Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
14/11/2023, 19:10
Static task
static1
Behavioral task
behavioral1
Sample
4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe
Resource
win10v2004-20231020-en
General
-
Target
4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe
-
Size
1.3MB
-
MD5
3abcd9dbaca01dcae09569ec7c683542
-
SHA1
4bf7aaa067bece0b0d100a12060296962e91a7fe
-
SHA256
4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890
-
SHA512
7b85b1125905eef426c81e1471865af0d37bc36450147ed45dae6fc2a6278602db212a14baa9e3b3d0958c63ed147bcd95dcd8cc950a8ed907f780c86edeb716
-
SSDEEP
24576:DrsYD6+IeW9/4G4QZw//e26fpruGILBVRTwwp+K556h8ZxGZl1MCamBVRTwwpq:cG6+Ip934iqBVRTwwp+456kily3mBVR0
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
pid Process 2672 4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe -
Executes dropped EXE 1 IoCs
pid Process 2672 4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe -
Loads dropped DLL 1 IoCs
pid Process 2620 4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\trkcore = "C:\\ProgramData\\Microsoft\\Roaming\\svchost.exe" 4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2672 4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe 2672 4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474 4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D4DE20D05E66FC53FE1A50882C78DB2852CAE474\Blob = 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 4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2672 4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe 2672 4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe 2672 4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe 2672 4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe 2672 4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe 2672 4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe 2672 4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe 2672 4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe 2672 4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe 2672 4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe 2672 4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe 2672 4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe 2672 4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe 2672 4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1032 explorer.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2620 4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 1032 explorer.exe Token: SeShutdownPrivilege 1032 explorer.exe Token: SeShutdownPrivilege 1032 explorer.exe Token: SeShutdownPrivilege 1032 explorer.exe Token: SeShutdownPrivilege 1032 explorer.exe Token: SeShutdownPrivilege 1032 explorer.exe Token: SeShutdownPrivilege 1032 explorer.exe Token: SeShutdownPrivilege 1032 explorer.exe Token: SeShutdownPrivilege 1032 explorer.exe Token: SeShutdownPrivilege 1032 explorer.exe Token: SeShutdownPrivilege 1032 explorer.exe Token: SeShutdownPrivilege 1032 explorer.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe 1032 explorer.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2672 4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2620 wrote to memory of 2672 2620 4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe 27 PID 2620 wrote to memory of 2672 2620 4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe 27 PID 2620 wrote to memory of 2672 2620 4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe 27 PID 2620 wrote to memory of 2672 2620 4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe 27 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" 4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe"C:\Users\Admin\AppData\Local\Temp\4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exeC:\Users\Admin\AppData\Local\Temp\4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- System policy modification
PID:2672
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1692
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe
Filesize1.3MB
MD539a2cc63eb685e59f13b936a7a668a7e
SHA166228dfa586d19d70411100e94ba19585220d7ec
SHA2566404ce311622663375f4215a5c271f9540ee85ee3d9847b02a372129ccdf3a32
SHA512ce6de0a09051097a61015f47cae775845fc070590088da5334209a91b6688e334d27e6aeb3ca27b22b796e650cf37534692c33eeb0b850ff8583e41546fc3c06
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
\Users\Admin\AppData\Local\Temp\4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe
Filesize1.3MB
MD539a2cc63eb685e59f13b936a7a668a7e
SHA166228dfa586d19d70411100e94ba19585220d7ec
SHA2566404ce311622663375f4215a5c271f9540ee85ee3d9847b02a372129ccdf3a32
SHA512ce6de0a09051097a61015f47cae775845fc070590088da5334209a91b6688e334d27e6aeb3ca27b22b796e650cf37534692c33eeb0b850ff8583e41546fc3c06