Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
195s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 15:38
Static task
static1
Behavioral task
behavioral1
Sample
29ec600836346c641b153f753ed721fa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
29ec600836346c641b153f753ed721fa.exe
Resource
win10v2004-20231215-en
General
-
Target
29ec600836346c641b153f753ed721fa.exe
-
Size
503KB
-
MD5
29ec600836346c641b153f753ed721fa
-
SHA1
1491d34b229bf06de9c791e6b28eb91d13e542e2
-
SHA256
77f03b6e7ff483c1e4e156f1279a0d3d788494968917f6f947505b762dcb12d5
-
SHA512
b32231ada19d28829063b72e21f16fb42c2711a61ddaf3eaf804dcb236384528d5a95587cf77363804b1e4ffdf99e25b83d02d1d0225e1bd2c05151daa904f94
-
SSDEEP
12288:yc+qifEn16C7bFZr8nnnImLkBlTAHDOR96Btb1:12EF7Jl8ImRjORWb
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe %WINDIR%\\WinMgmt.exe" WinMgmt.exe -
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" WinMgmt.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" WinMgmt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" WinMgmt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" WinMgmt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" WinMgmt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" WinMgmt.exe -
Deletes itself 1 IoCs
pid Process 2596 WinMgmt.exe -
Executes dropped EXE 1 IoCs
pid Process 2596 WinMgmt.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" WinMgmt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" WinMgmt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" WinMgmt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" WinMgmt.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" WinMgmt.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\dllcache\ftp.exe WinMgmt.exe File opened for modification C:\Windows\SysWOW64\tftp.exe WinMgmt.exe File opened for modification C:\Windows\SysWOW64\dllcache\tftp.exe WinMgmt.exe File opened for modification C:\Windows\SysWOW64\microsoft\backup.ftp WinMgmt.exe File opened for modification C:\Windows\SysWOW64\microsoft\backup.tftp WinMgmt.exe File created C:\Windows\SysWOW64\microsoft\backup.ftp WinMgmt.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat WinMgmt.exe File opened for modification C:\Windows\SysWOW64\ftp.exe WinMgmt.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\WinMgmt.exe 29ec600836346c641b153f753ed721fa.exe File opened for modification C:\Windows\WinMgmt.exe 29ec600836346c641b153f753ed721fa.exe -
Modifies data under HKEY_USERS 16 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings WinMgmt.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft WinMgmt.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion WinMgmt.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System WinMgmt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\System WinMgmt.exe Key created \REGISTRY\USER\.DEFAULT WinMgmt.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies WinMgmt.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" WinMgmt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections WinMgmt.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 WinMgmt.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings WinMgmt.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" WinMgmt.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" WinMgmt.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 WinMgmt.exe Key created \REGISTRY\USER\.DEFAULT\Software WinMgmt.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows WinMgmt.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1088 29ec600836346c641b153f753ed721fa.exe 2596 WinMgmt.exe 2596 WinMgmt.exe 2596 WinMgmt.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2596 WinMgmt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\29ec600836346c641b153f753ed721fa.exe"C:\Users\Admin\AppData\Local\Temp\29ec600836346c641b153f753ed721fa.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1088
-
C:\Windows\WinMgmt.exe"C:\Windows\WinMgmt.exe"1⤵
- Modifies WinLogon for persistence
- Modifies security service
- Windows security bypass
- Deletes itself
- Executes dropped EXE
- Windows security modification
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2596
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138KB
MD5e5d062771b8b67dde1e3a31b8b5850b1
SHA1db14def0e2cce8779ae17d8c8fcb0f0ba520e2cf
SHA256227376096aed7541e4d34dbcfb8c8ce16e6a827ee4746bf2eb503f65eb3d8b96
SHA51284ae50162e13c5ed847c9883dd23284a85236565ac65b8d3e07899ccb66dc10d5569102ad81ad79a43742f457ee82b9ba1e00456564683ed7c9489ae245bdcdd