Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 09:44
Static task
static1
Behavioral task
behavioral1
Sample
14d94b9e3107b726cf14ea686420210c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
14d94b9e3107b726cf14ea686420210c.exe
Resource
win10v2004-20231222-en
General
-
Target
14d94b9e3107b726cf14ea686420210c.exe
-
Size
836KB
-
MD5
14d94b9e3107b726cf14ea686420210c
-
SHA1
6f458076e34fd6ba779fef033274cbdc81268411
-
SHA256
24df9e16089f20d2c3388a5decff09143930a28fb9b14abd165ef8c2389749d6
-
SHA512
1881064e4d76ede52451e1d6406d27dc88c6a2d9658a72bb32506bbcf20454df5cce75921c9c489907394ff61ecefa9666cb85420695e16f0a2b6535a1bb3b07
-
SSDEEP
24576:rjh+EbVcvgbdEnDiDxPnLmEKZhZ4KkX3b:rF+ERcvnilPnCEKW3b
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\LGHWW1I5PL.exe = "C:\\Users\\Admin\\AppData\\Roaming\\LGHWW1I5PL.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\vbc.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\vbc.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe -
Executes dropped EXE 1 IoCs
pid Process 2368 vbc.exe -
Loads dropped DLL 1 IoCs
pid Process 2672 14d94b9e3107b726cf14ea686420210c.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Local\\Temp\\14d94b9e3107b726cf14ea686420210c.exe" 14d94b9e3107b726cf14ea686420210c.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2672 set thread context of 2368 2672 14d94b9e3107b726cf14ea686420210c.exe 28 -
Modifies registry key 1 TTPs 4 IoCs
pid Process 2588 reg.exe 2600 reg.exe 2608 reg.exe 2828 reg.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: 1 2368 vbc.exe Token: SeCreateTokenPrivilege 2368 vbc.exe Token: SeAssignPrimaryTokenPrivilege 2368 vbc.exe Token: SeLockMemoryPrivilege 2368 vbc.exe Token: SeIncreaseQuotaPrivilege 2368 vbc.exe Token: SeMachineAccountPrivilege 2368 vbc.exe Token: SeTcbPrivilege 2368 vbc.exe Token: SeSecurityPrivilege 2368 vbc.exe Token: SeTakeOwnershipPrivilege 2368 vbc.exe Token: SeLoadDriverPrivilege 2368 vbc.exe Token: SeSystemProfilePrivilege 2368 vbc.exe Token: SeSystemtimePrivilege 2368 vbc.exe Token: SeProfSingleProcessPrivilege 2368 vbc.exe Token: SeIncBasePriorityPrivilege 2368 vbc.exe Token: SeCreatePagefilePrivilege 2368 vbc.exe Token: SeCreatePermanentPrivilege 2368 vbc.exe Token: SeBackupPrivilege 2368 vbc.exe Token: SeRestorePrivilege 2368 vbc.exe Token: SeShutdownPrivilege 2368 vbc.exe Token: SeDebugPrivilege 2368 vbc.exe Token: SeAuditPrivilege 2368 vbc.exe Token: SeSystemEnvironmentPrivilege 2368 vbc.exe Token: SeChangeNotifyPrivilege 2368 vbc.exe Token: SeRemoteShutdownPrivilege 2368 vbc.exe Token: SeUndockPrivilege 2368 vbc.exe Token: SeSyncAgentPrivilege 2368 vbc.exe Token: SeEnableDelegationPrivilege 2368 vbc.exe Token: SeManageVolumePrivilege 2368 vbc.exe Token: SeImpersonatePrivilege 2368 vbc.exe Token: SeCreateGlobalPrivilege 2368 vbc.exe Token: 31 2368 vbc.exe Token: 32 2368 vbc.exe Token: 33 2368 vbc.exe Token: 34 2368 vbc.exe Token: 35 2368 vbc.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2368 vbc.exe 2368 vbc.exe 2368 vbc.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2368 2672 14d94b9e3107b726cf14ea686420210c.exe 28 PID 2672 wrote to memory of 2368 2672 14d94b9e3107b726cf14ea686420210c.exe 28 PID 2672 wrote to memory of 2368 2672 14d94b9e3107b726cf14ea686420210c.exe 28 PID 2672 wrote to memory of 2368 2672 14d94b9e3107b726cf14ea686420210c.exe 28 PID 2672 wrote to memory of 2368 2672 14d94b9e3107b726cf14ea686420210c.exe 28 PID 2672 wrote to memory of 2368 2672 14d94b9e3107b726cf14ea686420210c.exe 28 PID 2672 wrote to memory of 2368 2672 14d94b9e3107b726cf14ea686420210c.exe 28 PID 2672 wrote to memory of 2368 2672 14d94b9e3107b726cf14ea686420210c.exe 28 PID 2368 wrote to memory of 2596 2368 vbc.exe 29 PID 2368 wrote to memory of 2596 2368 vbc.exe 29 PID 2368 wrote to memory of 2596 2368 vbc.exe 29 PID 2368 wrote to memory of 2596 2368 vbc.exe 29 PID 2368 wrote to memory of 2348 2368 vbc.exe 40 PID 2368 wrote to memory of 2348 2368 vbc.exe 40 PID 