Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 21:48
Static task
static1
Behavioral task
behavioral1
Sample
04d4326343cdf1d4baef0f88aee6dce8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
04d4326343cdf1d4baef0f88aee6dce8.exe
Resource
win10v2004-20231215-en
General
-
Target
04d4326343cdf1d4baef0f88aee6dce8.exe
-
Size
13KB
-
MD5
04d4326343cdf1d4baef0f88aee6dce8
-
SHA1
427d54e74f33b594ccf789145044e87cf7325492
-
SHA256
609e27656ad00574815d2a355cf429da58e082ff6ba245e74e06335a4113ea14
-
SHA512
a1233dff180afe52e8fc65d21b42ef9b1d97a98e8206bfe4183e85051b635e5956ce70355fd93abb7ca7caebdfdc9b27277ef8919a9ba9c7bb6a7e276d7158bb
-
SSDEEP
384:FtTdZjseIebeqoM6Jw3toQTgQBi88+wYzLY:7bfLFoM76QTf4BYvY
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\explorer\run issearch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\issearch.exe = "issearch.exe" issearch.exe -
Deletes itself 1 IoCs
pid Process 2748 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2088 issearch.exe -
Loads dropped DLL 3 IoCs
pid Process 2376 04d4326343cdf1d4baef0f88aee6dce8.exe 2376 04d4326343cdf1d4baef0f88aee6dce8.exe 2088 issearch.exe -
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{a43385f0-7113-496d-96d7-b9b550e3fcca} issearch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{a43385f0-7113-496d-96d7-b9b550e3fcca}\ issearch.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects issearch.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\issearch.exe 04d4326343cdf1d4baef0f88aee6dce8.exe File created C:\Windows\SysWOW64\ixt0.dll issearch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Main issearch.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\SearchUrl issearch.exe Key created \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Microsoft\Internet Explorer\Search issearch.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{a43385f0-7113-496d-96d7-b9b550e3fcca} issearch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{a43385f0-7113-496d-96d7-b9b550e3fcca}\ issearch.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID\{a43385f0-7113-496d-96d7-b9b550e3fcca}\InprocServer32 issearch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{a43385f0-7113-496d-96d7-b9b550e3fcca}\InprocServer32\ = "C:\\Windows\\SysWow64\\ixt0.dll" issearch.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{a43385f0-7113-496d-96d7-b9b550e3fcca}\InprocServer32\ThreadingModel = "Apartment" issearch.exe Key created \REGISTRY\MACHINE\Software\Classes\Wow6432Node\CLSID issearch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2376 04d4326343cdf1d4baef0f88aee6dce8.exe 2376 04d4326343cdf1d4baef0f88aee6dce8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2376 04d4326343cdf1d4baef0f88aee6dce8.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2376 04d4326343cdf1d4baef0f88aee6dce8.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2088 2376 04d4326343cdf1d4baef0f88aee6dce8.exe 21 PID 2376 wrote to memory of 2088 2376 04d4326343cdf1d4baef0f88aee6dce8.exe 21 PID 2376 wrote to memory of 2088 2376 04d4326343cdf1d4baef0f88aee6dce8.exe 21 PID 2376 wrote to memory of 2088 2376 04d4326343cdf1d4baef0f88aee6dce8.exe 21 PID 2376 wrote to memory of 2748 2376 04d4326343cdf1d4baef0f88aee6dce8.exe 19 PID 2376 wrote to memory of 2748 2376 04d4326343cdf1d4baef0f88aee6dce8.exe 19 PID 2376 wrote to memory of 2748 2376 04d4326343cdf1d4baef0f88aee6dce8.exe 19 PID 2376 wrote to memory of 2748 2376 04d4326343cdf1d4baef0f88aee6dce8.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\04d4326343cdf1d4baef0f88aee6dce8.exe"C:\Users\Admin\AppData\Local\Temp\04d4326343cdf1d4baef0f88aee6dce8.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\04D432~1.EXE > nul2⤵
- Deletes itself
PID:2748
-
-
C:\Windows\SysWOW64\issearch.exeC:\Windows\system32\issearch.exe2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
PID:2088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5fc7b0c097f584c0090b7dd5b8ec59934
SHA1faa106f33bcb592fb876e4d44a3b481827aeea4b
SHA256dacc6f71bd1c3069fba75abfcaac97359aa949a92d4bf92119a19d38242a0623
SHA5121c159073ef7d5f8f220a2eb4bdc072aff8db2941a7cde854828f5cabb526fbe0ae1d8fc5f35085c01101ecf3eebbd2d93c01e15b840cb459291742cc1d61eb94
-
Filesize
18KB
MD50164585125ce7417a90db7afa671536f
SHA174e24beea416fb9c0a23fd66102909b46110f03a
SHA256e11c7aafc30d9d0b5da7364058e7949150d8a0ab71e7f4c583ff64f81dd9206b
SHA512ad2636db623c4645bd1c86cf5f6a98f2403c51ba4a09468f3b573d9681f342c2a7ead0a37d5b5a6a349c45d5e143fe3037674be3190331d529bac65379b2314e