Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 00:54
Static task
static1
Behavioral task
behavioral1
Sample
1e71ff872199864b856503a8972d658d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1e71ff872199864b856503a8972d658d.exe
Resource
win10v2004-20231215-en
General
-
Target
1e71ff872199864b856503a8972d658d.exe
-
Size
3.6MB
-
MD5
1e71ff872199864b856503a8972d658d
-
SHA1
424929f8685948678b8a7ec501081fbd7a37277b
-
SHA256
12c1a04a01b2a50126523be7f39bea8afbd17786104e1111628ffb953f2dee2c
-
SHA512
00f6a588adef8a86697d5e1c1b22101d7aee983c70462ffb28c5887d9a5f8f76a6ad660d81149b09649be482a7d1601578d64869dbc0cf0fd2c44d420b362382
-
SSDEEP
98304:1u7AEvgVOhaHaEtPW/w2mCzdccnaZjwEktE:QAEvgVOhoD66c0w3tE
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1616 1e71ff872199864b856503a8972d658d.tmp 2900 setup.exe -
Loads dropped DLL 14 IoCs
pid Process 2168 1e71ff872199864b856503a8972d658d.exe 1616 1e71ff872199864b856503a8972d658d.tmp 1616 1e71ff872199864b856503a8972d658d.tmp 1616 1e71ff872199864b856503a8972d658d.tmp 1616 1e71ff872199864b856503a8972d658d.tmp 2900 setup.exe 2900 setup.exe 2900 setup.exe 2900 setup.exe 2900 setup.exe 2900 setup.exe 2900 setup.exe 2900 setup.exe 2900 setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 20 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 9e0000001a00eebbfe23000010007db10d7bd29c934a973346cc89022e7c00002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020002a0000000000efbe7e47b3fbe4c93b4ba2bad3f5d3cd46f98207ba827a5b6945b5d7ec83085f08cc20002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020000000 setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_TopViewVersion = "0" setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f4225481e03947bc34db131e946b44c8dd50000 setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff setup.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg setup.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots setup.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" setup.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_FolderType = "{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}" setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_TopViewID = "{82BA0782-5B7A-4569-B5D7-EC83085F08CC}" setup.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_Classes\Local Settings setup.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell setup.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff setup.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2900 setup.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2900 setup.exe 2900 setup.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2168 wrote to memory of 1616 2168 1e71ff872199864b856503a8972d658d.exe 28 PID 2168 wrote to memory of 1616 2168 1e71ff872199864b856503a8972d658d.exe 28 PID 2168 wrote to memory of 1616 2168 1e71ff872199864b856503a8972d658d.exe 28 PID 2168 wrote to memory of 1616 2168 1e71ff872199864b856503a8972d658d.exe 28 PID 2168 wrote to memory of 1616 2168 1e71ff872199864b856503a8972d658d.exe 28 PID 2168 wrote to memory of 1616 2168 1e71ff872199864b856503a8972d658d.exe 28 PID 2168 wrote to memory of 1616 2168 1e71ff872199864b856503a8972d658d.exe 28 PID 1616 wrote to memory of 2900 1616 1e71ff872199864b856503a8972d658d.tmp 29 PID 1616 wrote to memory of 2900 1616 1e71ff872199864b856503a8972d658d.tmp 29 PID 1616 wrote to memory of 2900 1616 1e71ff872199864b856503a8972d658d.tmp 29 PID 1616 wrote to memory of 2900 1616 1e71ff872199864b856503a8972d658d.tmp 29 PID 1616 wrote to memory of 2900 1616 1e71ff872199864b856503a8972d658d.tmp 29 PID 1616 wrote to memory of 2900 1616 1e71ff872199864b856503a8972d658d.tmp 29 PID 1616 wrote to memory of 2900 1616 1e71ff872199864b856503a8972d658d.tmp 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e71ff872199864b856503a8972d658d.exe"C:\Users\Admin\AppData\Local\Temp\1e71ff872199864b856503a8972d658d.