Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 00:26
Static task
static1
Behavioral task
behavioral1
Sample
46493b50f0fe2e9acaecceda4be9124f.exe
Resource
win7-20231215-en
General
-
Target
46493b50f0fe2e9acaecceda4be9124f.exe
-
Size
314KB
-
MD5
46493b50f0fe2e9acaecceda4be9124f
-
SHA1
87d36884fba1befe5f33b45e2750f00a6e400ba4
-
SHA256
9ab29f4e939396b94de9df9bf13fa8bec718457bcbc5ababdf69eac48db88a40
-
SHA512
5742b268c1f0e23efcd959a6e7a9af86418e2ec953890bf5bc48cfb188839b903ba1658b9a8681b6a0a0cd4b710493da862d3b359e1bd1146174a643d74e446b
-
SSDEEP
6144:txA/BD/qHWdl5EFJSsOkuNg051iH6wNTGN9pzuvJgr:txA/Vj5EFElhV5+hBK3zuvir
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 46493b50f0fe2e9acaecceda4be9124f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 46493b50f0fe2e9acaecceda4be9124f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 46493b50f0fe2e9acaecceda4be9124f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 46493b50f0fe2e9acaecceda4be9124f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 46493b50f0fe2e9acaecceda4be9124f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 46493b50f0fe2e9acaecceda4be9124f.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" 46493b50f0fe2e9acaecceda4be9124f.exe -
Disables Task Manager via registry modification
-
resource yara_rule behavioral1/memory/2336-5-0x0000000001D70000-0x0000000002DFE000-memory.dmp upx behavioral1/memory/2336-23-0x0000000001D70000-0x0000000002DFE000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 46493b50f0fe2e9acaecceda4be9124f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 46493b50f0fe2e9acaecceda4be9124f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc 46493b50f0fe2e9acaecceda4be9124f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 46493b50f0fe2e9acaecceda4be9124f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 46493b50f0fe2e9acaecceda4be9124f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 46493b50f0fe2e9acaecceda4be9124f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 46493b50f0fe2e9acaecceda4be9124f.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2336 set thread context of 2360 2336 46493b50f0fe2e9acaecceda4be9124f.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2360 46493b50f0fe2e9acaecceda4be9124f.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2360 2336 46493b50f0fe2e9acaecceda4be9124f.exe 28 PID 2336 wrote to memory of 2360 2336 46493b50f0fe2e9acaecceda4be9124f.exe 28 PID 2336 wrote to memory of 2360 2336 46493b50f0fe2e9acaecceda4be9124f.exe 28 PID 2336 wrote to memory of 2360 2336 46493b50f0fe2e9acaecceda4be9124f.exe 28 PID 2336 wrote to memory of 2360 2336 46493b50f0fe2e9acaecceda4be9124f.exe 28 PID 2336 wrote to memory of 2360 2336 46493b50f0fe2e9acaecceda4be9124f.exe 28 PID 2336 wrote to memory of 2360 2336 46493b50f0fe2e9acaecceda4be9124f.exe 28 PID 2336 wrote to memory of 2360 2336 46493b50f0fe2e9acaecceda4be9124f.exe 28 PID 2360 wrote to memory of 1212 2360 46493b50f0fe2e9acaecceda4be9124f.exe 17 PID 2360 wrote to memory of 1212 2360 46493b50f0fe2e9acaecceda4be9124f.exe 17 PID 2360 wrote to memory of 1212 2360 46493b50f0fe2e9acaecceda4be9124f.exe 17 PID 2360 wrote to memory of 1212 2360 46493b50f0fe2e9acaecceda4be9124f.exe 17 PID 2360 wrote to memory of 1212 2360 46493b50f0fe2e9acaecceda4be9124f.exe 17
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\46493b50f0fe2e9acaecceda4be9124f.exe"C:\Users\Admin\AppData\Local\Temp\46493b50f0fe2e9acaecceda4be9124f.exe"2⤵
- Windows security bypass
- Disables RegEdit via registry modification
- Windows security modification
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\46493b50f0fe2e9acaecceda4be9124f.exe"C:\Users\Admin\AppData\Local\Temp\46493b50f0fe2e9acaecceda4be9124f.exe" C:\Users\Admin\AppData\Local\Temp\46493b50f0fe2e9acaecceda4be9124f.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2360
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
246KB
MD5e2f52ebe8885cedcae7e33c9920f8d3d
SHA1f317e98b755755b1cdfc830ec98642ffbd66e59b
SHA256ba973c60d0c9440045d8077682ddf295d8286eb98ecb5ced66ac50be111d9ddf
SHA512d6b2a93c948005b608c92aa2a26877a1d9b3ab4b09cb936a35fd0732b57dd12c5579dc6bbc6beb08ffc437994236a9e5a3c3600ebd368efa57aef6c0ce433de6