Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 14:43
Static task
static1
Behavioral task
behavioral1
Sample
767735c8c772038e7d89fdd442513170.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
767735c8c772038e7d89fdd442513170.exe
Resource
win10v2004-20231215-en
General
-
Target
767735c8c772038e7d89fdd442513170.exe
-
Size
294KB
-
MD5
767735c8c772038e7d89fdd442513170
-
SHA1
51d31eadcc515633d625393b734c72a07f1eeb67
-
SHA256
0ab3347233ca85e26d6d65d5a1ae47b6f109bd46aef2589a7b67bc55dc6c3148
-
SHA512
05f1b64cff4e21d783df0f887e7156041403be5ea63f459dd01674ba6fefcda6cceaa4540f3091089a2ac4ca54d648730a718765df5413928a44b3e9dd866846
-
SSDEEP
6144:cdYgxDPu6luzMm2mBiXS6S9JSelDyX2UFLstcAyXRU0ODDoL:tgxDPuQuLTKSH9flD74sK60ODDoL
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2768 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2972 767735c8c772038e7d89fdd442513170.tmp -
Loads dropped DLL 3 IoCs
pid Process 2276 767735c8c772038e7d89fdd442513170.exe 2972 767735c8c772038e7d89fdd442513170.tmp 2972 767735c8c772038e7d89fdd442513170.tmp -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Progra~1\TaoBao\is-B315V.tmp 767735c8c772038e7d89fdd442513170.tmp -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main regedit.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.hae123.com" regedit.exe -
Runs regedit.exe 1 IoCs
pid Process 2756 regedit.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2972 767735c8c772038e7d89fdd442513170.tmp -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2972 2276 767735c8c772038e7d89fdd442513170.exe 28 PID 2276 wrote to memory of 2972 2276 767735c8c772038e7d89fdd442513170.exe 28 PID 2276 wrote to memory of 2972 2276 767735c8c772038e7d89fdd442513170.exe 28 PID 2276 wrote to memory of 2972 2276 767735c8c772038e7d89fdd442513170.exe 28 PID 2972 wrote to memory of 2756 2972 767735c8c772038e7d89fdd442513170.tmp 29 PID 2972 wrote to memory of 2756 2972 767735c8c772038e7d89fdd442513170.tmp 29 PID 2972 wrote to memory of 2756 2972 767735c8c772038e7d89fdd442513170.tmp 29 PID 2972 wrote to memory of 2756 2972 767735c8c772038e7d89fdd442513170.tmp 29 PID 2972 wrote to memory of 2768 2972 767735c8c772038e7d89fdd442513170.tmp 30 PID 2972 wrote to memory of 2768 2972 767735c8c772038e7d89fdd442513170.tmp 30 PID 2972 wrote to memory of 2768 2972 767735c8c772038e7d89fdd442513170.tmp 30 PID 2972 wrote to memory of 2768 2972 767735c8c772038e7d89fdd442513170.tmp 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\767735c8c772038e7d89fdd442513170.exe"C:\Users\Admin\AppData\Local\Temp\767735c8c772038e7d89fdd442513170.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\is-6263R.tmp\767735c8c772038e7d89fdd442513170.tmp"C:\Users\Admin\AppData\Local\Temp\is-6263R.tmp\767735c8c772038e7d89fdd442513170.tmp" /SL5="$70122,51900,51712,C:\Users\Admin\AppData\Local\Temp\767735c8c772038e7d89fdd442513170.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\regedit.exe"C:\Windows\Regedit.exe" -s C:\Progra~1\TaoBao\info.desc3⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Runs regedit.exe
PID:2756
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\767735c8c772038e7d89fdd442513170.exe"3⤵
- Deletes itself
PID:2768
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280B
MD5a0fd44bf16c285a195d371ba2404dc0a
SHA11880991f3f49d2f35e86ce2575d7535517a10f28
SHA256686ea1ff46449d5412e6454ca7329a6f03e777714e35d502640c61ac16849613
SHA5123477a190eda4b3fd79319ebeab24c3a62cdaffeb4d58f65488713f23e370f8a906365985dad5a8bd39a5d2e047c6f1da40af1d952cb3899c9809a32fb03b970a
-
Filesize
706KB
MD51a6c2b578c69b9388e22d38afa16a7fb
SHA1186370d5438b1f5f3d75891aa8412e8edd00981c
SHA25686ac18632bfdca026df9fe12a1d4df2de64bbdc1d2d7e42d2dcbf7809cbbebb3
SHA512fb868c629cd0255b7620c9260bb5712b6622f53f0b7de3d6125c295e02d16f03584ce3a90eccb02b65ce9825885aa1bca5f68c7cc09dc0c09e7c208fcef54714
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3