Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
0s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 11:29
Static task
static1
Behavioral task
behavioral1
Sample
1adaa0d2762fad06c5962dfd73daa552.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1adaa0d2762fad06c5962dfd73daa552.exe
Resource
win10v2004-20231222-en
General
-
Target
1adaa0d2762fad06c5962dfd73daa552.exe
-
Size
289KB
-
MD5
1adaa0d2762fad06c5962dfd73daa552
-
SHA1
9893f2dc6250e7518b8eacd9a8cc0464d0ec8ce8
-
SHA256
39e05bd4c7e50e5dbcde392823b1007a6c57da91630171c06e00f3395d1f99ef
-
SHA512
8938b9f9f89d596d0af77f02eace8ec3f7c48fae6308fa6a4edad9549d699761a0b974f2a25b8d1bb2a7bda20476a9b4c883b94cfa3f6829bee6c56be645a7d2
-
SSDEEP
6144:C5O8bnBSO/9xxY3hkm1ZDLZA3M7KrD37lSCVzhhyn:TqIOYGmvLZA3M7KrDJVQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2644 SeFastInstall2_3218.exe -
Loads dropped DLL 7 IoCs
pid Process 1800 1adaa0d2762fad06c5962dfd73daa552.exe 1800 1adaa0d2762fad06c5962dfd73daa552.exe 1800 1adaa0d2762fad06c5962dfd73daa552.exe 1800 1adaa0d2762fad06c5962dfd73daa552.exe 2644 SeFastInstall2_3218.exe 2644 SeFastInstall2_3218.exe 2644 SeFastInstall2_3218.exe -
resource yara_rule behavioral1/memory/2644-26-0x0000000000400000-0x00000000004AB000-memory.dmp upx behavioral1/memory/2644-40-0x0000000000400000-0x00000000004AB000-memory.dmp upx behavioral1/memory/2644-42-0x0000000000400000-0x00000000004AB000-memory.dmp upx behavioral1/memory/2644-43-0x0000000000400000-0x00000000004AB000-memory.dmp upx behavioral1/memory/2644-44-0x0000000000400000-0x00000000004AB000-memory.dmp upx behavioral1/memory/2644-45-0x0000000000400000-0x00000000004AB000-memory.dmp upx behavioral1/memory/2644-46-0x0000000000400000-0x00000000004AB000-memory.dmp upx behavioral1/memory/2644-47-0x0000000000400000-0x00000000004AB000-memory.dmp upx behavioral1/memory/2644-48-0x0000000000400000-0x00000000004AB000-memory.dmp upx behavioral1/memory/2644-49-0x0000000000400000-0x00000000004AB000-memory.dmp upx -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 SeFastInstall2_3218.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created \??\c:\windows\taobao.ico 1adaa0d2762fad06c5962dfd73daa552.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 32 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CD4B2E76-8905-4CE9-8AE4-38163919C985}\DefaultIcon\ = "C:\\Windows\\SysWow64\\SHELL32.DLL,220" 1adaa0d2762fad06c5962dfd73daa552.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EF2B9DCD-E16C-4CCE-8D71-2745C0E8B2F8} 1adaa0d2762fad06c5962dfd73daa552.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EF2B9DCD-E16C-4CCE-8D71-2745C0E8B2F8}\Shell\Internet Explorer\Command 1adaa0d2762fad06c5962dfd73daa552.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CD4B2E76-8905-4CE9-8AE4-38163919C985}\InfoTip = "Internet Explorer" 1adaa0d2762fad06c5962dfd73daa552.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CD4B2E76-8905-4CE9-8AE4-38163919C985}\Shell\Internet Explorer 1adaa0d2762fad06c5962dfd73daa552.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CD4B2E76-8905-4CE9-8AE4-38163919C985}\ShellFolder 1adaa0d2762fad06c5962dfd73daa552.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EF2B9DCD-E16C-4CCE-8D71-2745C0E8B2F8}\ShellFolder\Attributes = "0" 1adaa0d2762fad06c5962dfd73daa552.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage 1adaa0d2762fad06c5962dfd73daa552.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CD4B2E76-8905-4CE9-8AE4-38163919C985}\ = "Internet Explorer" 1adaa0d2762fad06c5962dfd73daa552.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CD4B2E76-8905-4CE9-8AE4-38163919C985}\Shell 1adaa0d2762fad06c5962dfd73daa552.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EF2B9DCD-E16C-4CCE-8D71-2745C0E8B2F8}\DefaultIcon\ = "c:\\windows\\taobao.ico" 1adaa0d2762fad06c5962dfd73daa552.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EF2B9DCD-E16C-4CCE-8D71-2745C0E8B2F8}\Shell 1adaa0d2762fad06c5962dfd73daa552.