2368 wrote to memory of 2348 2368 vbc.exe 40 PID 2368 wrote to memory of 2348 2368 vbc.exe 40 PID 2368 wrote to memory of 2900 2368 vbc.exe 38 PID 2368 wrote to memory of 2900 2368 vbc.exe 38 PID 2368 wrote to memory of 2900 2368 vbc.exe 38 PID 2368 wrote to memory of 2900 2368 vbc.exe 38 PID 2368 wrote to memory of 2904 2368 vbc.exe 36 PID 2368 wrote to memory of 2904 2368 vbc.exe 36 PID 2368 wrote to memory of 2904 2368 vbc.exe 36 PID 2368 wrote to memory of 2904 2368 vbc.exe 36 PID 2904 wrote to memory of 2608 2904 cmd.exe 34 PID 2904 wrote to memory of 2608 2904 cmd.exe 34 PID 2904 wrote to memory of 2608 2904 cmd.exe 34 PID 2904 wrote to memory of 2608 2904 cmd.exe 34 PID 2348 wrote to memory of 2600 2348 cmd.exe 33 PID 2348 wrote to memory of 2600 2348 cmd.exe 33 PID 2348 wrote to memory of 2600 2348 cmd.exe 33 PID 2348 wrote to memory of 2600 2348 cmd.exe 33 PID 2900 wrote to memory of 2588 2900 cmd.exe 32 PID 2900 wrote to memory of 2588 2900 cmd.exe 32 PID 2900 wrote to memory of 2588 2900 cmd.exe 32 PID 2900 wrote to memory of 2588 2900 cmd.exe 32 PID 2596 wrote to memory of 2828 2596 cmd.exe 35 PID 2596 wrote to memory of 2828 2596 cmd.exe 35 PID 2596 wrote to memory of 2828 2596 cmd.exe 35 PID 2596 wrote to memory of 2828 2596 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\14d94b9e3107b726cf14ea686420210c.exe"C:\Users\Admin\AppData\Local\Temp\14d94b9e3107b726cf14ea686420210c.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\vbc.exeC:\Users\Admin\AppData\Local\Temp\vbc.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- Modifies registry key
PID:2828
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\LGHWW1I5PL.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\LGHWW1I5PL.exe:*:Enabled:Windows Messanger" /f3⤵
- Suspicious use of WriteProcessMemory
PID:2904
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Suspicious use of WriteProcessMemory
PID:2900
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\vbc.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\vbc.exe:*:Enabled:Windows Messanger" /f3⤵
- Suspicious use of WriteProcessMemory
PID:2348
-
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f1⤵
- Modifies firewall policy service
- Modifies registry key
PID:2588
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\vbc.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\vbc.exe:*:Enabled:Windows Messanger" /f1⤵
- Modifies firewall policy service
- Modifies registry key
PID:2600
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\LGHWW1I5PL.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\LGHWW1I5PL.exe:*:Enabled:Windows Messanger" /f1⤵
- Modifies firewall policy service
- Modifies registry key
PID:2608
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248KB
MD5b880d81910afe93772da63c4d898bd6c
SHA1d197172b3870858eea7cb1cdf216c823c8fd10fe
SHA2562b17398bad5936e58e68dbdeca1131d23cbcd6f2f39221ef79174032da4fc572
SHA51259b28945e3dc5eefef5ab25f0b4bc1aae35ee3cbc60a3485387442023b59a78803adec05efcf95d0ce7781d7e8deddf14805f001982df1b4f4c5347d26cded9c
-
Filesize
122KB
MD59d6e572f692b24509bab4ac5641b5426
SHA1a264186aac8282a65d05606876bef94df0b83a11
SHA256d1ed149816a23816c316a8ad00a498a4a3cb9e14657a82989dfc04de03b5d7eb
SHA5124d6950721d224bd3686ac13c11198b350f9c048db134495a61587a0a792d5dd4ac0cf965ae4526d14fc7d31424862ea9238437416935d55efa61db90fc55acf2
-
Filesize
34KB
MD57884d60545b7711bb2beabc0122be952
SHA1924dd2c0259a2553d9bc401577cfd0102d81ea9e
SHA256ae430e6197fafddf41a7ada3c8c9d5a53617666a99e2f195083bd600ea1b99cf
SHA5124cfca252df1d73eb466461e52299418d7e18883ae7d14fb10dd513686870850c482f711aee929068431cf7d49ad2e34a73636d3122dbb13ed560014a44f5eff5
-
Filesize
200KB
MD543b37f1f1c3c10eb4f5b353944a1a067
SHA176f673e2b1bfb06dcb6db9f91fd5a82ac1f5d352
SHA256ed90d2eebead9b46a1911a372eeb87e15bd0b0b68acdeab527b546f21fd52815
SHA5123e2c8841695c91152871e4aa46ee1b75dddf0271a4bfc66b402751c8fa9700454aa6cdd043b6813a4266efb988b9ee6da8b35e5cfe022c91073f9eeee0dcb630