855be4846018b700808792eace49525dc2b255883.exe File created C:\Windows\SysWOW64\smnss.exe smnss.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Lang\nl.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\ta.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-tw.txt smnss.exe File opened for modification C:\Program Files\7-Zip\License.txt smnss.exe File opened for modification C:\Program Files\7-Zip\readme.txt smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipshrv.xml smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsnor.xml smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\kab.txt smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsptb.xml smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\nb.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipscht.xml smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\ug.txt smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_rtl.xml smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\numbers\numbase.xml smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\mng.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\pt.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-cn.txt smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsdeu.xml smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Stars.htm smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\ko.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\hu.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\pa-in.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\tr.txt smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\auxbase.xml smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols\symbase.xml smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web.xml smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsesp.xml smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Hand Prints.htm smnss.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\server\Xusage.txt smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsptg.xml smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\uz.txt smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\baseAltGr_rtl.xml smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\ast.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\el.txt smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad\kor-kor.xml smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\symbols.xml smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsjpn.xml smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred.xml smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu.xml smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\es.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\mng2.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\va.txt smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\Content.xml smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_kor.xml smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipschs.xml smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\ka.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\kaa.txt smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipssrl.xml smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\ky.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\ro.txt smnss.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2580 3012 WerFault.exe 29 -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\InprocServer32 3cd28ca17d10f9d22bc30a4855be4846018b700808792eace49525dc2b255883.