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CD4B2E76-8905-4CE9-8AE4-38163919C985} 1adaa0d2762fad06c5962dfd73daa552.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EF2B9DCD-E16C-4CCE-8D71-2745C0E8B2F8}\InfoTip = "ÌÔ±¦-ÌؼÛ" 1adaa0d2762fad06c5962dfd73daa552.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EF2B9DCD-E16C-4CCE-8D71-2745C0E8B2F8}\DefaultIcon 1adaa0d2762fad06c5962dfd73daa552.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EF2B9DCD-E16C-4CCE-8D71-2745C0E8B2F8}\ = "ÌÔ±¦-ÌؼÛ" 1adaa0d2762fad06c5962dfd73daa552.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} 1adaa0d2762fad06c5962dfd73daa552.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CD4B2E76-8905-4CE9-8AE4-38163919C985}\Shell\Internet Explorer\Command\ = "C:\\Program Files (x86)\\Internet Explorer\\iexplore.exe http://www.my133.net/?1" 1adaa0d2762fad06c5962dfd73daa552.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CD4B2E76-8905-4CE9-8AE4-38163919C985}\TypeLib 1adaa0d2762fad06c5962dfd73daa552.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell 1adaa0d2762fad06c5962dfd73daa552.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EF2B9DCD-E16C-4CCE-8D71-2745C0E8B2F8}\Shell\Internet Explorer 1adaa0d2762fad06c5962dfd73daa552.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EF2B9DCD-E16C-4CCE-8D71-2745C0E8B2F8}\ShellFolder 1adaa0d2762fad06c5962dfd73daa552.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CD4B2E76-8905-4CE9-8AE4-38163919C985}\TypeLib\ = "{CD4B2E76-8905-4CE9-8AE4-38163919C985}" 1adaa0d2762fad06c5962dfd73daa552.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EF2B9DCD-E16C-4CCE-8D71-2745C0E8B2F8}\TypeLib 1adaa0d2762fad06c5962dfd73daa552.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EF2B9DCD-E16C-4CCE-8D71-2745C0E8B2F8}\TypeLib\ = "{EF2B9DCD-E16C-4CCE-8D71-2745C0E8B2F8}" 1adaa0d2762fad06c5962dfd73daa552.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command 1adaa0d2762fad06c5962dfd73daa552.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 1adaa0d2762fad06c5962dfd73daa552.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CD4B2E76-8905-4CE9-8AE4-38163919C985}\DefaultIcon 1adaa0d2762fad06c5962dfd73daa552.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{EF2B9DCD-E16C-4CCE-8D71-2745C0E8B2F8}\Shell\Internet Explorer\Command\ = "C:\\Program Files (x86)\\Internet Explorer\\iexplore.exe http://www.05zw.com/taobao/taobao.html" 1adaa0d2762fad06c5962dfd73daa552.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CD4B2E76-8905-4CE9-8AE4-38163919C985}\Shell\Internet Explorer\Command 1adaa0d2762fad06c5962dfd73daa552.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 1adaa0d2762fad06c5962dfd73daa552.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{CD4B2E76-8905-4CE9-8AE4-38163919C985}\ShellFolder\Attributes = "0" 1adaa0d2762fad06c5962dfd73daa552.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2644 SeFastInstall2_3218.exe 2644 SeFastInstall2_3218.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1800 wrote to memory of 2644 1800 1adaa0d2762fad06c5962dfd73daa552.exe 15 PID 1800 wrote to memory of 2644 1800 1adaa0d2762fad06c5962dfd73daa552.exe 15 PID 1800 wrote to memory of 2644 1800 1adaa0d2762fad06c5962dfd73daa552.exe 15 PID 1800 wrote to memory of 2644 1800 1adaa0d2762fad06c5962dfd73daa552.exe 15 PID 1800 wrote to memory of 2644 1800 1adaa0d2762fad06c5962dfd73daa552.exe 15 PID 1800 wrote to memory of 2644 1800 1adaa0d2762fad06c5962dfd73daa552.exe 15 PID 1800 wrote to memory of 2644 1800 1adaa0d2762fad06c5962dfd73daa552.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\1adaa0d2762fad06c5962dfd73daa552.exe"C:\Users\Admin\AppData\Local\Temp\1adaa0d2762fad06c5962dfd73daa552.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\SeFastInstall2_3218.exe"C:\Users\Admin\AppData\Local\Temp\SeFastInstall2_3218.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
PID:2644
-