Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 21:48
Static task
static1
Behavioral task
behavioral1
Sample
1d8b98f417340d9b399a5f9f9944b2e3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1d8b98f417340d9b399a5f9f9944b2e3.exe
Resource
win10v2004-20231215-en
General
-
Target
1d8b98f417340d9b399a5f9f9944b2e3.exe
-
Size
744KB
-
MD5
1d8b98f417340d9b399a5f9f9944b2e3
-
SHA1
19e4f629d735ac04504510b3a2d6124e654bf883
-
SHA256
6bf32a69e43c97be65994a8f24b369eaa85d7f9d194d92cfaad35a9f37bab8ff
-
SHA512
7247b16bbce7038ec7ee2313cd6356f1da0a8c31cfaa40dde53bddd67fee681b2db2aa334901f7b34898bd42fccd1d7b404f2bdfd6ce01a2106c270786a1d9c4
-
SSDEEP
12288:vfyDxDV00lo3Oxp88Cy1bFKkEgjRFa92VvABc4czAM6CZdUs:nuxC0lwOxp8K1xNVK2VvAPWOw
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe" dllhost.exe -
Sets file execution options in registry 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "2162.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "7356.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "3056.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "0085.PIF" dllhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "7230.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "6340.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "8820.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "8883.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "0412.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "6806.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "2817.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\regedit.exe\Debugger = "setuprs1.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "4401.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "2022.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "4375.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "7444.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "5101.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "2436.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "8062.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "7466.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "3326.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "3226.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "3243.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "5550.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "8301.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "1808.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "4310.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "4627.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "8411.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "2222.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "3382.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "8857.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "8415.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe\Debugger = "setuprs1.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "4385.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "3102.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "2016.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "7271.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "0742.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "0810.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "3885.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "1440.PIF" dllhost.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe 1d8b98f417340d9b399a5f9f9944b2e3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "7338.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "1852.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "6240.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "0675.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "2374.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "7820.PIF" dllhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cmd.exe dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "7447.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "0634.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "4064.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "0512.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "0550.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "0485.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "4031.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "8304.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "8348.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "3101.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "5081.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "8125.PIF" dllhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe\Debugger = "2672.PIF" dllhost.exe -
Deletes itself 1 IoCs
pid Process 2896 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1804 dllhost.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\o: dllhost.exe File opened (read-only) \??\j: dllhost.exe File opened (read-only) \??\e: dllhost.exe File opened (read-only) \??\k: dllhost.exe File opened (read-only) \??\y: dllhost.exe File opened (read-only) \??\v: dllhost.exe File opened (read-only) \??\t: dllhost.exe File opened (read-only) \??\s: dllhost.exe File opened (read-only) \??\r: dllhost.exe File opened (read-only) \??\p: dllhost.exe File opened (read-only) \??\l: dllhost.exe File opened (read-only) \??\q: dllhost.exe File opened (read-only) \??\m: dllhost.exe File opened (read-only) \??\i: dllhost.exe File opened (read-only) \??\h: dllhost.exe File opened (read-only) \??\g: dllhost.exe File opened (read-only) \??\z: dllhost.exe File opened (read-only) \??\x: dllhost.exe File opened (read-only) \??\w: dllhost.exe File opened (read-only) \??\u: dllhost.exe File opened (read-only) \??\n: dllhost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat dllhost.exe File created C:\Windows\SysWOW64\Deleteme.bat 1d8b98f417340d9b399a5f9f9944b2e3.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\setuprs1.PIF 1d8b98f417340d9b399a5f9f9944b2e3.exe File created C:\Windows\1860.txt 1d8b98f417340d9b399a5f9f9944b2e3.exe File opened for modification C:\Windows\1860.txt 1d8b98f417340d9b399a5f9f9944b2e3.exe File opened for modification C:\Windows\setuprs1.PIF dllhost.exe File created C:\Windows\setuprs1.PIF dllhost.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings dllhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections dllhost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 dllhost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings dllhost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" dllhost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 dllhost.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2548 1d8b98f417340d9b399a5f9f9944b2e3.exe 2548 1d8b98f417340d9b399a5f9f9944b2e3.exe 1804 dllhost.exe 1804 dllhost.exe 1804 dllhost.exe 1804 dllhost.exe 1804 dllhost.exe 1804 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2548 1d8b98f417340d9b399a5f9f9944b2e3.exe Token: SeDebugPrivilege 1804 dllhost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2896 2548 1d8b98f417340d9b399a5f9f9944b2e3.exe 29 PID 2548 wrote to memory of 2896 2548 1d8b98f417340d9b399a5f9f9944b2e3.exe 29 PID 2548 wrote to memory of 2896 2548 1d8b98f417340d9b399a5f9f9944b2e3.exe 29 PID 2548 wrote to memory of 2896 2548 1d8b98f417340d9b399a5f9f9944b2e3.exe 29 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDriveTypeAutoRun = "149" 1d8b98f417340d9b399a5f9f9944b2e3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d8b98f417340d9b399a5f9f9944b2e3.exe"C:\Users\Admin\AppData\Local\Temp\1d8b98f417340d9b399a5f9f9944b2e3.exe"1⤵
- Sets file execution options in registry
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2548 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\Deleteme.bat2⤵
- Deletes itself
PID:2896
-
-
C:\Windows\dllhost.exeC:\Windows\dllhost.exe -netsvcs1⤵
- Modifies WinLogon for persistence
- Sets file execution options in registry
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1804
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184B
MD56bb8216f32cb533653e2e534150495af
SHA18b26355e76a119576dd9e4a132415c89b603bdc6
SHA2563d3ed5dc44a6e0bd924b4bd464ed97246d36fad65430711724f16ecb7d006286
SHA512fee2856b66600ce714ad236abaf4bc17bf17e430933030aecefd25e3d19dd0d2dd7025b15e2b137143c8a0f65862b139383cf088f6bd19b55134bdf11930b8e1
-
Filesize
744KB
MD51d8b98f417340d9b399a5f9f9944b2e3
SHA119e4f629d735ac04504510b3a2d6124e654bf883
SHA2566bf32a69e43c97be65994a8f24b369eaa85d7f9d194d92cfaad35a9f37bab8ff
SHA5127247b16bbce7038ec7ee2313cd6356f1da0a8c31cfaa40dde53bddd67fee681b2db2aa334901f7b34898bd42fccd1d7b404f2bdfd6ce01a2106c270786a1d9c4
-
Filesize
186B
MD5388cdce38219e26795c8df2e4b9a8a4c
SHA10e72b83417eab223464533d1b749d4bd8a6caa13
SHA25629eecdb0b3889f3fd97795e770d38455e8af0ca84119dda8e009a123aa527d9b
SHA5128912302845a77e2d19d0306acdefa1bd55666004eb6240f1d47fceef2ebccf1102fceaf5564de89499106ee03514e6c9ffb82805faaf54be0a9e5f304be0b5b7