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 3cd28ca17d10f9d22bc30a4855be4846018b700808792eace49525dc2b255883.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 3cd28ca17d10f9d22bc30a4855be4846018b700808792eace49525dc2b255883.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED} 3cd28ca17d10f9d22bc30a4855be4846018b700808792eace49525dc2b255883.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\InprocServer32\ = "C:\\Windows\\SysWow64\\shervans.dll" 3cd28ca17d10f9d22bc30a4855be4846018b700808792eace49525dc2b255883.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\InprocServer32\ = "C:\\Windows\\SysWow64\\shervans.dll" smnss.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3012 smnss.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2800 2252 3cd28ca17d10f9d22bc30a4855be4846018b700808792eace49525dc2b255883.exe 28 PID 2252 wrote to memory of 2800 2252 3cd28ca17d10f9d22bc30a4855be4846018b700808792eace49525dc2b255883.exe 28 PID 2252 wrote to memory of 2800 2252 3cd28ca17d10f9d22bc30a4855be4846018b700808792eace49525dc2b255883.exe 28 PID 2252 wrote to memory of 2800 2252 3cd28ca17d10f9d22bc30a4855be4846018b700808792eace49525dc2b255883.exe 28 PID 2800 wrote to memory of 3012 2800 ctfmen.exe 29 PID 2800 wrote to memory of 3012 2800 ctfmen.exe 29 PID 2800 wrote to memory of 3012 2800 ctfmen.exe 29 PID 2800 wrote to memory of 3012 2800 ctfmen.exe 29 PID 3012 wrote to memory of 2580 3012 smnss.exe 30 PID 3012 wrote to memory of 2580 3012 smnss.exe 30 PID 3012 wrote to memory of 2580 3012 smnss.exe 30 PID 3012 wrote to memory of 2580 3012 smnss.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3cd28ca17d10f9d22bc30a4855be4846018b700808792eace49525dc2b255883.exe"C:\Users\Admin\AppData\Local\Temp\3cd28ca17d10f9d22bc30a4855be4846018b700808792eace49525dc2b255883.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\ctfmen.exectfmen.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\smnss.exeC:\Windows\system32\smnss.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 7924⤵
- Loads dropped DLL
- Program crash
PID:2580
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5edb4fab88865556aa1f3d5cab5c1b996
SHA18fc9cace359802493c54a1dd6b9a78147b7d3b57
SHA256af25f3e8766319b27d648fdc29304e1a1875dd355c4c180b9b12de30769425ec
SHA51233b861c00264f826c87202874f5d21cacb8e91259b99fc26376cb829224a5c06e73ef455bdc1f8052bb8450ab5b4f56ce1912db6aa5c3100e711fe8f20882fb0
-
Filesize
4KB
MD5edb4fab88865556aa1f3d5cab5c1b996
SHA18fc9cace359802493c54a1dd6b9a78147b7d3b57
SHA256af25f3e8766319b27d648fdc29304e1a1875dd355c4c180b9b12de30769425ec
SHA51233b861c00264f826c87202874f5d21cacb8e91259b99fc26376cb829224a5c06e73ef455bdc1f8052bb8450ab5b4f56ce1912db6aa5c3100e711fe8f20882fb0
-
Filesize
118KB
MD5fd5c740fdd1e7fcf67fe31f5717d9aad
SHA1e5526d9ff07ab1020e03fcb68640177772409e44
SHA256f18821c93cda8522c0156426a27eb615e693a2fb8c0433e8b2636773eb554d52
SHA51239659bab3db74aaf9adf4517735c55f4779d5c2edbcc2b97a63aaeb46ca9cb66568ccb9e6527848c80597353b0c36f355c5b5b1150a372f47b08972c1848454f
-
Filesize
183B
MD5b5a5b7fc463d433dc392f7428b708bb0
SHA117596277903ae29fddd613f1b68a9e963a6f316e
SHA256ce30afc8d243e7291a6371648b08e4ddee6f2b6dcc1427446d10da9a91c23161
SHA5120e13ce974fc8b607629c72b706a8681e672c0595368455aebdb0e4ea2ed9919a98359418d396ea86b58dc8a25ac62d479bd8e385b08071c7cdb4b1e344771009
-
Filesize
8KB
MD5b71b8aff8e42ffb9265e3a5337e38956
SHA1dcd2e63c47f05ebba05efb4cb6b991af5719aa56
SHA2565902dae4962ed2268d45c51bbed588609c629ad6da13ea8cd67c8906a8cec57c
