Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 17:17
Static task
static1
Behavioral task
behavioral1
Sample
fd4a5c01d3b10976ae44029e7672e1b0.exe
Resource
win7-20231215-en
General
-
Target
fd4a5c01d3b10976ae44029e7672e1b0.exe
-
Size
672KB
-
MD5
fd4a5c01d3b10976ae44029e7672e1b0
-
SHA1
50a8d46d87c47572e6f30dfafd11ce9964c064ab
-
SHA256
378a19ddfac8651e76b0abb65fb7afd10e973322be7148a8f97adb16dbd057a9
-
SHA512
ee524662d83f36ce0c5da186e26332b97d2bea4a507734d8a8dbcd8da4732e2e279235481eb9e2b657d84632e7cd7e12070337e1575d0169315b3c5e3829be18
-
SSDEEP
12288:seBNUbTVO86UCHruRdp+WA00SKCpVRwfXXSVUhbxk9e/pJu:sJIUCNd0nKwYvX+UhbW9eM
Malware Config
Signatures
-
Disables taskbar notifications via registry modification
-
Executes dropped EXE 7 IoCs
pid Process 3800 alg.exe 1220 DiagnosticsHub.StandardCollector.Service.exe 4308 fxssvc.exe 1204 elevation_service.exe 3120 elevation_service.exe 1172 msdtc.exe 4748 msiexec.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-2398549320-3657759451-817663969-1000 alg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\Svc\S-1-5-21-2398549320-3657759451-817663969-1000\EnableNotifications = "0" alg.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: alg.exe File opened (read-only) \??\O: alg.exe File opened (read-only) \??\Q: alg.exe File opened (read-only) \??\S: alg.exe File opened (read-only) \??\U: alg.exe File opened (read-only) \??\I: alg.exe File opened (read-only) \??\T: alg.exe File opened (read-only) \??\W: alg.exe File opened (read-only) \??\Y: alg.exe File opened (read-only) \??\L: alg.exe File opened (read-only) \??\J: alg.exe File opened (read-only) \??\N: alg.exe File opened (read-only) \??\P: alg.exe File opened (read-only) \??\E: alg.exe File opened (read-only) \??\H: alg.exe File opened (read-only) \??\M: alg.exe File opened (read-only) \??\R: alg.exe File opened (read-only) \??\V: alg.exe File opened (read-only) \??\X: alg.exe File opened (read-only) \??\Z: alg.exe File opened (read-only) \??\G: alg.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification \??\c:\windows\system32\spectrum.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File created \??\c:\windows\system32\jllooidn.tmp fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\system32\locator.exe alg.exe File opened for modification \??\c:\windows\system32\vssvc.exe alg.exe File opened for modification \??\c:\windows\system32\svchost.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\system32\msdtc.exe alg.exe File opened for modification \??\c:\windows\system32\wbem\wmiApsrv.exe alg.exe File opened for modification \??\c:\windows\system32\spectrum.exe alg.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File created \??\c:\windows\system32\fabmcnkg.tmp fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\system32\wbengine.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\system32\Appvclient.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\system32\diagsvcs\diagnosticshub.standardcollector.service.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File created \??\c:\windows\system32\liggggfk.tmp fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe alg.exe File created \??\c:\windows\system32\lqmalbfe.tmp fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\system32\dllhost.exe alg.exe File opened for modification \??\c:\windows\system32\sensordataservice.exe alg.exe File opened for modification \??\c:\windows\system32\wbengine.exe alg.exe File created \??\c:\windows\system32\dknfamgf.tmp fd4a5c01d3b10976ae44029e7672e1b0.exe File created \??\c:\windows\system32\openssh\pnfbicep.tmp fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\system32\svchost.exe alg.exe File opened for modification \??\c:\windows\system32\fxssvc.exe alg.exe File opened for modification \??\c:\windows\system32\msiexec.exe alg.exe File opened for modification \??\c:\windows\system32\searchindexer.exe alg.exe File opened for modification \??\c:\windows\system32\locator.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File created \??\c:\windows\system32\qdefhqec.tmp fd4a5c01d3b10976ae44029e7672e1b0.exe File created \??\c:\windows\system32\obcbkapl.tmp fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe alg.exe File opened for modification \??\c:\windows\system32\tieringengineservice.exe alg.exe File opened for modification \??\c:\windows\system32\vds.exe alg.exe File opened for modification \??\c:\windows\system32\dllhost.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\system32\tieringengineservice.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\system32\vssvc.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\syswow64\perfhost.exe alg.exe File opened for modification \??