Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 09:36
Behavioral task
behavioral1
Sample
14a71c96d0ddc18deb564f491b5aa2ef.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
14a71c96d0ddc18deb564f491b5aa2ef.exe
Resource
win10v2004-20231215-en
General
-
Target
14a71c96d0ddc18deb564f491b5aa2ef.exe
-
Size
412KB
-
MD5
14a71c96d0ddc18deb564f491b5aa2ef
-
SHA1
c05f5cf0034706728fdb7bd96050b78b599d1d7a
-
SHA256
3a6838ef59315244eaf37fcaf323b8c6e333b93642f9e8ced46c24503b917aad
-
SHA512
bcc81c45dd377f10c8bb505cdf0e1efeb261cdc9935c49ba2e32e4f9c063362f4e167d638684279dca5b104c8abe4ee7c40ab04f91f5f97a76ad096af3a099a3
-
SSDEEP
12288:shIj6W6nGbmuUqsz0KPxKhMdXnBnYxlBPdO4kspViMzdZ:shjQmuUqswKJzdqw4keJZ
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "1" 14a71c96d0ddc18deb564f491b5aa2ef.exe -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\WINDOWS\system32\drivers\etc\hosts 14a71c96d0ddc18deb564f491b5aa2ef.exe File created C:\WINDOWS\system32\drivers\etc\hosts 14a71c96d0ddc18deb564f491b5aa2ef.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: 14a71c96d0ddc18deb564f491b5aa2ef.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\msscp.reg 14a71c96d0ddc18deb564f491b5aa2ef.exe File opened for modification C:\Windows\SysWOW64\msscp.reg 14a71c96d0ddc18deb564f491b5aa2ef.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Common Files\System\taobao.ico 14a71c96d0ddc18deb564f491b5aa2ef.exe File opened for modification C:\Program Files\Common Files\System\taobao.ico 14a71c96d0ddc18deb564f491b5aa2ef.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\web\Index.htm 14a71c96d0ddc18deb564f491b5aa2ef.exe File opened for modification C:\Windows\web\Index.html 14a71c96d0ddc18deb564f491b5aa2ef.exe File created C:\Windows\web\Index.htm 14a71c96d0ddc18deb564f491b5aa2ef.exe File created C:\Windows\web\Index.html 14a71c96d0ddc18deb564f491b5aa2ef.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\TYPEDURLS 14a71c96d0ddc18deb564f491b5aa2ef.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.hao136.net" 14a71c96d0ddc18deb564f491b5aa2ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Start Page = "http://www.hao136.net" 14a71c96d0ddc18deb564f491b5aa2ef.exe -
Modifies registry class 53 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42} 14a71c96d0ddc18deb564f491b5aa2ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\DefaultIcon\ = "C:\\Program Files (x86)\\Common Files\\System\\taobao.ico" 14a71c96d0ddc18deb564f491b5aa2ef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\Shell\ɾ³ý(&D) 14a71c96d0ddc18deb564f491b5aa2ef.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Play2a\10 = "0" 14a71c96d0ddc18deb564f491b5aa2ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\Shell\ÖØÃüÃû(&M)\Command\ = "Rundll32.exe" 14a71c96d0ddc18deb564f491b5aa2ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\Shell\ÖØÃüÃû(&M)\Command\ = "Rundll32.exe" 14a71c96d0ddc18deb564f491b5aa2ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\ShellFolder\HideFolderVerbs 14a71c96d0ddc18deb564f491b5aa2ef.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Play2a\cdafile2 = "201451" 14a71c96d0ddc18deb564f491b5aa2ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\ShellFolder\HideOnDesktopPerUser 14a71c96d0ddc18deb564f491b5aa2ef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\DefaultIcon 14a71c96d0ddc18deb564f491b5aa2ef.