SHA5124187e96a7e38bbb03266c051a73a28f0041dd2c7fb5c10c43833b6526947334bae6178078b3c495a8b2fab432cdbe32b7d685fc5f1ea1a6785ccfcf80b1c1e62
-
Filesize
118KB
MD5fd5c740fdd1e7fcf67fe31f5717d9aad
SHA1e5526d9ff07ab1020e03fcb68640177772409e44
SHA256f18821c93cda8522c0156426a27eb615e693a2fb8c0433e8b2636773eb554d52
SHA51239659bab3db74aaf9adf4517735c55f4779d5c2edbcc2b97a63aaeb46ca9cb66568ccb9e6527848c80597353b0c36f355c5b5b1150a372f47b08972c1848454f
-
Filesize
118KB
MD5fd5c740fdd1e7fcf67fe31f5717d9aad
SHA1e5526d9ff07ab1020e03fcb68640177772409e44
SHA256f18821c93cda8522c0156426a27eb615e693a2fb8c0433e8b2636773eb554d52
SHA51239659bab3db74aaf9adf4517735c55f4779d5c2edbcc2b97a63aaeb46ca9cb66568ccb9e6527848c80597353b0c36f355c5b5b1150a372f47b08972c1848454f
-
Filesize
4KB
MD5edb4fab88865556aa1f3d5cab5c1b996
SHA18fc9cace359802493c54a1dd6b9a78147b7d3b57
SHA256af25f3e8766319b27d648fdc29304e1a1875dd355c4c180b9b12de30769425ec
SHA51233b861c00264f826c87202874f5d21cacb8e91259b99fc26376cb829224a5c06e73ef455bdc1f8052bb8450ab5b4f56ce1912db6aa5c3100e711fe8f20882fb0
-
Filesize
4KB
MD5edb4fab88865556aa1f3d5cab5c1b996
SHA18fc9cace359802493c54a1dd6b9a78147b7d3b57
SHA256af25f3e8766319b27d648fdc29304e1a1875dd355c4c180b9b12de30769425ec
SHA51233b861c00264f826c87202874f5d21cacb8e91259b99fc26376cb829224a5c06e73ef455bdc1f8052bb8450ab5b4f56ce1912db6aa5c3100e711fe8f20882fb0
-
Filesize
8KB
MD5b71b8aff8e42ffb9265e3a5337e38956
SHA1dcd2e63c47f05ebba05efb4cb6b991af5719aa56
SHA2565902dae4962ed2268d45c51bbed588609c629ad6da13ea8cd67c8906a8cec57c
SHA5124187e96a7e38bbb03266c051a73a28f0041dd2c7fb5c10c43833b6526947334bae6178078b3c495a8b2fab432cdbe32b7d685fc5f1ea1a6785ccfcf80b1c1e62
-
Filesize
8KB
MD5b71b8aff8e42ffb9265e3a5337e38956
SHA1dcd2e63c47f05ebba05efb4cb6b991af5719aa56
SHA2565902dae4962ed2268d45c51bbed588609c629ad6da13ea8cd67c8906a8cec57c
SHA5124187e96a7e38bbb03266c051a73a28f0041dd2c7fb5c10c43833b6526947334bae6178078b3c495a8b2fab432cdbe32b7d685fc5f1ea1a6785ccfcf80b1c1e62
-
Filesize
118KB
MD5fd5c740fdd1e7fcf67fe31f5717d9aad
SHA1e5526d9ff07ab1020e03fcb68640177772409e44
SHA256f18821c93cda8522c0156426a27eb615e693a2fb8c0433e8b2636773eb554d52
SHA51239659bab3db74aaf9adf4517735c55f4779d5c2edbcc2b97a63aaeb46ca9cb66568ccb9e6527848c80597353b0c36f355c5b5b1150a372f47b08972c1848454f
-
Filesize
118KB
MD5fd5c740fdd1e7fcf67fe31f5717d9aad
SHA1e5526d9ff07ab1020e03fcb68640177772409e44
SHA256f18821c93cda8522c0156426a27eb615e693a2fb8c0433e8b2636773eb554d52
SHA51239659bab3db74aaf9adf4517735c55f4779d5c2edbcc2b97a63aaeb46ca9cb66568ccb9e6527848c80597353b0c36f355c5b5b1150a372f47b08972c1848454f
-
Filesize
118KB
MD5fd5c740fdd1e7fcf67fe31f5717d9aad
SHA1e5526d9ff07ab1020e03fcb68640177772409e44
SHA256f18821c93cda8522c0156426a27eb615e693a2fb8c0433e8b2636773eb554d52
SHA51239659bab3db74aaf9adf4517735c55f4779d5c2edbcc2b97a63aaeb46ca9cb66568ccb9e6527848c80597353b0c36f355c5b5b1150a372f47b08972c1848454f
-
Filesize
118KB
MD5fd5c740fdd1e7fcf67fe31f5717d9aad
SHA1e5526d9ff07ab1020e03fcb68640177772409e44
SHA256f18821c93cda8522c0156426a27eb615e693a2fb8c0433e8b2636773eb554d52
SHA51239659bab3db74aaf9adf4517735c55f4779d5c2edbcc2b97a63aaeb46ca9cb66568ccb9e6527848c80597353b0c36f355c5b5b1150a372f47b08972c1848454f
-
Filesize
118KB
MD5fd5c740fdd1e7fcf67fe31f5717d9aad
SHA1e5526d9ff07ab1020e03fcb68640177772409e44
SHA256f18821c93cda8522c0156426a27eb615e693a2fb8c0433e8b2636773eb554d52
SHA51239659bab3db74aaf9adf4517735c55f4779d5c2edbcc2b97a63aaeb46ca9cb66568ccb9e6527848c80597353b0c36f355c5b5b1150a372f47b08972c1848454f