Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 17:25
Static task
static1
Behavioral task
behavioral1
Sample
086430fdef371f827a2643b915807367.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
086430fdef371f827a2643b915807367.exe
Resource
win10v2004-20231215-en
General
-
Target
086430fdef371f827a2643b915807367.exe
-
Size
1.1MB
-
MD5
086430fdef371f827a2643b915807367
-
SHA1
3470f741f3aea81ad02c7aa47e4cbf9479e80bf2
-
SHA256
1517e0ecba95575dae915f7a85b8a64efe8ae7ab2ac481e6d553927c4b03fd1b
-
SHA512
963ed707128b00ced2d186895be362377a99d3396a770171b2e9a9055e3c2855cee5efc4678e856be121149e6ac9da8c802b1075408cf8708eb23583feb8bf02
-
SSDEEP
24576:jWvknOMEf4YM1MiZjnsZF3jO8xivaaDwvxHnPxAi9k7t0pRiEgCmR:jUeOMmNYsZJ6H5AvitSiEgCmR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2624 Setup.exe -
Loads dropped DLL 4 IoCs
pid Process 2888 086430fdef371f827a2643b915807367.exe 2624 Setup.exe 2624 Setup.exe 2624 Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl Setup.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND\Setup.exe = "0" Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main Setup.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\Setup.exe = "1" Setup.exe Key created \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2624 2888 086430fdef371f827a2643b915807367.exe 28 PID 2888 wrote to memory of 2624 2888 086430fdef371f827a2643b915807367.exe 28 PID 2888 wrote to memory of 2624 2888 086430fdef371f827a2643b915807367.exe 28 PID 2888 wrote to memory of 2624 2888 086430fdef371f827a2643b915807367.exe 28 PID 2888 wrote to memory of 2624 2888 086430fdef371f827a2643b915807367.exe 28 PID 2888 wrote to memory of 2624 2888 086430fdef371f827a2643b915807367.exe 28 PID 2888 wrote to memory of 2624 2888 086430fdef371f827a2643b915807367.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\086430fdef371f827a2643b915807367.exe"C:\Users\Admin\AppData\Local\Temp\086430fdef371f827a2643b915807367.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\a2PAGSBFiK\iSIuVvG1\Setup.exeC:\Users\Admin\AppData\Local\Temp\a2PAGSBFiK\iSIuVvG1\Setup.exe --relaunch2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
PID:2624
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD57edfd543198697ced527d2903302c3e9
SHA1c4c3c98c24e75a39be78e5300a8e6b745763c0e9
SHA25619b1b528443ec0ff7c177e827f737aa4a03c03f4b7183302331de07e7d3ab010
SHA512067467a31b2230c4248f206f268e6d35fee0e2d9c2cf735e1a198b8ad637003df7ca263b46328221aedcbdaaac73fe197a844d9dfa70d28c7a7953d76a9d5d5e
-
Filesize
51KB
MD5e9380016447594a9d28d18133dc482a8
SHA17c400c0c922658e37d44ece69ff9d7dbcf3b599c
SHA2565fc57d9ee51c3a8b015aff25bd38890fe42902a0c5b88b3a07f3e7d33a9d6620
SHA5120f068143678f5270361fb3858996479949fbdad82ff59df93b8547942768b8206b96be2cd681830c447dbdde8aef1a6f301ac4559c75d47878a360412a42f475
-
Filesize
38KB
MD53e31e0b02000bae455bacaca42190f8e
SHA12a405528eb39ddcdbc9b8febb0aba65762fa0065
SHA2566b616cf907c0edfffb7693994e03003e29bf23acd349e80a151c032764c0d0d6
SHA512d67ebf1bef378418ecf7aef926d21388d5d09a6fb1f2e4d1433b55c9d802840e232e9ff7a11cc3191188846fb9da1f7fb730e9a971f115e62e4719d255a3931b
-
Filesize
66KB
MD5e247700dafca1117c777216877da280b
SHA17cce61c695a380ba994bbf817a96573cb55444bf
SHA25603cb7aa6e47bccb6b21bdcb4c12532b31ce929b2e5b1bab57637b79f0f458254
SHA5122701bb39ed5c19a8b97415544c90154bc735d1456c6a6a5303e46c398d9b551728dbfefdb72ee520b5ed99440d29437a2a178a1c71c2ae0708ca66b163e050f3
-
Filesize
55KB
MD5336ec03f049099ada55e0a788cf9b9aa
SHA17b04583cfe2e4dd253868344601d1355a599fc70
SHA256adc7afd6f55a7b00d37c78bc1065d9d9d6c8864b5c254bc13ba949b1e8b72349
SHA5128cff77565740bea1c4b4f811d208b47105fcd6cdf1a881eba9ed77f98e8faeb9b0f1adf8fadf4b6e89d53ee21f9e37e70144146f5f9d1a556ba6c8d2afdea1df
-
Filesize
63KB
MD571d2a170684ce3cb088e8db78cee80f5
SHA110b4ae1404c3c84620bbe7ddc824737c59752c61
SHA25608f6a86ca57dad54c8c45b25ca290a76f169557b7bf817fbec3e40bda41d9bfa
SHA512c17ad08ae83acec1329b5736c818a8fb756f6e79a5dd6412edeaf0823ba4ac868e70be2cb984772cccd809ca8affcb6c13bb9ffbf77ab49f875c2403e8bdbc13