Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 21:10
Static task
static1
Behavioral task
behavioral1
Sample
04185736c245fa94c62b4bb31528caff.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
04185736c245fa94c62b4bb31528caff.exe
Resource
win10v2004-20231215-en
General
-
Target
04185736c245fa94c62b4bb31528caff.exe
-
Size
658KB
-
MD5
04185736c245fa94c62b4bb31528caff
-
SHA1
cee2b3a3dd38d8c570ce3f781ea36a9f066680dd
-
SHA256
d18a7c5dc32f830b0c6e9124f8ff5629843ddb74ae1ccecdf3a470974716096f
-
SHA512
5acc676e9d7e0d15c3fcc6d31a0bc89f5d4166b803cca7c15ed151858485d8444f66cbd0ffe30b671b485a458a8d11d0aaab4636ea0310ffa4f96d8b6b692aa4
-
SSDEEP
12288:C6eeHVx4www0DhZirPmLtdIrCQRvRMDF3Z4mxxuDqVTVOCOMlwZ4R:CJeHHww01Eh8QmX9VTz/Uw
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2800 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2300 windows.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat windows.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\windows.exe 04185736c245fa94c62b4bb31528caff.exe File created C:\Windows\DELME.BAT 04185736c245fa94c62b4bb31528caff.exe File created C:\Windows\windows.exe 04185736c245fa94c62b4bb31528caff.exe -
Modifies data under HKEY_USERS 28 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 windows.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1C691FFA-DBFA-4A9B-BB53-BB82737E1147}\12-a0-b2-48-c4-8e windows.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\12-a0-b2-48-c4-8e\WpadDecisionTime = b0c9ee97d93ada01 windows.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\12-a0-b2-48-c4-8e\WpadDecision = "0" windows.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1C691FFA-DBFA-4A9B-BB53-BB82737E1147} windows.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" windows.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" windows.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 windows.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad windows.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ windows.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\12-a0-b2-48-c4-8e\WpadDecisionTime = 10de97e3d93ada01 windows.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" windows.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\12-a0-b2-48-c4-8e\WpadDetectedUrl windows.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections windows.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1C691FFA-DBFA-4A9B-BB53-BB82737E1147}\WpadDecisionReason = "1" windows.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\12-a0-b2-48-c4-8e windows.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix windows.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00d1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 windows.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1C691FFA-DBFA-4A9B-BB53-BB82737E1147}\WpadDecisionTime = 10de97e3d93ada01 windows.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings windows.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1C691FFA-DBFA-4A9B-BB53-BB82737E1147}\WpadDecisionTime = b0c9ee97d93ada01 windows.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1C691FFA-DBFA-4A9B-BB53-BB82737E1147}\WpadDecision = "0" windows.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{1C691FFA-DBFA-4A9B-BB53-BB82737E1147}\WpadNetworkName = "Network 3" windows.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" windows.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings windows.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" windows.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00d1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 windows.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\12-a0-b2-48-c4-8e\WpadDecisionReason = "1" windows.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2912 04185736c245fa94c62b4bb31528caff.exe Token: SeDebugPrivilege 2300 windows.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2300 windows.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2800 2912 04185736c245fa94c62b4bb31528caff.exe 30 PID 2912 wrote to memory of 2800 2912 04185736c245fa94c62b4bb31528caff.exe 30 PID 2912 wrote to memory of 2800 2912 04185736c245fa94c62b4bb31528caff.exe 30 PID 2912 wrote to memory of 2800 2912 04185736c245fa94c62b4bb31528caff.exe 30 PID 2300 wrote to memory of 2864 2300 windows.exe 31 PID 2300 wrote to memory of 2864 2300 windows.exe 31 PID 2300 wrote to memory of 2864 2300 windows.exe 31 PID 2300 wrote to memory of 2864 2300 windows.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\04185736c245fa94c62b4bb31528caff.exe"C:\Users\Admin\AppData\Local\Temp\04185736c245fa94c62b4bb31528caff.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\DELME.BAT2⤵
- Deletes itself
PID:2800
-
-
C:\Windows\windows.exeC:\Windows\windows.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2864
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
190B
MD5a0b1bb18ca06c64e6b2742f878a0fc25
SHA10df70fb448cc0332ec9e9812b6d7fd588bbadc3a
SHA2564baea608c625c89572922b6bb9d64c83782d5aaa0e11258bad3818d4164db258
SHA5124003e7402a551fd06b1b9370d90e34107ec057c8f833a51c27a50827b35bb94c7037728a28846a883711c5ed6aaec049ebc96dd0be6c0927280ff2f97f3fdbe9
-
Filesize
658KB
MD504185736c245fa94c62b4bb31528caff
SHA1cee2b3a3dd38d8c570ce3f781ea36a9f066680dd
SHA256d18a7c5dc32f830b0c6e9124f8ff5629843ddb74ae1ccecdf3a470974716096f
SHA5125acc676e9d7e0d15c3fcc6d31a0bc89f5d4166b803cca7c15ed151858485d8444f66cbd0ffe30b671b485a458a8d11d0aaab4636ea0310ffa4f96d8b6b692aa4