\c:\windows\system32\openssh\ssh-agent.exe alg.exe File created \??\c:\windows\system32\eidpgkfq.tmp fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\system32\snmptrap.exe alg.exe File opened for modification \??\c:\windows\system32\msiexec.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File created \??\c:\windows\syswow64\icdilhbg.tmp fd4a5c01d3b10976ae44029e7672e1b0.exe File created \??\c:\windows\system32\mncilqbk.tmp fd4a5c01d3b10976ae44029e7672e1b0.exe File created \??\c:\windows\system32\poehqjnm.tmp fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\system32\alg.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File created \??\c:\windows\system32\qcdeaejn.tmp fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\system32\fxssvc.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File created \??\c:\windows\system32\lpflgilh.tmp fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\system32\vds.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\system32\diagsvcs\diagnosticshub.standardcollector.service.exe alg.exe File opened for modification \??\c:\windows\system32\msdtc.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\system32\sgrmbroker.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\system32\openssh\ssh-agent.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\system32\Agentservice.exe alg.exe File created \??\c:\windows\system32\perceptionsimulation\fqodnkfj.tmp fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\system32\snmptrap.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\system32\lsass.exe alg.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification \??\c:\windows\system32\Agentservice.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File created \??\c:\windows\system32\dbeoifio.tmp fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\system32\sensordataservice.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\system32\Appvclient.exe alg.exe File created \??\c:\windows\system32\diagsvcs\hlehpgeo.tmp fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\system32\lsass.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File created \??\c:\windows\system32\onpapbfd.tmp fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\windows\system32\perceptionsimulation\perceptionsimulationservice.exe fd4a5c01d3b10976ae44029e7672e1b0.exe -
Drops file in Program Files directory 23 IoCs
description ioc Process File opened for modification \??\c:\program files\google\chrome\Application\106.0.5249.119\elevation_service.exe alg.exe File created \??\c:\program files\google\chrome\Application\106.0.5249.119\illlbncb.tmp alg.exe File opened for modification \??\c:\program files\google\chrome\Application\106.0.5249.119\elevation_service.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File created \??\c:\program files\common files\microsoft shared\source engine\mpbioofi.tmp alg.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe alg.exe File created C:\Program Files\7-Zip\gkooamha.tmp alg.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe alg.exe File created C:\Program Files\7-Zip\cedpmnkl.tmp alg.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File created C:\Program Files\7-Zip\jgpijieg.tmp alg.exe File created C:\Program Files\7-Zip\nccafaqk.tmp alg.exe File opened for modification \??\c:\program files (x86)\google\update\googleupdate.exe alg.exe File opened for modification \??\c:\program files\common files\microsoft shared\source engine\ose.exe alg.exe File opened for modification C:\Program Files\7-Zip\7z.exe alg.exe File opened for modification C:\Program Files\7-Zip\7zG.exe alg.exe File opened for modification \??\c:\program files\windows media player\wmpnetwk.exe alg.exe File opened for modification \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\elevation_service.exe alg.exe File created \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\ijmgajkn.tmp alg.exe File opened for modification \??\c:\program files (x86)\microsoft\edge\Application\92.0.902.67\elevation_service.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification \??\c:\program files (x86)\mozilla maintenance service\maintenanceservice.exe alg.exe File created \??\c:\program files (x86)\mozilla maintenance service\podieeml.tmp alg.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe alg.exe File opened for modification \??\c:\windows\microsoft.net\framework64\v3.0\wpf\presentationfontcache.exe fd4a5c01d3b10976ae44029e7672e1b0.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe File opened for modification \??\c:\windows\servicing\trustedinstaller.exe fd4a5c01d3b10976ae44029e7672e1b0.