Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 19:11
Static task
static1
Behavioral task
behavioral1
Sample
36f426936db645690496fdee469c34a1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
36f426936db645690496fdee469c34a1.exe
Resource
win10v2004-20231215-en
General
-
Target
36f426936db645690496fdee469c34a1.exe
-
Size
965KB
-
MD5
36f426936db645690496fdee469c34a1
-
SHA1
f5ccf81f0f837fbbe45c42ab8f3e8be94d9f559c
-
SHA256
36b6bd45b1e1ba82e988d14163dae843854ecbee141fb2815260f6443340cc9b
-
SHA512
1b0311411e82044b9a6fab0e11b45041be4914dcc18f2223ad0e503c5f2ba10170736872ce6cc857df5ebfb999b28e25a2fabd923e24aeb6e6b09dcdf171acbc
-
SSDEEP
12288:ypqiC/2OGAtkCP4cejGSOpRKwCGYjLGis:ypo/2+ttPJLfpRKwCGYf
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe system3_.exe" 36f426936db645690496fdee469c34a1.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 36f426936db645690496fdee469c34a1.exe -
Disables Task Manager via registry modification
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Run\Yahoo Messengger = "C:\\Users\\Admin\\Desktop\\system3_.exe" 36f426936db645690496fdee469c34a1.exe -
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1308-0-0x0000000000400000-0x0000000000509000-memory.dmp autoit_exe behavioral1/files/0x000b000000012185-7.dat autoit_exe behavioral1/memory/1308-8-0x0000000000400000-0x0000000000509000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Page_URL = "http://www.mydreamworld.50webs.com" 36f426936db645690496fdee469c34a1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Search_URL = "http://www.mydreamworld.50webs.com" 36f426936db645690496fdee469c34a1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Search Page = "http://www.mydreamworld.50webs.com" 36f426936db645690496fdee469c34a1.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main 36f426936db645690496fdee469c34a1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Main 36f426936db645690496fdee469c34a1.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Start Page = "http://www.mydreamworld.50webs.com" 36f426936db645690496fdee469c34a1.exe Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.mydreamworld.50webs.com" 36f426936db645690496fdee469c34a1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1308 36f426936db645690496fdee469c34a1.exe 1308 36f426936db645690496fdee469c34a1.exe -
Suspicious behavior: MapViewOfSection 21 IoCs
pid Process 1308 36f426936db645690496fdee469c34a1.exe 1308 36f426936db645690496fdee469c34a1.exe 1308 36f426936db645690496fdee469c34a1.exe 1308 36f426936db645690496fdee469c34a1.exe 1308 36f426936db645690496fdee469c34a1.exe 1308 36f426936db645690496fdee469c34a1.exe 1308 36f426936db645690496fdee469c34a1.exe 1308 36f426936db645690496fdee469c34a1.exe 1308 36f426936db645690496fdee469c34a1.exe 1308 36f426936db645690496fdee469c34a1.exe 1308 36f426936db645690496fdee469c34a1.exe 1308 36f426936db645690496fdee469c34a1.exe 1308 36f426936db645690496fdee469c34a1.exe 1308 36f426936db645690496fdee469c34a1.exe 1308 36f426936db645690496fdee469c34a1.exe 1308 36f426936db645690496fdee469c34a1.exe 1308 36f426936db645690496fdee469c34a1.exe 1308 36f426936db645690496fdee469c34a1.exe 1308 36f426936db645690496fdee469c34a1.exe 1308 36f426936db645690496fdee469c34a1.exe 1308 36f426936db645690496fdee469c34a1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1308 36f426936db645690496fdee469c34a1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1308 wrote to memory of 372 1308 36f426936db645690496fdee469c34a1.exe 5 PID 1308 wrote to memory of 372 1308 36f426936db645690496fdee469c34a1.exe 5 PID 1308 wrote to memory of 372 1308 36f426936db645690496fdee469c34a1.exe 5 PID 1308 wrote to memory of 372 1308 36f426936db645690496fdee469c34a1.exe 5 PID 1308 wrote to memory of 372 1308 36f426936db645690496fdee469c34a1.exe 5 PID 1308 wrote to memory of 372 1308 36f426936db645690496fdee469c34a1.exe 5 PID 1308 wrote to memory of 372 1308 36f426936db645690496fdee469c34a1.exe 5 PID 1308 wrote to memory of 384 1308 36f426936db645690496fdee469c34a1.exe 4 PID 1308 wrote to memory of 384 1308 36f426936db645690496fdee469c34a1.exe 4 PID 1308 wrote to memory of 384 1308 36f426936db645690496fdee469c34a1.exe 4 PID 1308 wrote to memory of 384 1308 36f426936db645690496fdee469c34a1.exe 4 PID 1308 wrote to memory of 384 1308 36f426936db645690496fdee469c34a1.exe 4 PID 1308 wrote to memory of 384 1308 36f426936db645690496fdee469c34a1.exe 4 PID 1308 wrote to memory of 384 1308 36f426936db645690496fdee469c34a1.exe 4 PID 1308 wrote to memory of 420 1308 36f426936db645690496fdee469c34a1.exe 3 PID 1308 wrote to memory of 420 1308 36f426936db645690496fdee469c34a1.exe 3 PID 1308 wrote to memory of 420 1308 36f426936db645690496fdee469c34a1.exe 3 PID 1308 wrote to memory of 420 1308 36f426936db645690496fdee469c34a1.exe 3 PID 1308 wrote to memory of 420 1308 36f426936db645690496fdee469c34a1.exe 3 PID 1308 wrote to memory of 420 1308 36f426936db645690496fdee469c34a1.exe 3 PID 1308 wrote to memory of 420 1308 36f426936db645690496fdee469c34a1.exe 3 