Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 17:10
Static task
static1
Behavioral task
behavioral1
Sample
07a4d7ad1daf2da53a461014d98abc38.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
07a4d7ad1daf2da53a461014d98abc38.exe
Resource
win10v2004-20231215-en
General
-
Target
07a4d7ad1daf2da53a461014d98abc38.exe
-
Size
256KB
-
MD5
07a4d7ad1daf2da53a461014d98abc38
-
SHA1
aaff80a567ce1eae273bd0df18eb987e7a1d2d46
-
SHA256
584772288f279aea9113d3fc2111a5b6f69c71ef3d4421def20f8f68c671a72f
-
SHA512
fd1d352610342f0b654819b767e024150e445958c182258e9d2f9abee3035da652a455ca31219d5306586ffae5c34ade6bd9810f2bb34029d9b9e5000857bf5e
-
SSDEEP
6144:fnMB+jKbQe6yUJuZMJGq2zj9yTYUrRFDCwymwrdCcYSA+e/lqtPLyz2fZhH5h9:/btyA36URlqJyz83
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe" 07a4d7ad1daf2da53a461014d98abc38.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe" lsass.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2224 netsh.exe -
Deletes itself 1 IoCs
pid Process 1088 lsass.exe -
Executes dropped EXE 1 IoCs
pid Process 1088 lsass.exe -
Loads dropped DLL 2 IoCs
pid Process 1932 07a4d7ad1daf2da53a461014d98abc38.exe 1932 07a4d7ad1daf2da53a461014d98abc38.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe\"" 07a4d7ad1daf2da53a461014d98abc38.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe\"" 07a4d7ad1daf2da53a461014d98abc38.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe\"" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\lsass.exe\"" lsass.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1932 07a4d7ad1daf2da53a461014d98abc38.exe 1088 lsass.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2224 1932 07a4d7ad1daf2da53a461014d98abc38.exe 28 PID 1932 wrote to memory of 2224 1932 07a4d7ad1daf2da53a461014d98abc38.exe 28 PID 1932 wrote to memory of 2224 1932 07a4d7ad1daf2da53a461014d98abc38.exe 28 PID 1932 wrote to memory of 2224 1932 07a4d7ad1daf2da53a461014d98abc38.exe 28 PID 1932 wrote to memory of 1088 1932 07a4d7ad1daf2da53a461014d98abc38.exe 30 PID 1932 wrote to memory of 1088 1932 07a4d7ad1daf2da53a461014d98abc38.exe 30 PID 1932 wrote to memory of 1088 1932 07a4d7ad1daf2da53a461014d98abc38.exe 30 PID 1932 wrote to memory of 1088 1932 07a4d7ad1daf2da53a461014d98abc38.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\07a4d7ad1daf2da53a461014d98abc38.exe"C:\Users\Admin\AppData\Local\Temp\07a4d7ad1daf2da53a461014d98abc38.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram program = C:\Users\Admin\AppData\Roaming\lsass.exename = Nero mode = ENABLE2⤵
- Modifies Windows Firewall
PID:2224
-
-
C:\Users\Admin\AppData\Roaming\lsass.exe"C:\Users\Admin\AppData\Roaming\lsass.exe" /d C:\Users\Admin\AppData\Local\Temp\07a4d7ad1daf2da53a461014d98abc38.exe2⤵
- Modifies WinLogon for persistence
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1088
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5d49f8d25eb071b435af4342dae3b1064
SHA12cb35ee3f2d63ea2ca705e9dc74895d4b8bf5d72
SHA256f4db467d52b224126d2b101006f79a5dc252fb8f6911bf745a4b42f9ff9db250
SHA512149e762b057ac6ff7b2c7e81e2288225c87ec2f038b4a1fb55ced27e9bb566401a9721c5ffd55b419a9b1a5f58e944090dd23c3dca88591507b003d7acc61ef7