Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
14/11/2023, 18:51
Static task
static1
Behavioral task
behavioral1
Sample
acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe
Resource
win10v2004-20231023-en
General
-
Target
acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe
-
Size
853KB
-
MD5
dbf67f7f28604cab1644c0f6b7964a96
-
SHA1
5e787962936e37a00826a4edae473e1cc8e7ace7
-
SHA256
acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d
-
SHA512
5675c7a947fce4cfb0d2601274a1691daa892996d5f5c52e15f6042d8aeda40f35d275a85c4d39bed1a29c20d45da36777064d3304eb294e8109c217681dce89
-
SSDEEP
24576:/ifxgP1zXgMG1kT0Gqgr1iuXXABG8L4Yfs:6fxgP18rOvqgrZHj8LJs
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Executes dropped EXE 1 IoCs
pid Process 1404 acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe -
Loads dropped DLL 1 IoCs
pid Process 2868 acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\trkcore = "C:\\ProgramData\\Microsoft\\Roaming\\svchost.exe" acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1404 acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe 1404 acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1404 acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe 1404 acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe 1404 acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe 1404 acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe 1404 acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe 1404 acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe 1404 acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe 1404 acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe 1404 acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2508 explorer.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2868 acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2508 explorer.exe Token: SeShutdownPrivilege 2508 explorer.exe Token: SeShutdownPrivilege 2508 explorer.exe Token: SeShutdownPrivilege 2508 explorer.exe Token: SeShutdownPrivilege 2508 explorer.exe Token: SeShutdownPrivilege 2508 explorer.exe Token: SeShutdownPrivilege 2508 explorer.exe Token: SeShutdownPrivilege 2508 explorer.exe Token: SeShutdownPrivilege 2508 explorer.exe Token: SeShutdownPrivilege 2508 explorer.exe Token: SeShutdownPrivilege 2508 explorer.exe Token: SeShutdownPrivilege 2508 explorer.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe 2508 explorer.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1404 acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2868 wrote to memory of 1404 2868 acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe 28 PID 2868 wrote to memory of 1404 2868 acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe 28 PID 2868 wrote to memory of 1404 2868 acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe 28 PID 2868 wrote to memory of 1404 2868 acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe 28 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe"C:\Users\Admin\AppData\Local\Temp\acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exeC:\Users\Admin\AppData\Local\Temp\acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- System policy modification
PID:1404
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2508
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:2496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
C:\Users\Admin\AppData\Local\Temp\acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe
Filesize853KB
MD59a63fbce74c2aacb02a46937e770daef
SHA1d74c3db12bdf0bb896fb6a90a9dc2834a3e89075
SHA2560cf4b178bf176907926c70816f9e4ffddec70c1d9fa6f6a941a6cff98908954a
SHA512603cc278ef83b533c6063eea058c79544445073f1aa7f3276cbcfb86510f1887762db2ecaee4c71fb17162a8ceb45f3f5b8914f0a7b2794e0fa8c749dc7ffc04
-
\Users\Admin\AppData\Local\Temp\acbb1db51ecd91c8b7e62cc75e532b32df89fcfc7f318e9f925d9a4521dbd89d.exe
Filesize853KB
MD59a63fbce74c2aacb02a46937e770daef
SHA1d74c3db12bdf0bb896fb6a90a9dc2834a3e89075
SHA2560cf4b178bf176907926c70816f9e4ffddec70c1d9fa6f6a941a6cff98908954a
SHA512603cc278ef83b533c6063eea058c79544445073f1aa7f3276cbcfb86510f1887762db2ecaee4c71fb17162a8ceb45f3f5b8914f0a7b2794e0fa8c749dc7ffc04