Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 18:23
Behavioral task
behavioral1
Sample
00595b92c767712ef810c43f6f2c5fc9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
00595b92c767712ef810c43f6f2c5fc9.exe
Resource
win10v2004-20231215-en
General
-
Target
00595b92c767712ef810c43f6f2c5fc9.exe
-
Size
26KB
-
MD5
00595b92c767712ef810c43f6f2c5fc9
-
SHA1
2f04f3cc34ff538b9546d8a4f980c0512913e207
-
SHA256
b937e5f7549b3e8636cb2e1cfd4fd3951cd659e1b402b9f11dc4f546a48be7ac
-
SHA512
387fbd2714bb45d87d1e355d44ad236b8f6c3551b66e31c53e98b432bf06971272a0016d1167fe94dc121191fa78a61f719cb897514d9e0d334656c80fa9d1a7
-
SSDEEP
384:9Vv7z9MWRO6xsTBuqi3nRuaiY/qSgOZH/Cv7XWdVXEywHRH9nXXK+FJtR:9lHWweo9RLTiLOZH/gXWd2fxH9nK+Ft
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x002a0000000165c9-8.dat acprotect -
Deletes itself 1 IoCs
pid Process 2228 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2252 00595b92c767712ef810c43f6f2c5fc9.exe -
resource yara_rule behavioral1/memory/2252-0-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/files/0x002a0000000165c9-8.dat upx behavioral1/memory/2252-10-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral1/memory/2252-11-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2252-12-0x0000000010000000-0x000000001000E000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\b1a18a3e.drv 00595b92c767712ef810c43f6f2c5fc9.exe File opened for modification C:\Windows\SysWOW64\4FBFD5A4.cfg 00595b92c767712ef810c43f6f2c5fc9.exe File opened for modification C:\Windows\SysWOW64\4FBFD5A4.dll 00595b92c767712ef810c43f6f2c5fc9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLsID\{4FBFD5A4-5FE8-4444-8BD9-FD0FAFA64F96}\InprocServer32 00595b92c767712ef810c43f6f2c5fc9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 00595b92c767712ef810c43f6f2c5fc9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLsID 00595b92c767712ef810c43f6f2c5fc9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4FBFD5A4-5FE8-4444-8BD9-FD0FAFA64F96} 00595b92c767712ef810c43f6f2c5fc9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4FBFD5A4-5FE8-4444-8BD9-FD0FAFA64F96}\InprocServer32 00595b92c767712ef810c43f6f2c5fc9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4FBFD5A4-5FE8-4444-8BD9-FD0FAFA64F96}\InprocServer32\ = "4FBFD5A4.dll" 00595b92c767712ef810c43f6f2c5fc9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{4FBFD5A4-5FE8-4444-8BD9-FD0FAFA64F96}\InprocServer32\ThreadingModel = "Apartment" 00595b92c767712ef810c43f6f2c5fc9.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2252 00595b92c767712ef810c43f6f2c5fc9.exe 2252 00595b92c767712ef810c43f6f2c5fc9.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 472 Process not Found 472 Process not Found -
Suspicious use of AdjustPrivilegeToken 55 IoCs
description pid Process Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe Token: SeDebugPrivilege 2252 00595b92c767712ef810c43f6f2c5fc9.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2252 00595b92c767712ef810c43f6f2c5fc9.exe 2252 00595b92c767712ef810c43f6f2c5fc9.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2252 00595b92c767712ef810c43f6f2c5fc9.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2228 2252 00595b92c767712ef810c43f6f2c5fc9.exe 28 PID 2252 wrote to memory of 2228 2252 00595b92c767712ef810c43f6f2c5fc9.exe 28 PID 2252 wrote to memory of 2228 2252 00595b92c767712ef810c43f6f2c5fc9.exe 28 PID 2252 wrote to memory of 2228 2252 00595b92c767712ef810c43f6f2c5fc9.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\00595b92c767712ef810c43f6f2c5fc9.exe"C:\Users\Admin\AppData\Local\Temp\00595b92c767712ef810c43f6f2c5fc9.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\00595B~1.EXE >> NUL2⤵
- Deletes itself
PID:2228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
214KB
MD5d1e778c1ab88c71d59cd030ca77d0706
SHA157615a317178661ea1ae786197186b652f4cb3b0
SHA25628cbfa031560a806587e52502d8d2042de681765143c020bf8bc814cd8618540
SHA512eb4a70bd5d3ee2210f1c0318d194ede80503a124bf8a8a0581bcc2fc7408d1b75af2d6e1fdc31d70bfafc4c3c184687cb684882d7187f0c8a4eddda58915ffbf