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1131 = "Route through e-mail" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 3800 alg.exe 3800 alg.exe 3800 alg.exe 3800 alg.exe 3800 alg.exe 3800 alg.exe 3800 alg.exe 3800 alg.exe 3800 alg.exe 3800 alg.exe 3800 alg.exe 3800 alg.exe 3800 alg.exe 3800 alg.exe 3800 alg.exe 3800 alg.exe 3800 alg.exe 3800 alg.exe 3800 alg.exe 3800 alg.exe 3800 alg.exe 3800 alg.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 668 Process not Found 668 Process not Found -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1408 fd4a5c01d3b10976ae44029e7672e1b0.exe Token: SeTakeOwnershipPrivilege 3800 alg.exe Token: SeAuditPrivilege 4308 fxssvc.exe Token: SeSecurityPrivilege 4748 msiexec.exe -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" alg.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer alg.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd4a5c01d3b10976ae44029e7672e1b0.exe"C:\Users\Admin\AppData\Local\Temp\fd4a5c01d3b10976ae44029e7672e1b0.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1408
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Windows security modification
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3800
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:1220
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:4456
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4308
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:1204
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:3120
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:1172
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD51c1d79ee5342fe7d7e02d42403541866
SHA10c3d7ecebf2233791e20ca4298290d9ca71da11b
SHA256e7d3a2bb972dde07b56fc615405691756c6568c6e918e603899d3fd38f7f041a
SHA51232eb3600f501a5ced8e5be8e7a96d588f781fe27102679a307e895617e681687ec8474a2e4361cb589032e3e6dafa9ef1934c2ad8049611be8c62c9160d8cba5
-
Filesize
678KB
MD5297c98168081ffa88bd66541ae3dc8c3
SHA12e6ba28587e9a1c841e75446e2932edd91f5fda9
SHA2566b8e4ca0f0ff58f5899157138d7a6556d4c0db7728236921751c46d5249b4c8d
SHA512a503698334de6627f0687aa55c295239e68778ae74aef6d9644bcc68bf05f22b680bc34d7d3ed22e5cff3386d325715ee63c2c27e8419be98b0d23215322a9bb
-
Filesize
487KB
MD5bd91a016511436eb0ea3c25b8147f5d8
SHA1f32125681508baaf1e9556aa58a131a7559d0265
SHA2561514b2fe926c2b4b88d5fb6200e44ffbd5ec7738ab6bf5ea4aed1351e7a71319
SHA512b748dd6f807c10d0245d6f4fd2bd696a0107c9e9c40a370281b00dc2426fd9a67c9ba45744144639b87fdf278919fdf7fa7cf5c599a878b82047b8cda2f3e055
-
Filesize
1.0MB
MD5e2cfc61ae2be1f0eb310ef7c86bbebfc
SHA1298d379fe409e22b539aa4932604eefd112f4df7
SHA256093bfd9167aa4824fbd28999b2120d5576e38fe439db98303bda7733d837d480
SHA5126be9d4127f2db3dd000dc89ac6e83be5cecac6b6093e72c1328bfd951d4da677e5029177e783a6e40c6441559315c6fecc04098c8ba5bde353d5233a08160ec6
-
Filesize
489KB
MD503430e7942bb981ef06b6f3e7a0fc353
SHA192f7442ab8c752c275087b43ad4cfd67582bd957
SHA2562344df425c22db73ce05cdd7a0e89d6e7c4f868f11e6809cda2d9a08b261150a
SHA5129fcc35ad21bb54fabb6c0a5b88364d446409b8d8a05fd7b0d03ad20d4aa785401abeff68338970a8ffd022b4897d763e8580ccdc9897d788d7318efad3e73981
-
Filesize
540KB
MD5c2e80a612feb71d235ce73dbf558709b
SHA19a515cc6560b35f1f5f92c36c25eb8971d037258
SHA2562fea91e2f0a999a93bb0270eeea3b264bc3f8a5db2285ad7a4b67b2c706118e9
SHA5120f0c1c7aef4cfdac09d56843d2f6f36788cc8aab845e7d4da90a60ce2fc8e1558a649b283075c159ed0a56b9444530457c7dc6ad92803902d3f0aea73ddc9f9d
-
Filesize
463KB
MD5ceded3d0c5a5281792df36cd2110017a
SHA1215d56cea8d22c5c1d458a9063736eec6a529438
SHA25675eefdd0469f1360217046ac9891fafee1287a4d4277b908c0f72cf4d4e68a68
SHA5128dcca29244bea98d2e3b5572608e5ede4e52dd302d56b3ee0344909db6aabbdcb334671032277cb0b293e28a8de6473c91f89f1eebae1e2716708a0ff4f629c4
-
Filesize
1.9MB
MD5434eaffed1a951b87343f6773e111772
SHA1228bf0f318baca7114b5e5ff975c6ce8620209cd
SHA256a66f652c128286700f80b007979b3b93281b260d46f8d17a80f16a344ca2280f
SHA51228d55818f1683aa398a02c2a5dca15fe118fcf2229af9f083033dded247383223e1aa396d650cd3d4048c30a3aa60b95e864c64e7762baa5e57774f850f72df5
-
Filesize
384KB
MD5e737c0375862f70b7bf13085e5eb9abc
SHA10154363d6fe2fe768132d48c89e957c783f743be
SHA25612501b7292ba44c6bfefff54d733763371c3b3b474ae680e565d457f1cb6c1aa
SHA512c3a294ad90156eab6450c2be23377629fe8351a649064f3ba5fe1e0fd00a2ee6efbbea6549acf6b3b7f37c665ff4db427dda8d36a77d63e86ea962c7dea4b498
-
Filesize
171KB
MD5c79430412f0c9989e96012e8afe3b8b1
SHA15a709655dc96f80f2368dca03ebcef181ad06c3a
SHA256ecb1627c954361a2966aa4a033921308036660483cdad45424bfd5fbd06fb606
SHA512196bf281a21930deb07196db86834ec18e1a7c3c03e14380055ac2137849728a37e93efb4f29a25f3d01b521e0fd8243f8bcbb314500a37c7e46f43fb5f7e8f7