Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 02:29

General

  • Target

    247f965412d63d354bef7362057fec0f.exe

  • Size

    177KB

  • MD5

    247f965412d63d354bef7362057fec0f

  • SHA1

    b1402e2b60c28585b2e331ee8cda9c3c2fbc1ff6

  • SHA256

    c6e9d25141b540090680698130a801987321f1ef29fa10fbbcf50fd640380f0f

  • SHA512

    e10b9b80db2e5c5922a1afa387dc102dbc226f925b1cbb6db8a1a328cf301c36b31fc025ff0d462f11c50dea6c17ba53bf82e0ed124bc6268b203782d3b43b13

  • SSDEEP

    3072:ORB7Hs/19xRSY6H53Y2+6Ul5+TQUpWDE/qg1DunsEgCMFSIm28WkBA:OaRSdH53Y2nQYHs4XasEghFSI98g

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in System32 directory 6 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Kills process with taskkill 3 IoCs
  • Modifies registry class 45 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\247f965412d63d354bef7362057fec0f.exe
    "C:\Users\Admin\AppData\Local\Temp\247f965412d63d354bef7362057fec0f.exe"
    1⤵
    • Drops startup file
    • Installs/modifies Browser Helper Object
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2720
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill.exe /im iResearchiClick.exe /f
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2628
    • C:\Users\Admin\AppData\Local\Temp\247f965412d63d354bef7362057fec0f.exe
      C:\Users\Admin\AppData\Local\Temp\247f965412d63d354bef7362057fec0f.exe
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:2324
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill.exe /im internat.exe /f
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2664
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill.exe /im internat.exe /f
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2940
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32.exe win32.dll /s
      2⤵
      • Loads dropped DLL
      • Modifies registry class
      PID:2552
    • C:\Windows\SysWOW64\regedit.exe
      regedit /s C:\1.reg
      2⤵
      • Adds Run key to start application
      • Runs .reg file with regedit
      PID:2224

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\1.reg

    Filesize

    173B

    MD5

    132519462eabd6f910fa0ea9484a5460

    SHA1

    d4c995ccca314898acfce542245299735d5ab0fc

    SHA256

    7440736c8b540442a672db6b211b1b41e358a8383fec9135cae6fd76e2103108

    SHA512

    2d4aa9a12f083bfc54db59137041e05091cc797c2ec5844f0a26ad5294f14dc3670ba9c58f3739f5b0466b292a55d7be31efc7ede6d6dedd4f5dd9a1261aadb8

  • C:\Program Files\Wintows Publtny\services.exe.txt

    Filesize

    177KB

    MD5

    883ac7135634266a9ec7dfcc6b315750

    SHA1

    46233bcc6d7dd69e87a6b4e23e7eb5be266705ad

    SHA256

    f9dd2f8c28980161e252c981d05bce3c715c469b7e2853301759c53d1cc6b520

    SHA512

    b1f55266fac30e12bcf39d5c50278556da2b4dad3c39207e607bafeb8984b5927d4284ed955b846b8b57ffb48d59d1eb0f499562a54cf072a4a5250ceca4a3b1

  • C:\Windows\SysWOW64\win32.dll

    Filesize

    24KB

    MD5

    23907e6a40471b9b69418dca9024bc28

    SHA1

    4fc47c091485b6e8fb3f59ce3b71bf116491cc02

    SHA256

    a7ed49b72b689a4a1f150c125677acb5a2bdd63df49ecf12ef59da5877dc5256

    SHA512

    4967f626fcec5cd34c36a77841a63c15d2e2632f56708f078d0d8e8d3e0bccfcc00f7239c4249975aef4f9513b240ac3acd20805b42d669b341d39fdb9c0921b