Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 10:55
Static task
static1
Behavioral task
behavioral1
Sample
18d65f874ded93e21c8c86f9f4f40b52.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
18d65f874ded93e21c8c86f9f4f40b52.exe
Resource
win10v2004-20231215-en
General
-
Target
18d65f874ded93e21c8c86f9f4f40b52.exe
-
Size
1.1MB
-
MD5
18d65f874ded93e21c8c86f9f4f40b52
-
SHA1
6f18ad0336ffbf021c8658f172528bd3a609835a
-
SHA256
133a4154fb7d809b9a4d6bc22cdbe3c8074c1c793032a5928561ccd8bebeedef
-
SHA512
8868a8257b3e8ec36230a4226c50cf8393c802b60c2bbe8999a8db776a58167698fbb1f115729f4527bb1ac42bb3ccfd2bb36ab01296b885ef1687a002a74883
-
SSDEEP
24576:IWvknOMEfMdNOr9tSO45DGe2gxNioTRcTQGr7/czF6+I:IUeOMm+w90O45C0DEzUA+I
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2956 Setup.exe -
Loads dropped DLL 4 IoCs
pid Process 2960 18d65f874ded93e21c8c86f9f4f40b52.exe 2956 Setup.exe 2956 Setup.exe 2956 Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\Setup.exe = "1" Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Setup.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main Setup.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Key created \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND\Setup.exe = "0" Setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2956 2960 18d65f874ded93e21c8c86f9f4f40b52.exe 28 PID 2960 wrote to memory of 2956 2960 18d65f874ded93e21c8c86f9f4f40b52.exe 28 PID 2960 wrote to memory of 2956 2960 18d65f874ded93e21c8c86f9f4f40b52.exe 28 PID 2960 wrote to memory of 2956 2960 18d65f874ded93e21c8c86f9f4f40b52.exe 28 PID 2960 wrote to memory of 2956 2960 18d65f874ded93e21c8c86f9f4f40b52.exe 28 PID 2960 wrote to memory of 2956 2960 18d65f874ded93e21c8c86f9f4f40b52.exe 28 PID 2960 wrote to memory of 2956 2960 18d65f874ded93e21c8c86f9f4f40b52.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\18d65f874ded93e21c8c86f9f4f40b52.exe"C:\Users\Admin\AppData\Local\Temp\18d65f874ded93e21c8c86f9f4f40b52.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\a2gGqil1F1\8Z8Qf77U\Setup.exeC:\Users\Admin\AppData\Local\Temp\a2gGqil1F1\8Z8Qf77U\Setup.exe --relaunch2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
PID:2956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
994KB
MD5824edefefd52643a31826e534bee53be
SHA145bb6aff5811e30b986ba089aa7eb5c19538fefa
SHA2567c8e218cc0242f5a61b31cf346246c580d4207c7d2963833c7251bac6d2099ed
SHA5124761cf44e9d51b8a1c64566b11141dc8f507e5f8e121f5f7a848acb23cdd4823a8231b56e77593daed2cae2dc642d36719bd31b6631a7dc35d0f60294c125f70
-
Filesize
1.0MB
MD53ff39b3e6356304f274d2fcd935305de
SHA1b45f00a624cf6cb45cdde93dc1e96609e0651730
SHA256ba5ac32f025ad683724cac63c4647a6c5904ba298b5636e1b0c952533e67ea29
SHA51245c89bd07fc8b90cbc7b60c54a3dcb67a54389f68d7dae7b3c94c2ca2377fa8bad28ca399c419ce39e22eacb72d89781297049e8926773ba2edd51c0a01a5d09
-
Filesize
5KB
MD503cd21ffd427fda608b67e26e4d20f0c
SHA10813fbc5743d28c7c0e695a9500d0e06acea1731
SHA256076e7a84bbbaa33bae39d9f26826c5e01c1b6943ace9b59243603da8e982fb43
SHA5129892d2ace5f120479d4d3bc7e4ca658a496024a5799089e86e3c134395a19c2a80800798d832f7231c245de972bac274271cfef29861562362a2f14315544944
-
Filesize
967KB
MD57a5035128ff4ffa89c0cf8d8e69bb032
SHA1f93244ea69bf19bf6798c10a9bca45e605b523c8
SHA2560d010356f562ad2fe0f77d3412c1cedf5fedc3e6114480192475c21914956d4e
SHA512cadab087e7fc254a9c72d57178b623954b114080b4956f4d35fe008a3209b976d336109c95297144a04ddbed36857b241d1ac6d1dfb79e5c976c5c46affb0ee1
-
Filesize
1.1MB
MD518d65f874ded93e21c8c86f9f4f40b52
SHA16f18ad0336ffbf021c8658f172528bd3a609835a
SHA256133a4154fb7d809b9a4d6bc22cdbe3c8074c1c793032a5928561ccd8bebeedef
SHA5128868a8257b3e8ec36230a4226c50cf8393c802b60c2bbe8999a8db776a58167698fbb1f115729f4527bb1ac42bb3ccfd2bb36ab01296b885ef1687a002a74883