Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 00:56
Static task
static1
Behavioral task
behavioral1
Sample
093c8d7a05d6cef96c2a141a092d72a2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
093c8d7a05d6cef96c2a141a092d72a2.exe
Resource
win10v2004-20231222-en
General
-
Target
093c8d7a05d6cef96c2a141a092d72a2.exe
-
Size
568KB
-
MD5
093c8d7a05d6cef96c2a141a092d72a2
-
SHA1
b2007fd3d8dec75a0ffa2b295f36abea2f15924e
-
SHA256
b1ea47624509fd8032bcc3ea7b65b92eccd7d61b845ea910fa71bdb2beadf8cb
-
SHA512
6e600f4701348087682ecd0740cc51e57747f418eec561c8f84c12ab60ad3ed4481ed1ae235e9d989a407e53a4410fa7f2db4fba2f2adbb416f6f68a140ba075
-
SSDEEP
12288:Y3BVzPnECvCm8jU3uyoaF3Z4mxxAcVYLqagaRrS0oV:YbzfEHBjq9JQmXrVYl6V
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2708 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2400 exploer.exe 2692 exploer.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat exploer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2400 set thread context of 2692 2400 exploer.exe 30 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\exploer.exe 093c8d7a05d6cef96c2a141a092d72a2.exe File opened for modification C:\Windows\exploer.exe 093c8d7a05d6cef96c2a141a092d72a2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 14 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached exploer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{920E6DB1-9907-4370-B3A0-BAFC03D81399} {0C6C4200-C589-11D0-999A-00C04FD655E1} 0xFFFF = 0100000000000000b097c30d7a3bda01 exploer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{08244EE6-92F0-47F2-9FC9-929BAA2E7235} {0C6C4200-C589-11D0-999A-00C04FD655E1} 0xFFFF = 0100000000000000d0bbca0d7a3bda01 exploer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 exploer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings exploer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{D9144DCD-E998-4ECA-AB6A-DCD83CCBA16D} {0C6C4200-C589-11D0-999A-00C04FD655E1} 0xFFFF = 01000000000000005036c10d7a3bda01 exploer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{AB5C5600-7E6E-4B06-9197-9ECEF74D31CC} {0C6C4200-C589-11D0-999A-00C04FD655E1} 0xFFFF = 0100000000000000b097c30d7a3bda01 exploer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{16F3DD56-1AF5-4347-846D-7C10C4192619} {0C6C4200-C589-11D0-999A-00C04FD655E1} 0xFFFF = 010000000000000010f9c50d7a3bda01 exploer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{2916C86E-86A6-43FE-8112-43ABE6BF8DCC} {0C6C4200-C589-11D0-999A-00C04FD655E1} 0xFFFF = 0100000000000000705ac80d7a3bda01 exploer.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings exploer.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" exploer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 exploer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{99FD978C-D287-4F50-827F-B2C658EDA8E7} {0C6C4200-C589-11D0-999A-00C04FD655E1} 0xFFFF = 01000000000000005036c10d7a3bda01 exploer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections exploer.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2692 exploer.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2708 1900 093c8d7a05d6cef96c2a141a092d72a2.exe 29 PID 1900 wrote to memory of 2708 1900 093c8d7a05d6cef96c2a141a092d72a2.exe 29 PID 1900 wrote to memory of 2708 1900 093c8d7a05d6cef96c2a141a092d72a2.exe 29 PID 1900 wrote to memory of 2708 1900 093c8d7a05d6cef96c2a141a092d72a2.exe 29 PID 2400 wrote to memory of 2692 2400 exploer.exe 30 PID 2400 wrote to memory of 2692 2400 exploer.exe 30 PID 2400 wrote to memory of 2692 2400 exploer.exe 30 PID 2400 wrote to memory of 2692 2400 exploer.exe 30 PID 2400 wrote to memory of 2692 2400 exploer.exe 30 PID 2400 wrote to memory of 2692 2400 exploer.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\093c8d7a05d6cef96c2a141a092d72a2.exe"C:\Users\Admin\AppData\Local\Temp\093c8d7a05d6cef96c2a141a092d72a2.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\7838.bat2⤵
- Deletes itself
PID:2708
-
-
C:\Windows\exploer.exeC:\Windows\exploer.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\exploer.exe"C:\Windows\exploer.exe" 545452⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198B
MD5ad0bcfb87d89005944a492e598d998f5
SHA1f7cda004847c004e349af1f9fdaa13ae8cc2a347
SHA25646d518672a7f2c68a0f8a52f55ee48d7565adee5ded28a06922179ce8609efa1
SHA512bfbb4b2ea6d7b2d1be83401496d9b16e50df56ba047bd4e282968881147bfeb430de34c1387dfbb1095bf4ea8ebc5f51d0f5e267a306f05484a853e6868e07ee
-
Filesize
568KB
MD5093c8d7a05d6cef96c2a141a092d72a2
SHA1b2007fd3d8dec75a0ffa2b295f36abea2f15924e
SHA256b1ea47624509fd8032bcc3ea7b65b92eccd7d61b845ea910fa71bdb2beadf8cb
SHA5126e600f4701348087682ecd0740cc51e57747f418eec561c8f84c12ab60ad3ed4481ed1ae235e9d989a407e53a4410fa7f2db4fba2f2adbb416f6f68a140ba075