Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 01:18
Static task
static1
Behavioral task
behavioral1
Sample
09d48d118e3724762be02a64ac913819.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
09d48d118e3724762be02a64ac913819.exe
Resource
win10v2004-20231222-en
General
-
Target
09d48d118e3724762be02a64ac913819.exe
-
Size
1.1MB
-
MD5
09d48d118e3724762be02a64ac913819
-
SHA1
2b5e917b33f29c3a68c6542e71c63da9e961259f
-
SHA256
148789a478f10cc53d806721d966a2ec673410ba512bed62481b4032c65ce302
-
SHA512
32863a1bfa84598206a1649c7aa5c090345875e1628665c3905907fd88ee5d9cf4f78ac55b802c45a8d9e0897966e02c508277367fcb530d54b9db1ec24cabae
-
SSDEEP
24576:WWvknOMEfCZx/j//oo4dOvuUX2ytPTRMdTd8xEfNZPypg5+N:WUeOMmyx/Twl0GKsTdn1yA+N
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2672 Setup.exe -
Loads dropped DLL 4 IoCs
pid Process 1728 09d48d118e3724762be02a64ac913819.exe 2672 Setup.exe 2672 Setup.exe 2672 Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Setup.exe = "0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND Setup.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS\Setup.exe = "1" Setup.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN Setup.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main Setup.exe Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_DISABLE_NAVIGATION_SOUNDS Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_SECURITYBAND\Setup.exe = "0" Setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2672 1728 09d48d118e3724762be02a64ac913819.exe 28 PID 1728 wrote to memory of 2672 1728 09d48d118e3724762be02a64ac913819.exe 28 PID 1728 wrote to memory of 2672 1728 09d48d118e3724762be02a64ac913819.exe 28 PID 1728 wrote to memory of 2672 1728 09d48d118e3724762be02a64ac913819.exe 28 PID 1728 wrote to memory of 2672 1728 09d48d118e3724762be02a64ac913819.exe 28 PID 1728 wrote to memory of 2672 1728 09d48d118e3724762be02a64ac913819.exe 28 PID 1728 wrote to memory of 2672 1728 09d48d118e3724762be02a64ac913819.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\09d48d118e3724762be02a64ac913819.exe"C:\Users\Admin\AppData\Local\Temp\09d48d118e3724762be02a64ac913819.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\a249OQQZK4\B48jbqvl\Setup.exeC:\Users\Admin\AppData\Local\Temp\a249OQQZK4\B48jbqvl\Setup.exe --relaunch2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies Internet Explorer settings
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD509d48d118e3724762be02a64ac913819
SHA12b5e917b33f29c3a68c6542e71c63da9e961259f
SHA256148789a478f10cc53d806721d966a2ec673410ba512bed62481b4032c65ce302
SHA51232863a1bfa84598206a1649c7aa5c090345875e1628665c3905907fd88ee5d9cf4f78ac55b802c45a8d9e0897966e02c508277367fcb530d54b9db1ec24cabae