Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
180s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 21:35
Static task
static1
Behavioral task
behavioral1
Sample
3dbfb5aed328650b960d1ba6aa3c8e6f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3dbfb5aed328650b960d1ba6aa3c8e6f.exe
Resource
win10v2004-20231215-en
General
-
Target
3dbfb5aed328650b960d1ba6aa3c8e6f.exe
-
Size
155KB
-
MD5
3dbfb5aed328650b960d1ba6aa3c8e6f
-
SHA1
9b3344c6b399829370b286c46c991f2a163cf1ef
-
SHA256
d005e4914eab4fabdbe31078662a48b27fee09f6eabbe5d0edcbaa6604a3fbb7
-
SHA512
516af3255a23122f1d3c17b1624a21e282a0d66ae82b8ec30cd5a388d35b04d76ee95ef2653795d01e14e9f599ff77ffbaf0eb8ec61d5f13555353461c4cced8
-
SSDEEP
384:eOFiGwXaJ+EHqm4fLl3C8esEBqhn9NhqaxhqCKI3U/sLa/nCpZc6bG:eOFiGUw7qmWyqhEaxCD/nCt6
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" csrssc.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" csrssc.exe -
Deletes itself 1 IoCs
pid Process 2960 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2736 csrssc.exe -
Loads dropped DLL 2 IoCs
pid Process 2724 3dbfb5aed328650b960d1ba6aa3c8e6f.exe 2724 3dbfb5aed328650b960d1ba6aa3c8e6f.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\tezrtsjhfr84iusjfo84f = "C:\\Users\\Admin\\AppData\\Local\\Temp\\csrssc.exe" 3dbfb5aed328650b960d1ba6aa3c8e6f.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Windows\CurrentVersion\Run\tezrtsjhfr84iusjfo84f = "C:\\Users\\Admin\\AppData\\Local\\Temp\\csrssc.exe" csrssc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\New Windows\PopupMgr = "yes" csrssc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Display Inline Images = "no" csrssc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main\Display Inline Videos = "no" csrssc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2724 wrote to memory of 2736 2724 3dbfb5aed328650b960d1ba6aa3c8e6f.exe 27 PID 2724 wrote to memory of 2736 2724 3dbfb5aed328650b960d1ba6aa3c8e6f.exe 27 PID 2724 wrote to memory of 2736 2724 3dbfb5aed328650b960d1ba6aa3c8e6f.exe 27 PID 2724 wrote to memory of 2736 2724 3dbfb5aed328650b960d1ba6aa3c8e6f.exe 27 PID 2724 wrote to memory of 2960 2724 3dbfb5aed328650b960d1ba6aa3c8e6f.exe 29 PID 2724 wrote to memory of 2960 2724 3dbfb5aed328650b960d1ba6aa3c8e6f.exe 29 PID 2724 wrote to memory of 2960 2724 3dbfb5aed328650b960d1ba6aa3c8e6f.exe 29 PID 2724 wrote to memory of 2960 2724 3dbfb5aed328650b960d1ba6aa3c8e6f.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3dbfb5aed328650b960d1ba6aa3c8e6f.exe"C:\Users\Admin\AppData\Local\Temp\3dbfb5aed328650b960d1ba6aa3c8e6f.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\csrssc.exeC:\Users\Admin\AppData\Local\Temp\csrssc.exe2⤵
- Modifies visibility of file extensions in Explorer
- Disables RegEdit via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer settings
PID:2736
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\gtseyhbe7.bat" "C:\Users\Admin\AppData\Local\Temp\3dbfb5aed328650b960d1ba6aa3c8e6f.exe""2⤵
- Deletes itself
PID:2960
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5455a130292bad01c66d16ced43204607
SHA16ea1491124a8e321acfcf388b301f9865ef9ae08
SHA2569f5c4fdd285f01ef783e57fdbea01be93725e4c78ae3a8defb49722d77f98013
SHA5121785b90d1a74526544076a642acd479751498e29202939b98175f13ed8701d6f12a71d6ed0d075e3cc5d212f576c383a3a018b08977f0f0f36fde8cf963b88b6
-
Filesize
155KB
MD53dbfb5aed328650b960d1ba6aa3c8e6f
SHA19b3344c6b399829370b286c46c991f2a163cf1ef
SHA256d005e4914eab4fabdbe31078662a48b27fee09f6eabbe5d0edcbaa6604a3fbb7
SHA512516af3255a23122f1d3c17b1624a21e282a0d66ae82b8ec30cd5a388d35b04d76ee95ef2653795d01e14e9f599ff77ffbaf0eb8ec61d5f13555353461c4cced8
-
Filesize
52B
MD58db53e31a3117b405e1abf5ba790bf9e
SHA1242a8834c7c89a12336481b5e2c3264672f9ffc4
SHA256669a10708b8b580ecdb9d50e83c2e2a8826155c1836d27d6e9f418bccf06c87c
SHA512b8bff236a0bb3b161295665db26c9ac597441d2bf19acdeb2a70c1f6c75d8f6268dfa1241926b0400aa98c89b4acebc7ae6216a03558231706480a0dc990499f