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\is-6VRUU.tmp\1e71ff872199864b856503a8972d658d.tmp"C:\Users\Admin\AppData\Local\Temp\is-6VRUU.tmp\1e71ff872199864b856503a8972d658d.tmp" /SL5="$5014C,3509953,66560,C:\Users\Admin\AppData\Local\Temp\1e71ff872199864b856503a8972d658d.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\tmp2023104041\setup.exe"C:\Users\Admin\AppData\Local\Temp\tmp2023104041\setup.exe" /path="C:\Users\Admin\AppData\Local\Temp\1e71ff872199864b856503a8972d658d.exe" /pn=mf3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2900
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
701KB
MD55d66e66c72bb42c3f33d3ac15acf1445
SHA1011ab6d35c38f292f65d3904a81a405fe33e7868
SHA256928c908d46e033a2e973d536f4aec718edcd7f214376010cd28567d05174cf98
SHA5123061de25914b17908f2d6d3a85c30f0b3d75a06d866c528c273132b84933b0ee180b13ae95472e80bff9487c875763fe08351ccb30535d00935eb04b0f3b1e10
-
Filesize
278KB
MD517bddadca7044cc7b8406f1ca45210df
SHA1d74c5236542f4ddbb50cd113dedcd05aa9861ca9
SHA2564406dc1789f1ebdbfebb7796719d21dcce2250f3a0a07f204cfd0b4f93725f6c
SHA5121abf4e41912e18b77f7e0ea7ce98e0a5760a554cf79c78dd8ccaf04589fc02579b0fbb5a822acf2d098c2362b778821b1e5e870a55cba5834566a723c0716d50
-
Filesize
954KB
MD52a241eb0bbb0ef2dbbf825df5e8f89aa
SHA13cfd7d52897353e973edbab0dd17340b339e315b
SHA256a1ad131f0d00303f79fc554c29e8755159c10bba04d60af692725afe454fdd0e
SHA512c4e8531a7daeeab7d4a2c51b29e73e4987985d68a90cc2d56925e7ae0a10677af9b1f3d87c4db0ac527d9189d809a4082e11ca5249e0460f0eae9ef8ad01f045
-
Filesize
16KB
MD5bfd597993cb526fe250354c2ba25cfae
SHA186f937a5e3b5a33ce3e316a859e9c41369cabff1
SHA2560f26ffd402d1a924002237d32305f8cbfec35b493f8e52fa23d643d1a9e1036b
SHA512295441c5427eae35aeac11ce95758ec1ca4333859b682b05abfb41c252bd5967bd1f62432416864c4fdfb804d81090227b032efbb44a1d4e0e8d315ce7ba4d5c
-
Filesize
47KB
MD536f04b5f9dec355fc9bf5b31c63b35ec
SHA1df74da236b3ad034d9abe2573f7bfbbab1cfc6cb
SHA25610d7a315811cd6dfdd309a198527d075ae4b59018988488075f017f5400cf081
SHA512fc9fbf34673babcbd85fe959906b81e7d71bb258eeeb669e6f156e1efe3967bcdefd2ce1d5d1a4fb8278272e92d040e842d666a82f6f3f851174cc5521a6d3d4
-
Filesize
497KB
MD54500147351f56ac68e11b29404e9af83
SHA1b15747f80019e3015bc2e87054927d980ecef2c4
SHA256ce905c3d43cfab2bc6800d85d41e9540a2911fa5b81896a6137259909693585f
SHA5129ee20d5ee4a18b41fe4064bd43cfaf0d591441c3d38fb2783cc735a99b7126afddea19a5728c86e271996c61ae20d768e5e58515016f39dd5bcac0fd3befaa2c
-
Filesize
1.3MB
MD5a8a1891ddf33206551affb78d7b5b34f
SHA139034c35b5f05c438e4be431ce4a300dae893954
SHA2561df7caf8c51e1e2fe4d139c9cae5dce491f6bc063da2ba3e4e14b7acee1c8562
SHA51295dca1648a54dcbc4a6f937fe866215dba507bbbed227d865b3f452682ed0d020cd5127deee79a0cb996207e752b9d9c4b06a45298c3d47162b497b1e4f39d1a
-
Filesize
475KB
MD5e0ce7003c1cb47e874fbf27fcbbb67dc
SHA14f89389dd99384f291cd6d2563487aba8af77b71
SHA256b2b0444225cc1461bcbf9c1cb71f776c3dab6c4e397ce1be279f36fa6e2187ee
SHA5128cf6ce4d67eed64ece5b6b27e5a7c1c69f8166c1be9d5dc2aec85ad7cac9d76d8c09c9b31c059682fef9023e4bfcf2c340cc2c4e1e25f6efaf61b87d3970f357
-
Filesize
1.8MB
MD52d6ddef47d807fb83dae21dcb8e33521
SHA17cfc94c90e30fe9d7b6922c35c7491c73c421a9a
SHA25692c8342802935767887dce60965bc2095b036746b46482d230a02fd941929c26
SHA512243f3b1ddc1b58b51f17d211b5729c3d7cd79b42bd2d3aecf193447d671f61eac44180eba321d7b73b9c2f887f39151bede05c61f597eb0520e46e31536b955c
