Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 03:23
Behavioral task
behavioral1
Sample
0cd93dec5db32a18f796b7d7e127b051.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0cd93dec5db32a18f796b7d7e127b051.exe
Resource
win10v2004-20231215-en
General
-
Target
0cd93dec5db32a18f796b7d7e127b051.exe
-
Size
71KB
-
MD5
0cd93dec5db32a18f796b7d7e127b051
-
SHA1
3d4b90d02f0435498edf5b1c8c0d37b4534850ed
-
SHA256
d880f67d0ea30bc1e96a21220be6626213ec4aeb65c4f6659056d555db37143c
-
SHA512
521b94fca00b7f68bd18df9a762d1f8e74e3f0ec8a0730367ddc26e603be292333393ccd78c4aeecec70ef752d574b8daa6fca9cee69e8b72d39bb05c94a647a
-
SSDEEP
1536:YwceqPmRNa4B1sD8na7+ntsJF5hcIP9qh0wFwzTb:YteqPedB1M8na+tsv5Zlg6Tb
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\system.exe" system.exe -
Modifies firewall policy service 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List system.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\system.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\system.exe:*:Enabled:system.exe" system.exe -
Executes dropped EXE 1 IoCs
pid Process 2800 system.exe -
Loads dropped DLL 2 IoCs
pid Process 2536 cmd.exe 2536 cmd.exe -
resource yara_rule behavioral1/memory/952-1-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/952-2-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/952-5-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/952-6-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/files/0x000a000000013a71-13.dat upx behavioral1/memory/2800-16-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2800-21-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2800-20-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/952-10-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2800-22-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2800-28-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2800-29-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2800-30-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/2800-33-0x0000000000400000-0x0000000000451000-memory.dmp upx -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 952 wrote to memory of 2988 952 0cd93dec5db32a18f796b7d7e127b051.exe 31 PID 952 wrote to memory of 2988 952 0cd93dec5db32a18f796b7d7e127b051.exe 31 PID 952 wrote to memory of 2988 952 0cd93dec5db32a18f796b7d7e127b051.exe 31 PID 952 wrote to memory of 2988 952 0cd93dec5db32a18f796b7d7e127b051.exe 31 PID 952 wrote to memory of 2936 952 0cd93dec5db32a18f796b7d7e127b051.exe 30 PID 952 wrote to memory of 2936 952 0cd93dec5db32a18f796b7d7e127b051.exe 30 PID 952 wrote to memory of 2936 952 0cd93dec5db32a18f796b7d7e127b051.exe 30 PID 952 wrote to memory of 2936 952 0cd93dec5db32a18f796b7d7e127b051.exe 30 PID 952 wrote to memory of 2536 952 0cd93dec5db32a18f796b7d7e127b051.exe 34 PID 952 wrote to memory of 2536 952 0cd93dec5db32a18f796b7d7e127b051.exe 34 PID 952 wrote to memory of 2536 952 0cd93dec5db32a18f796b7d7e127b051.exe 34 PID 952 wrote to memory of 2536 952 0cd93dec5db32a18f796b7d7e127b051.exe 34 PID 2536 wrote to memory of 2800 2536 cmd.exe 33 PID 2536 wrote to memory of 2800 2536 cmd.exe 33 PID 2536 wrote to memory of 2800 2536 cmd.exe 33 PID 2536 wrote to memory of 2800 2536 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cd93dec5db32a18f796b7d7e127b051.exe"C:\Users\Admin\AppData\Local\Temp\0cd93dec5db32a18f796b7d7e127b051.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\cmd.execmd /c copy "C:\Users\Admin\AppData\Local\Temp\0cd93dec5db32a18f796b7d7e127b051.exe" "C:\Users\Admin\AppData\Local\Temp\system.exe"2⤵PID:2936
-
-
C:\Windows\SysWOW64\cmd.execmd /c if exist "C:\Users\Admin\AppData\Local\Temp\system.exe" ren "C:\Users\Admin\AppData\Local\Temp\system.exe" "0870.bak"2⤵PID:2988
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\system.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2536
-
-
C:\Users\Admin\AppData\Local\Temp\system.exeC:\Users\Admin\AppData\Local\Temp\system.exe1⤵
- Modifies WinLogon for persistence
- Modifies firewall policy service
- Executes dropped EXE
PID:2800
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD50cd93dec5db32a18f796b7d7e127b051
SHA13d4b90d02f0435498edf5b1c8c0d37b4534850ed
SHA256d880f67d0ea30bc1e96a21220be6626213ec4aeb65c4f6659056d555db37143c
SHA512521b94fca00b7f68bd18df9a762d1f8e74e3f0ec8a0730367ddc26e603be292333393ccd78c4aeecec70ef752d574b8daa6fca9cee69e8b72d39bb05c94a647a