PID 1308 wrote to memory of 464 1308 36f426936db645690496fdee469c34a1.exe 2 PID 1308 wrote to memory of 464 1308 36f426936db645690496fdee469c34a1.exe 2 PID 1308 wrote to memory of 464 1308 36f426936db645690496fdee469c34a1.exe 2 PID 1308 wrote to memory of 464 1308 36f426936db645690496fdee469c34a1.exe 2 PID 1308 wrote to memory of 464 1308 36f426936db645690496fdee469c34a1.exe 2 PID 1308 wrote to memory of 464 1308 36f426936db645690496fdee469c34a1.exe 2 PID 1308 wrote to memory of 464 1308 36f426936db645690496fdee469c34a1.exe 2 PID 1308 wrote to memory of 480 1308 36f426936db645690496fdee469c34a1.exe 1 PID 1308 wrote to memory of 480 1308 36f426936db645690496fdee469c34a1.exe 1 PID 1308 wrote to memory of 480 1308 36f426936db645690496fdee469c34a1.exe 1 PID 1308 wrote to memory of 480 1308 36f426936db645690496fdee469c34a1.exe 1 PID 1308 wrote to memory of 480 1308 36f426936db645690496fdee469c34a1.exe 1 PID 1308 wrote to memory of 480 1308 36f426936db645690496fdee469c34a1.exe 1 PID 1308 wrote to memory of 480 1308 36f426936db645690496fdee469c34a1.exe 1 PID 1308 wrote to memory of 488 1308 36f426936db645690496fdee469c34a1.exe 8 PID 1308 wrote to memory of 488 1308 36f426936db645690496fdee469c34a1.exe 8 PID 1308 wrote to memory of 488 1308 36f426936db645690496fdee469c34a1.exe 8 PID 1308 wrote to memory of 488 1308 36f426936db645690496fdee469c34a1.exe 8 PID 1308 wrote to memory of 488 1308 36f426936db645690496fdee469c34a1.exe 8 PID 1308 wrote to memory of 488 1308 36f426936db645690496fdee469c34a1.exe 8 PID 1308 wrote to memory of 488 1308 36f426936db645690496fdee469c34a1.exe 8 PID 1308 wrote to memory of 600 1308 36f426936db645690496fdee469c34a1.exe 26 PID 1308 wrote to memory of 600 1308 36f426936db645690496fdee469c34a1.exe 26 PID 1308 wrote to memory of 600 1308 36f426936db645690496fdee469c34a1.exe 26 PID 1308 wrote to memory of 600 1308 36f426936db645690496fdee469c34a1.exe 26 PID 1308 wrote to memory of 600 1308 36f426936db645690496fdee469c34a1.exe 26 PID 1308 wrote to memory of 600 1308 36f426936db645690496fdee469c34a1.exe 26 PID 1308 wrote to memory of 600 1308 36f426936db645690496fdee469c34a1.exe 26 PID 1308 wrote to memory of 676 1308 36f426936db645690496fdee469c34a1.exe 25 PID 1308 wrote to memory of 676 1308 36f426936db645690496fdee469c34a1.exe 25 PID 1308 wrote to memory of 676 1308 36f426936db645690496fdee469c34a1.exe 25 PID 1308 wrote to memory of 676 1308 36f426936db645690496fdee469c34a1.exe 25 PID 1308 wrote to memory of 676 1308 36f426936db645690496fdee469c34a1.exe 25 PID 1308 wrote to memory of 676 1308 36f426936db645690496fdee469c34a1.exe 25 PID 1308 wrote to memory of 676 1308 36f426936db645690496fdee469c34a1.exe 25 PID 1308 wrote to memory of 752 1308 36f426936db645690496fdee469c34a1.exe 24 PID 1308 wrote to memory of 752 1308 36f426936db645690496fdee469c34a1.exe 24 PID 1308 wrote to memory of 752 1308 36f426936db645690496fdee469c34a1.exe 24 PID 1308 wrote to memory of 752 1308 36f426936db645690496fdee469c34a1.exe 24 PID 1308 wrote to memory of 752 1308 36f426936db645690496fdee469c34a1.exe 24 PID 1308 wrote to memory of 752 1308 36f426936db645690496fdee469c34a1.exe 24 PID 1308 wrote to memory of 752 1308 36f426936db645690496fdee469c34a1.exe 24 PID 1308 wrote to memory of 812 1308 36f426936db645690496fdee469c34a1.exe 23
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:480
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1096
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:2060
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:1280
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1128
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:276
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:344
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:996
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:852
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:812
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:752
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:676
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:600
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:420
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:384
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:372
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:488
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1996
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\36f426936db645690496fdee469c34a1.exe"C:\Users\Admin\AppData\Local\Temp\36f426936db645690496fdee469c34a1.exe"2⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Adds Run key to start application
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1308
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
965KB
MD536f426936db645690496fdee469c34a1
SHA1f5ccf81f0f837fbbe45c42ab8f3e8be94d9f559c
SHA25636b6bd45b1e1ba82e988d14163dae843854ecbee141fb2815260f6443340cc9b
SHA5121b0311411e82044b9a6fab0e11b45041be4914dcc18f2223ad0e503c5f2ba10170736872ce6cc857df5ebfb999b28e25a2fabd923e24aeb6e6b09dcdf171acbc