-
Filesize
208KB
MD5f01e923f185b466c9c7a830c1f930179
SHA1f11eea76a5572a576141919587a1f23086337afc
SHA256e9f781af984947fc60f532cd709df5074678c9eeff9c9d3efd358759484de46a
SHA512b4f1c4a3d242805a9fcde1291f4450ece64ab5ff9b35d622352af0e919adf003002e4194318053179de0a7ef9ac308380e14d82c4bc89b5411bde6148923ce81
-
Filesize
231KB
MD5915c4089431be3bc007dc7cd26b722e6
SHA1d827fa0851e2b6a533b891f5119961d1696d6ff1
SHA2560901f66236b8956ae467240a125d1d938f523938087eabc9df3fa51a873af5cc
SHA51207079b0b195982c2ca5583844ee1f36b479b06458dfcbf24df8f07aaf74ebd5ad3758989de670897dfa9508ede540998ebe2ed60a3cee04c0e9b358bb1f6f1ec
-
Filesize
2KB
MD5a69559718ab506675e907fe49deb71e9
SHA1bc8f404ffdb1960b50c12ff9413c893b56f2e36f
SHA2562f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc
SHA512e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
411KB
MD54c204b2ec38b7f6fbbba89415f7cd545
SHA127dce5331e1cdeb7b28ea8b67d0ee16e85030fcb
SHA2567759a256f6eb68f800d8462c5c48ffd53f3601a328d2602f4ecd2eca4f2f579b
SHA5123106791e0dcedd7cca3cce7428eec843c0ed5698c5d33397d6f0e9b6c6bcc51bb7e7d21d99c505323ff213df8427a60ffa47e1d94fa92fb26c9319ddf64e7f06
-
Filesize
1.8MB
MD5861e95d0762b67f598f84c188f950a06
SHA190e4491dd5b4fdb3dab1dcb53804e77f8884c0ea
SHA25667dfb86cf80616d7b7a2860b2a9270045a92f574bc3ad73750d2b9d0676bf29e
SHA512a963725bb7eed970b25a20084a4de085fe37819274e1e88daae1d939cafa027bfe4a8d747382bbce62de60ee3c24367ebf757918d6a137641f9d51b7aa614b77
-
Filesize
250KB
MD56c30c2abb64593a0e6d7e3abebcc0fbc
SHA10635ed5b8bbda29842e86f123bbb7a5207fb6cfd
SHA256be7ccf6430823e7e11d624c4d90975306570f899cf36c873ae3ee767d3bd9944
SHA51231be574b6102b25f82c798385183c378bb9bb013c096c609f713a64095766164d1983d60dbeac80858402239c31fdd9a52c1bddb5b40cbfda70193c6400cb24e
-
Filesize
1.3MB
MD5ac40cf3d4f0ff8567ac33b5ad6806731
SHA1878c1936f784843a271a7ed5703827261471c9d7
SHA2565fc02826456e360f064411b0843c8857777bbdbed7eb7f7a9bf7df520714b3b6
SHA512b827ce1dda62dc8e30ebb45a8dbc28972cb1cfa944033511ef0f302979dc2e6b71aa73380e00cc4647531177edb427803d3a57f4487487fb236a5175573afb98
-
Filesize
1.4MB
MD5743e840e8f8355be93ad18eb504ee96f
SHA1d279c633a2fa5bb86ded2bdec58815e92a1c902e
SHA25617ab637d85fb33b2301e57a9c8d75f9e26d513565e1312621138eba3139a201c
SHA512ba1e403d1fe9ab809c0bc407fc101391e91774ce35db3d9fcceab206bf176ba1cd6ee7f1d3de31dba6ff41d585b3620d2bcca7873fc37b7a3aad792c0ec50654
-
Filesize
1.1MB
MD5c38078f2860b643a3dcc8776281b645b
SHA173bc061124da4643e7dfc26f36d99ca71f9de83a
SHA256e77f2cec060702fb6ba95be619849d11faa8280a7588eee7983a7409bd515f95
SHA5123025297dbb0a3548fc2462a9bd19d3ba58beba38236eb794f1168876932c6db81e47b46865b0c3fe4de300e268b8ddf13b6bd7bb441036758366c5ab6991e443
-
Filesize
1.0MB
MD5bfa79f126429d9cf35f6685612cdf5d6
SHA1be234c6f1b0dc05b1e772258c7d35e60e51fa549
SHA2569bb7fe055610277eb877bbc574021c8113c5c38af9dead1a0b3a0e4fa1ac272b
SHA51276b7adc1d33f110ffac899d3e94565036d5c398070bb8a7f89142e7f48c40d191b77809ce5798975a836d88a56eff52268447c7c110103de62bf94c28a95c222
-
Filesize
238KB
MD5753a4c1c832be4eb1bd5b3c5ebec40f9
SHA15a251fb267facb050aa327ede3597d43c0304abb
SHA256e0285dc9c9ab8b22defb23bdc3252cfadad0e778288217d3bd17f3e645f3cb6f
SHA512608b475c3779718bb7b61f9a12249435f9f37fa6548e79f3a468c46fb6de048f8d9972003e05474146dd920592c7bff4e855e38d468451dadd9687bcb9ad0011
-
Filesize
313KB
MD5857ff40279ccb43d083974c0f19d98aa
SHA1cb3f41caa047f3d9084a6f90d191dadceb81a1d5
SHA2564316db5c1bd19a4c77913c9f1327be1d5d5b2f8f96087c7e6b51ffb8cc275eb7
SHA512b2b0b1f0ccf9d4aee0b286781aa94b419cb3bfe5016f2cab109785e6f9d7bb4c7ca961807306bb99ceefcdb27356ea2aaf03b7869d768c324a00540f7f85b112