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Play2a\10 = "1" 14a71c96d0ddc18deb564f491b5aa2ef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\Shell\ÖØÃüÃû(&M) 14a71c96d0ddc18deb564f491b5aa2ef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\Shell\Open(&O)\Command 14a71c96d0ddc18deb564f491b5aa2ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\Shell\Open(&O)\ = "´ò¿ªÖ÷Ò³(&H)" 14a71c96d0ddc18deb564f491b5aa2ef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\ShellFolder 14a71c96d0ddc18deb564f491b5aa2ef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43} 14a71c96d0ddc18deb564f491b5aa2ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\ShellFolder\HideFolderVerbs 14a71c96d0ddc18deb564f491b5aa2ef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\Shell\ɾ³ý(&D) 14a71c96d0ddc18deb564f491b5aa2ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\Shell\Open(&O)\Command\ = "iexplore.exe C:\\WINDOWS\\Web\\index.html" 14a71c96d0ddc18deb564f491b5aa2ef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\Shell\Open(&O) 14a71c96d0ddc18deb564f491b5aa2ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\Shell\Open(&O)\ = "´ò¿ªÌÔ±¦Íø(&T)" 14a71c96d0ddc18deb564f491b5aa2ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\ = "Internet Explorer" 14a71c96d0ddc18deb564f491b5aa2ef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\Shell 14a71c96d0ddc18deb564f491b5aa2ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\Shell\ɾ³ý(&D)\Command\ = "Rundll32.exe" 14a71c96d0ddc18deb564f491b5aa2ef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\Shell\Open(&O) 14a71c96d0ddc18deb564f491b5aa2ef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\Shell 14a71c96d0ddc18deb564f491b5aa2ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\Shell\ɾ³ý(&D)\Command\ = "Rundll32.exe" 14a71c96d0ddc18deb564f491b5aa2ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\Shell\Open(&O)\Command\ = "iexplore.exe C:\\WINDOWS\\Web\\index.htm" 14a71c96d0ddc18deb564f491b5aa2ef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\DefaultIcon 14a71c96d0ddc18deb564f491b5aa2ef.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\ShellFolder\Attributes = "0" 14a71c96d0ddc18deb564f491b5aa2ef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\Shell\ÖØÃüÃû(&M)\Command 14a71c96d0ddc18deb564f491b5aa2ef.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Play2a\1 = "20240101" 14a71c96d0ddc18deb564f491b5aa2ef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node 14a71c96d0ddc18deb564f491b5aa2ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\Shell\ÊôÐÔ(&R)\Command\ = "Rundll32.exe Shell32.dll,Control_RunDLL Inetcpl.cpl" 14a71c96d0ddc18deb564f491b5aa2ef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\Shell\ÊôÐÔ(&R) 14a71c96d0ddc18deb564f491b5aa2ef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\Shell\ÖØÃüÃû(&M) 14a71c96d0ddc18deb564f491b5aa2ef.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\ShellFolder\Attributes = "0" 14a71c96d0ddc18deb564f491b5aa2ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\ShellFolder\WantsParseDisplayName 14a71c96d0ddc18deb564f491b5aa2ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\ShellFolder\HideOnDesktopPerUser 14a71c96d0ddc18deb564f491b5aa2ef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\Shell\ÊôÐÔ(&R) 14a71c96d0ddc18deb564f491b5aa2ef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\ShellFolder 14a71c96d0ddc18deb564f491b5aa2ef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Play2a 14a71c96d0ddc18deb564f491b5aa2ef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 14a71c96d0ddc18deb564f491b5aa2ef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\Shell\ɾ³ý(&D)\Command 14a71c96d0ddc18deb564f491b5aa2ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\ = "ÌÔ±¦Íø£¡" 14a71c96d0ddc18deb564f491b5aa2ef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\Shell\ÊôÐÔ(&R)\Command 