Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 19:39
Static task
static1
Behavioral task
behavioral1
Sample
0e2892c5f3d3558d6575b729b24caf3d.exe
Resource
win7-20231215-en
General
-
Target
0e2892c5f3d3558d6575b729b24caf3d.exe
-
Size
504KB
-
MD5
0e2892c5f3d3558d6575b729b24caf3d
-
SHA1
ec36cbd5cbecdf811ad51eac29d378d9da3d6aae
-
SHA256
2070bf8a21fe853a0cba4114fcbba960dacf6f694404daaac1ae32f9606af6ca
-
SHA512
c96561c00a630f88573c6dd4570b047df74529f47e07d02a330cc7f0c9d92f6f6753718d8d9318801e78a8bd908adabbbad71f494d29d55c2d674fbfcf1170ac
-
SSDEEP
12288:w6+cKLjieaEKyrV8jh9tLI9hBjC9mA/a/hjXgrtxrlYRyHNKr4VrFBKhv7RHKzkm:wIp
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" 0.exe -
Executes dropped EXE 2 IoCs
pid Process 2800 0.exe 1712 0.exe -
Loads dropped DLL 1 IoCs
pid Process 2800 0.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" 0.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 0.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 0.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2800 set thread context of 1712 2800 0.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 2800 0.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1712 0.exe 1712 0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeBackupPrivilege 2800 0.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2800 0.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2208 2652 0e2892c5f3d3558d6575b729b24caf3d.exe 28 PID 2652 wrote to memory of 2208 2652 0e2892c5f3d3558d6575b729b24caf3d.exe 28 PID 2652 wrote to memory of 2208 2652 0e2892c5f3d3558d6575b729b24caf3d.exe 28 PID 2652 wrote to memory of 2844 2652 0e2892c5f3d3558d6575b729b24caf3d.exe 31 PID 2652 wrote to memory of 2844 2652 0e2892c5f3d3558d6575b729b24caf3d.exe 31 PID 2652 wrote to memory of 2844 2652 0e2892c5f3d3558d6575b729b24caf3d.exe 31 PID 2208 wrote to memory of 2800 2208 CMD.exe 32 PID 2208 wrote to memory of 2800 2208 CMD.exe 32 PID 2208 wrote to memory of 2800 2208 CMD.exe 32 PID 2208 wrote to memory of 2800 2208 CMD.exe 32 PID 2800 wrote to memory of 1712 2800 0.exe 35 PID 2800 wrote to memory of 1712 2800 0.exe 35 PID 2800 wrote to memory of 1712 2800 0.exe 35 PID 2800 wrote to memory of 1712 2800 0.exe 35 PID 2800 wrote to memory of 1712 2800 0.exe 35 PID 2800 wrote to memory of 1712 2800 0.exe 35 PID 2800 wrote to memory of 1712 2800 0.exe 35 PID 2800 wrote to memory of 1712 2800 0.exe 35 PID 1712 wrote to memory of 1316 1712 0.exe 2 PID 1712 wrote to memory of 1316 1712 0.exe 2 PID 1712 wrote to memory of 1316 1712 0.exe 2 PID 1712 wrote to memory of 1316 1712 0.exe 2 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 0.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\0e2892c5f3d3558d6575b729b24caf3d.exe"C:\Users\Admin\AppData\Local\Temp\0e2892c5f3d3558d6575b729b24caf3d.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\system32\CMD.exeCMD.exe /k start %TEMP%\0.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\0.exeC:\Users\Admin\AppData\Local\Temp\0.exe4⤵
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\0.exe"C:\Users\Admin\AppData\Local\Temp\0.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1712
-
-
-
-
C:\Windows\system32\CMD.exeCMD.exe /k start %TEMP%\1.jpg3⤵PID:2844
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD5edb919688d6206269e4b5b62b50c2752
SHA109eb33ecb150221478743db193a3b1bcc56062a5
SHA25664331574f2120abeca9a39e9fe49e2165be57f133cd5cfae3ee6a25ab2776bb1
SHA5122b05afb72b98d60d9466539e6bead2c32612a9102ef3203eabad3529ad2f7caeb4d7e38d5608f7acfb64a069577c513e314905bea15e7fa7551aeaa11fe0339b
-
Filesize
111KB
MD5bd1b6f19ab9d41eee1fe1307c52257ba
SHA1fbbe386e2b923b7e2fb33b827f3e7b6b2edc9571
SHA25634baea581fa95c84593fb1e7e814f3791ce26176129a8b63419b54ccb126c221
SHA512e162b01bb2e67727e33432bf3e8ed0fed3fa24b022a9a5501a20e82da6f3641d2d64956fbbea3e67a4276131d68075b91604d8fe1ba88fb0fe680b994689a5f9
-
Filesize
88KB
MD56542a2d62fa284535133408d45603f3e
SHA1d1ca66451ab4eba036a20a542938890b178f6a2f
SHA256ea57a655a70a8b65e6db63e985ab703e74294e63df9f0790ef762a539ec7ff47
SHA512dded096195638ee566615f1cf39428702a3e158c1cbb18ddcc989c3f0c29914d163450f615173cc716d305ed9193f77589c7efd0e4948c61026c25dee26fdc99
-
Filesize
87KB
MD50a6834800a333bc5780eefe126621cf4
SHA14f82f438dde1d2adb1becaa0c79ca6a85da1fbc3
SHA25670159c0185b7bcef6a29f985e68b8c96b5844f4d081ffe433ee799aa45bdbadc
SHA5120ecce4d2af6122dbbec3131a2d10aec7ca62dc8b634abbdd2d214295315bc29918c7f3a007ecaca1b346b871011737ac1d24402aa3903e1c0b463869f9e935be