Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 12:17
Static task
static1
Behavioral task
behavioral1
Sample
6dde0ef221978abe0a4dc088dc5dde52.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6dde0ef221978abe0a4dc088dc5dde52.exe
Resource
win10v2004-20231215-en
General
-
Target
6dde0ef221978abe0a4dc088dc5dde52.exe
-
Size
53KB
-
MD5
6dde0ef221978abe0a4dc088dc5dde52
-
SHA1
cdbe09c9922f34c1f77d29abdf2e83c7704afef7
-
SHA256
f00e4480a92e46fa7a38dcd06c03ba54ddbe61b0edbe5ac303c0eed6453b0f41
-
SHA512
3e17623cb8efbf312f0e480136a27aeefb7d6e87f66c91269296a0b9a38c1f4e06e7019d87570f732524fb7961c8c29e374fc1ee6e404e67ceaf18dcfb3664e4
-
SSDEEP
1536:Yk8s7JfjsCwzvEymEWc94qxdRHdno858c5Fgs0:YkTJfjsCw7FWujxDdnE
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\o4251227.exe\"" 6dde0ef221978abe0a4dc088dc5dde52.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\j6251222.exe" 6dde0ef221978abe0a4dc088dc5dde52.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 6dde0ef221978abe0a4dc088dc5dde52.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 6dde0ef221978abe0a4dc088dc5dde52.exe -
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\N3948c = "\"C:\\Windows\\_default25122.pif\"" 6dde0ef221978abe0a4dc088dc5dde52.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\run 6dde0ef221978abe0a4dc088dc5dde52.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\f1464Adm = "\"C:\\Users\\Admin\\AppData\\Local\\dv692700x\\yesbron.com\"" 6dde0ef221978abe0a4dc088dc5dde52.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run 6dde0ef221978abe0a4dc088dc5dde52.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 6dde0ef221978abe0a4dc088dc5dde52.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\f1464Adm = "\"C:\\Windows\\system32\\s4827\\zh59927084y.exe\"" 6dde0ef221978abe0a4dc088dc5dde52.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\N3948c = "\"C:\\Windows\\j6251222.exe\"" 6dde0ef221978abe0a4dc088dc5dde52.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\s4827\zh59927084y.exe 6dde0ef221978abe0a4dc088dc5dde52.exe File created C:\Windows\SysWOW64\s4827\zh59927084y.exe 6dde0ef221978abe0a4dc088dc5dde52.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll 6dde0ef221978abe0a4dc088dc5dde52.exe File opened for modification C:\Windows\SysWOW64\s4827 6dde0ef221978abe0a4dc088dc5dde52.exe File opened for modification C:\Windows\SysWOW64\s4827\smss.exe 6dde0ef221978abe0a4dc088dc5dde52.exe File created C:\Windows\SysWOW64\s4827\smss.exe 6dde0ef221978abe0a4dc088dc5dde52.exe File opened for modification C:\Windows\SysWOW64\c_25122k.com 6dde0ef221978abe0a4dc088dc5dde52.exe File created C:\Windows\SysWOW64\c_25122k.com 6dde0ef221978abe0a4dc088dc5dde52.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\j6251222.exe 6dde0ef221978abe0a4dc088dc5dde52.exe File created C:\Windows\j6251222.exe 6dde0ef221978abe0a4dc088dc5dde52.exe File opened for modification C:\Windows\o4251227.exe 6dde0ef221978abe0a4dc088dc5dde52.exe File created C:\Windows\o4251227.exe 6dde0ef221978abe0a4dc088dc5dde52.exe File opened for modification C:\Windows\_default25122.pif 6dde0ef221978abe0a4dc088dc5dde52.exe File created C:\Windows\_default25122.pif 6dde0ef221978abe0a4dc088dc5dde52.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Discovers systems in the same network 1 TTPs 2 IoCs
pid Process 2136 net.exe 2608 net.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6dde0ef221978abe0a4dc088dc5dde52.exe"C:\Users\Admin\AppData\Local\Temp\6dde0ef221978abe0a4dc088dc5dde52.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Adds policy Run key to start application
- Disables RegEdit via registry modification
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
PID:1404 -
C:\Windows\SysWOW64\s4827\smss.exe"C:\Windows\system32\s4827\smss.exe" ~Brontok~Log~2⤵PID:2164
-
-
C:\Windows\SysWOW64\s4827\winlogon.exe"C:\Windows\system32\s4827\winlogon.exe" ~Brontok~Is~The~Best~1⤵PID:2720
-
C:\Windows\SysWOW64\s4827\services.exe"C:\Windows\system32\s4827\services.exe" ~Brontok~Serv~2⤵PID:2752
-
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe" /delete /y2⤵PID:708
-
-
C:\Windows\SysWOW64\s4827\m4623.exe"C:\Windows\system32\s4827\m4623.exe" ~Brontok~Back~Log~2⤵PID:2988
-
-
C:\Windows\Ad10218\qm4623.exe"C:\Windows\Ad10218\qm4623.exe" ~Brontok~Back~Log~2⤵PID:1792
-
-
C:\Windows\SysWOW64\s4827\lsass.exe"C:\Windows\system32\s4827\lsass.exe" ~Brontok~Network~2⤵PID:2804
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net view /domain > "C:\Windows\system32\s4827\domlist.txt"3⤵PID:1424
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Windows\system32\s4827\brdom.bat" "3⤵PID:2692
-
C:\Windows\SysWOW64\net.exenet view /domain:WORKGROUP4⤵
- Discovers systems in the same network
PID:2608
-
-
-
-
C:\Windows\SysWOW64\s4827\csrss.exe"C:\Windows\system32\s4827\csrss.exe" ~Brontok~SpreadMail~2⤵PID:1664
-
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe" 17:08 /every:M,T,W,Th,F,S,Su "C:\Users\Admin\AppData\Local\jalak-93927015-bali.com"2⤵PID:1960
-
-
C:\Windows\SysWOW64\at.exe"C:\Windows\System32\at.exe" 11:03 /every:M,T,W,Th,F,S,Su "C:\Users\Admin\AppData\Local\jalak-93927015-bali.com"2⤵PID:1632
-
-
C:\Windows\SysWOW64\net.exenet view /domain1⤵
- Discovers systems in the same network
PID:2136
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
53KB
MD56dde0ef221978abe0a4dc088dc5dde52
SHA1cdbe09c9922f34c1f77d29abdf2e83c7704afef7
SHA256f00e4480a92e46fa7a38dcd06c03ba54ddbe61b0edbe5ac303c0eed6453b0f41
SHA5123e17623cb8efbf312f0e480136a27aeefb7d6e87f66c91269296a0b9a38c1f4e06e7019d87570f732524fb7961c8c29e374fc1ee6e404e67ceaf18dcfb3664e4