14a71c96d0ddc18deb564f491b5aa2ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\DefaultIcon\ = "C:\\Program Files (x86)\\Internet Explorer\\IEXPLORE.EXE" 14a71c96d0ddc18deb564f491b5aa2ef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\Shell\ÊôÐÔ(&R)\Command 14a71c96d0ddc18deb564f491b5aa2ef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\Shell\ÖØÃüÃû(&M)\Command 14a71c96d0ddc18deb564f491b5aa2ef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\Shell\ɾ³ý(&D)\Command 14a71c96d0ddc18deb564f491b5aa2ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD42}\ShellFolder\WantsParseDisplayName 14a71c96d0ddc18deb564f491b5aa2ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\Shell\ÊôÐÔ(&R)\Command\ = "Rundll32.exe Shell32.dll,Control_RunDLL Inetcpl.cpl" 14a71c96d0ddc18deb564f491b5aa2ef.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{F3CA57DF-C5DA-11CF-8F28-00AA0060FD43}\Shell\Open(&O)\Command 14a71c96d0ddc18deb564f491b5aa2ef.exe -
Runs .reg file with regedit 2 IoCs
pid Process 2512 regedit.exe 2516 regedit.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2512 2212 14a71c96d0ddc18deb564f491b5aa2ef.exe 28 PID 2212 wrote to memory of 2512 2212 14a71c96d0ddc18deb564f491b5aa2ef.exe 28 PID 2212 wrote to memory of 2512 2212 14a71c96d0ddc18deb564f491b5aa2ef.exe 28 PID 2212 wrote to memory of 2512 2212 14a71c96d0ddc18deb564f491b5aa2ef.exe 28 PID 2212 wrote to memory of 2180 2212 14a71c96d0ddc18deb564f491b5aa2ef.exe 29 PID 2212 wrote to memory of 2180 2212 14a71c96d0ddc18deb564f491b5aa2ef.exe 29 PID 2212 wrote to memory of 2180 2212 14a71c96d0ddc18deb564f491b5aa2ef.exe 29 PID 2212 wrote to memory of 2180 2212 14a71c96d0ddc18deb564f491b5aa2ef.exe 29 PID 2180 wrote to memory of 2516 2180 14a71c96d0ddc18deb564f491b5aa2ef.exe 30 PID 2180 wrote to memory of 2516 2180 14a71c96d0ddc18deb564f491b5aa2ef.exe 30 PID 2180 wrote to memory of 2516 2180 14a71c96d0ddc18deb564f491b5aa2ef.exe 30 PID 2180 wrote to memory of 2516 2180 14a71c96d0ddc18deb564f491b5aa2ef.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\14a71c96d0ddc18deb564f491b5aa2ef.exe"C:\Users\Admin\AppData\Local\Temp\14a71c96d0ddc18deb564f491b5aa2ef.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Drops file in Drivers directory
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\regedit.exeC:\Windows\regedit.exe /S C:\Windows\system32\msscp.reg2⤵
- Runs .reg file with regedit
PID:2512
-
-
C:\Users\Admin\AppData\Local\Temp\14a71c96d0ddc18deb564f491b5aa2ef.exeC:\Users\Admin\AppData\Local\Temp\14a71c96d0ddc18deb564f491b5aa2ef.exe2⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\regedit.exeC:\Windows\regedit.exe /S C:\Windows\system32\msscp.reg3⤵
- Runs .reg file with regedit
PID:2516
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5468fada123f5548ac87e57bae81f6782
SHA1edb8f012c25906e6afd8bf335b495e16c440243d
SHA256091c882bb307d57f2c7c42309e7ba8740130fef8c3ed772b0bc5e5505e37034d
SHA512635ec26c88c2394dd4f2a81b9aea8f429a91adfeb37ae34e51b03f3cf8e503c123c3685938f40cea07d6146e0c7113aadbe62fa528f1f6d8b995e617fd68a4aa
-
Filesize
3KB
MD5b4cf009b0a57d8c23b460876d9116ab6
SHA161d7eb9a0c5c503eedd5c5d6f7ee7181e3baacbe
SHA256578c941cc443f4002f01cecb90035c1f3d42fc350a4ed8fed94405d40580699a
SHA5121bdcabf7227637327311af21fd3716ddcc9410eb69ae60030a5fa253d47f3c8d87490cd50c3c9443c1a925b79fe9121ca6762b0433fe8dbdb1087777dccd51b9
-
Filesize
228B
MD52d06a424ad1c7611ea9caad93892ea26
SHA1a901e15c2ecea498f1ca8ffc5d5c32bd3f0169d8
SHA2568c19027357bcb3170b6844aec44cd4c143c7b795d5df52ff89426615010f715c
SHA5123199dffce9d7625d9e01d7a06c912d3629e5f3d98d3935763df6b323807d46f24a40876d78d5ae7f7ac83c90e498e7c4810d88993904dbca1036e8c06833ccdf