Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 16:35
Static task
static1
Behavioral task
behavioral1
Sample
2da7bf9746285b9afeab2254c225a9ee.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2da7bf9746285b9afeab2254c225a9ee.exe
Resource
win10v2004-20231215-en
General
-
Target
2da7bf9746285b9afeab2254c225a9ee.exe
-
Size
60KB
-
MD5
2da7bf9746285b9afeab2254c225a9ee
-
SHA1
e0fab53965e2d5df57e1139cb6b87f3391126095
-
SHA256
e90e778e03fdd92a511f91cea11a5257d8b8536f40ab6dae9875ef1863911aa7
-
SHA512
184f48b144b86a2aeda9edbc7492acd4c34a87c76c530ad04e44e3d83f018cd42c52c51c6fe03ec1a3fb509ebb4826db90bb5de42d99fb786f7fcade1470ab2e
-
SSDEEP
768:/24GjjRzPyI6TfDarzerws8FJd/f0ElsL9KyeVKgKhvS7XFZBs9MvO:jGfRzn8DuOHM/f0OsAye9cS7XS98O
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
killerxknight
Signatures
-
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9YsaT61k-1URY-M4y0-3IC1-a4Y97Z09435F}\ComponentID = "User Account Control" 2da7bf9746285b9afeab2254c225a9ee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9YsaT61k-1URY-M4y0-3IC1-a4Y97Z09435F}\ = "Microsoft Windows" 2da7bf9746285b9afeab2254c225a9ee.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9YsaT61k-1URY-M4y0-3IC1-a4Y97Z09435F} 2da7bf9746285b9afeab2254c225a9ee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Active Setup\Installed Components\{9YsaT61k-1URY-M4y0-3IC1-a4Y97Z09435F}\stubpath = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows Firewall\\WIN32.exe" 2da7bf9746285b9afeab2254c225a9ee.exe -
Executes dropped EXE 1 IoCs
pid Process 2716 svchost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\Adobe Drivers = "C:\\Users\\Richard\\AppData\\Roaming\\Microsoft\\Local\\svchost.exe" 2da7bf9746285b9afeab2254c225a9ee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Adobe Drivers = "C:\\Users\\Richard\\AppData\\Roaming\\Microsoft\\Local\\svchost.exe" 2da7bf9746285b9afeab2254c225a9ee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Adobe Drivers = "C:\\Users\\Richard\\AppData\\Roaming\\Microsoft\\Local\\svchost.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\Adobe Drivers = "C:\\Users\\Richard\\AppData\\Roaming\\Microsoft\\Local\\svchost.exe" svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2648 2da7bf9746285b9afeab2254c225a9ee.exe 2648 2da7bf9746285b9afeab2254c225a9ee.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2716 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2648 2da7bf9746285b9afeab2254c225a9ee.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2648 2da7bf9746285b9afeab2254c225a9ee.exe 2716 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2716 2648 2da7bf9746285b9afeab2254c225a9ee.exe 28 PID 2648 wrote to memory of 2716 2648 2da7bf9746285b9afeab2254c225a9ee.exe 28 PID 2648 wrote to memory of 2716 2648 2da7bf9746285b9afeab2254c225a9ee.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2da7bf9746285b9afeab2254c225a9ee.exe"C:\Users\Admin\AppData\Local\Temp\2da7bf9746285b9afeab2254c225a9ee.exe"1⤵
- Modifies Installed Components in the registry
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Richard\AppData\Roaming\Microsoft\Local\svchost.exe"C:\Users\Richard\AppData\Roaming\Microsoft\Local\svchost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5ea09acc396ffda6f02379bf7ae52bf14
SHA1c50a7c12b3f178f32e5b8ac2f2985867768df83b
SHA25678cc2960c692f43b027c57f810ea46af6d2a0daee49d7ea7e6493077bba951c6
SHA5124e137f8032e30c0926257d3d20be20be3f994bd7aa775e814461461f840bbaf845a037018086827a551037d5deeaeb30db8b95b49f8efadf13f9a4e514ae0b39
-
Filesize
13KB
MD53dcc6ab23760c1db0ca7dad3b8143fee
SHA16e0774c254107e79f4dc66d9a6e3e1a2ac3e8663
SHA2568297d3d1ee185c81a94ca7539bfa12fdcf30f703e1f3f2027ef8b42d27d90f87
SHA512f1000e5d34d8338cf410f2fc305ba02a4cd3a38f16140922002ec23496cbde829ce7966c0046335f4f838cecb74f392e5ccc4c85f57a50edb7b13f7ca5e3068b
-
Filesize
60KB
MD52da7bf9746285b9afeab2254c225a9ee
SHA1e0fab53965e2d5df57e1139cb6b87f3391126095
SHA256e90e778e03fdd92a511f91cea11a5257d8b8536f40ab6dae9875ef1863911aa7
SHA512184f48b144b86a2aeda9edbc7492acd4c34a87c76c530ad04e44e3d83f018cd42c52c51c6fe03ec1a3fb509ebb4826db90bb5de42d99fb786f7fcade1470ab2e