Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 00:28
Behavioral task
behavioral1
Sample
21b48351968b6204ff23156e75a750f4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
21b48351968b6204ff23156e75a750f4.exe
Resource
win10v2004-20231215-en
General
-
Target
21b48351968b6204ff23156e75a750f4.exe
-
Size
5.0MB
-
MD5
21b48351968b6204ff23156e75a750f4
-
SHA1
06dc472c06719b8c594d88e29032b702375e5a36
-
SHA256
ba26e3ef16727597c94dbd44a7e8c9bf20235fb89dc3ff7b903ede549b1344bb
-
SHA512
2e32875203010fb149eb4baa96dce90c2c47929fd8d71b73fccaeec8b25eb9708d4bdeedb709120fb21a1f77da41bb622586e7be16e3096eaa1cd957d8888c44
-
SSDEEP
98304:A+0Vk2PM/S0VNkd0WRJ4PZ13hvt+cCrLC7HWl4On9nMDdiOZdqyBPSz6GGHrMUoo:A+0GSMkd0Dhvt+gZmlb8dmO9v
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Uses Session Manager for persistence 2 TTPs 3 IoCs
Creates Session Manager registry key to run executable early in system boot.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SESSION MANAGER\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 reg.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SESSION MANAGER\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 reg.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Session Manager\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 reg.exe -
resource yara_rule behavioral1/memory/2280-4-0x0000000000400000-0x0000000001314000-memory.dmp themida behavioral1/memory/2280-37-0x0000000000400000-0x0000000001314000-memory.dmp themida behavioral1/memory/2280-38-0x0000000000400000-0x0000000001314000-memory.dmp themida behavioral1/memory/2280-41-0x0000000000400000-0x0000000001314000-memory.dmp themida behavioral1/memory/2280-42-0x0000000000400000-0x0000000001314000-memory.dmp themida behavioral1/memory/2280-43-0x0000000000400000-0x0000000001314000-memory.dmp themida behavioral1/memory/2280-44-0x0000000000400000-0x0000000001314000-memory.dmp themida behavioral1/memory/2280-45-0x0000000000400000-0x0000000001314000-memory.dmp themida behavioral1/memory/2280-46-0x0000000000400000-0x0000000001314000-memory.dmp themida behavioral1/memory/2280-47-0x0000000000400000-0x0000000001314000-memory.dmp themida behavioral1/memory/2280-48-0x0000000000400000-0x0000000001314000-memory.dmp themida behavioral1/memory/2280-49-0x0000000000400000-0x0000000001314000-memory.dmp themida behavioral1/memory/2280-50-0x0000000000400000-0x0000000001314000-memory.dmp themida behavioral1/memory/2280-51-0x0000000000400000-0x0000000001314000-memory.dmp themida behavioral1/memory/2280-52-0x0000000000400000-0x0000000001314000-memory.dmp themida behavioral1/memory/2280-53-0x0000000000400000-0x0000000001314000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows32 = "C:\\Arquivos de programas\\Windows32.exe" 21b48351968b6204ff23156e75a750f4.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\reg_0035.txt 21b48351968b6204ff23156e75a750f4.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2688 sc.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2760 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2280 21b48351968b6204ff23156e75a750f4.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2280 21b48351968b6204ff23156e75a750f4.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2760 2280 21b48351968b6204ff23156e75a750f4.exe 28 PID 2280 wrote to memory of 2760 2280 21b48351968b6204ff23156e75a750f4.exe 28 PID 2280 wrote to memory of 2760 2280 21b48351968b6204ff23156e75a750f4.exe 28 PID 2280 wrote to memory of 2760 2280 21b48351968b6204ff23156e75a750f4.exe 28 PID 2280 wrote to memory of 2688 2280 21b48351968b6204ff23156e75a750f4.exe 30 PID 2280 wrote to memory of 2688 2280 21b48351968b6204ff23156e75a750f4.exe 30 PID 2280 wrote to memory of 2688 2280 21b48351968b6204ff23156e75a750f4.exe 30 PID 2280 wrote to memory of 2688 2280 21b48351968b6204ff23156e75a750f4.exe 30 PID 2280 wrote to memory of 2428 2280 21b48351968b6204ff23156e75a750f4.exe 32 PID 2280 wrote to memory of 2428 2280 21b48351968b6204ff23156e75a750f4.exe 32 PID 2280 wrote to memory of 2428 2280 21b48351968b6204ff23156e75a750f4.exe 32 PID 2280 wrote to memory of 2428 2280 21b48351968b6204ff23156e75a750f4.exe 32 PID 2280 wrote to memory of 2828 2280 21b48351968b6204ff23156e75a750f4.exe 33 PID 2280 wrote to memory of 2828 2280 21b48351968b6204ff23156e75a750f4.exe 33 PID 2280 wrote to memory of 2828 2280 21b48351968b6204ff23156e75a750f4.exe 33 PID 2280 wrote to memory of 2828 2280 21b48351968b6204ff23156e75a750f4.exe 33 PID 2280 wrote to memory of 2596 2280 21b48351968b6204ff23156e75a750f4.exe 35 PID 2280 wrote to memory of 2596 2280 21b48351968b6204ff23156e75a750f4.exe 35 PID 2280 wrote to memory of 2596 2280 21b48351968b6204ff23156e75a750f4.exe 35 PID 2280 wrote to memory of 2596 2280 21b48351968b6204ff23156e75a750f4.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\21b48351968b6204ff23156e75a750f4.exe"C:\Users\Admin\AppData\Local\Temp\21b48351968b6204ff23156e75a750f4.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn startt /tr c:\autoexec.bat /sc onstart /ru system2⤵
- Creates scheduled task(s)
PID:2760
-
-
C:\Windows\SysWOW64\sc.exesc delete GbpSv2⤵
- Launches sc.exe
PID:2688
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\ControlSet001\Control\Session manager" /v BootExecute /t REG_MULTI_SZ /d "autocheck autochk *" /f2⤵
- Uses Session Manager for persistence
PID:2428
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\ControlSet002\Control\Session manager" /v BootExecute /t REG_MULTI_SZ /d "autocheck autochk *" /f2⤵
- Uses Session Manager for persistence
PID:2828
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Control\Session manager" /v BootExecute /t REG_MULTI_SZ /d "autocheck autochk *" /f2⤵
- Uses Session Manager for persistence
PID:2596
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1