Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 02:29
Static task
static1
Behavioral task
behavioral1
Sample
247f965412d63d354bef7362057fec0f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
247f965412d63d354bef7362057fec0f.exe
Resource
win10v2004-20231215-en
General
-
Target
247f965412d63d354bef7362057fec0f.exe
-
Size
177KB
-
MD5
247f965412d63d354bef7362057fec0f
-
SHA1
b1402e2b60c28585b2e331ee8cda9c3c2fbc1ff6
-
SHA256
c6e9d25141b540090680698130a801987321f1ef29fa10fbbcf50fd640380f0f
-
SHA512
e10b9b80db2e5c5922a1afa387dc102dbc226f925b1cbb6db8a1a328cf301c36b31fc025ff0d462f11c50dea6c17ba53bf82e0ed124bc6268b203782d3b43b13
-
SSDEEP
3072:ORB7Hs/19xRSY6H53Y2+6Ul5+TQUpWDE/qg1DunsEgCMFSIm28WkBA:OaRSdH53Y2nQYHs4XasEghFSI98g
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\winr32_tgxx.vbs 247f965412d63d354bef7362057fec0f.exe -
Loads dropped DLL 1 IoCs
pid Process 2552 regsvr32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\windt32_ttny = "C:\\Program Files\\Wintows Publtny\\services.exe" regedit.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ 247f965412d63d354bef7362057fec0f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\ 247f965412d63d354bef7362057fec0f.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\2.txt 247f965412d63d354bef7362057fec0f.exe File created C:\Windows\SysWOW64\1.txt 247f965412d63d354bef7362057fec0f.exe File opened for modification C:\Windows\SysWOW64\1.txt 247f965412d63d354bef7362057fec0f.exe File opened for modification C:\Windows\SysWOW64\internat.exe.txt 247f965412d63d354bef7362057fec0f.exe File opened for modification C:\Windows\SysWOW64\internat.exe 247f965412d63d354bef7362057fec0f.exe File opened for modification C:\Windows\SysWOW64\win32.dll 247f965412d63d354bef7362057fec0f.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\Wintows Publtny\services.exe.txt 247f965412d63d354bef7362057fec0f.exe File opened for modification C:\Program Files\Wintows Publtny\services.exe 247f965412d63d354bef7362057fec0f.exe -
Kills process with taskkill 3 IoCs
pid Process 2628 taskkill.exe 2664 taskkill.exe 2940 taskkill.exe -
Modifies registry class 45 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{96B22363-745C-4AEE-A40D-4087CB79EBA9}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{96B22363-745C-4AEE-A40D-4087CB79EBA9}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{96B22363-745C-4AEE-A40D-4087CB79EBA9}\1.0\0\win32\ = "C:\\Windows\\SysWOW64\\win32.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E488DF21-EAAC-4BFB-8C4B-56AC567B40C0}\ = "_Class1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E488DF21-EAAC-4BFB-8C4B-56AC567B40C0}\TypeLib\ = "{96B22363-745C-4AEE-A40D-4087CB79EBA9}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B759577D-1179-4A92-B261-B852B1F5584F} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{96B22363-745C-4AEE-A40D-4087CB79EBA9}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{96B22363-745C-4AEE-A40D-4087CB79EBA9}\1.0\HELPDIR\ = "C:\\Windows\\SysWOW64" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E488DF21-EAAC-4BFB-8C4B-56AC567B40C0}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E488DF21-EAAC-4BFB-8C4B-56AC567B40C0}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B759577D-1179-4A92-B261-B852B1F5584F}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\wind32.Class1\Clsid\ = "{B759577D-1179-4A92-B261-B852B1F5584F}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E488DF21-EAAC-4BFB-8C4B-56AC567B40C0}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B759577D-1179-4A92-B261-B852B1F5584F}\ = "wind32.Class1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E488DF21-EAAC-4BFB-8C4B-56AC567B40C0}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B759577D-1179-4A92-B261-B852B1F5584F}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B759577D-1179-4A92-B261-B852B1F5584F}\TypeLib\ = "{96B22363-745C-4AEE-A40D-4087CB79EBA9}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E488DF21-EAAC-4BFB-8C4B-56AC567B40C0}\ProxyStubClsid\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{96B22363-745C-4AEE-A40D-4087CB79EBA9} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{96B22363-745C-4AEE-A40D-4087CB79EBA9}\1.0\ = "wind32" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{96B22363-745C-4AEE-A40D-4087CB79EBA9}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E488DF21-EAAC-4BFB-8C4B-56AC567B40C0}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B759577D-1179-4A92-B261-B852B1F5584F}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\wind32.Class1\ = "wind32.Class1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\wind32.Class1\Clsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B759577D-1179-4A92-B261-B852B1F5584F}\VERSION regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{96B22363-745C-4AEE-A40D-4087CB79EBA9}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E488DF21-EAAC-4BFB-8C4B-56AC567B40C0} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E488DF21-EAAC-4BFB-8C4B-56AC567B40C0}\ = "_Class1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E488DF21-EAAC-4BFB-8C4B-56AC567B40C0}\TypeLib\ = "{96B22363-745C-4AEE-A40D-4087CB79EBA9}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E488DF21-EAAC-4BFB-8C4B-56AC567B40C0}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E488DF21-EAAC-4BFB-8C4B-56AC567B40C0} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B759577D-1179-4A92-B261-B852B1F5584F}\ProgID\ = "wind32.Class1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B759577D-1179-4A92-B261-B852B1F5584F}\VERSION\ = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TYPELIB\{96B22363-745C-4AEE-A40D-4087CB79EBA9}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E488DF21-EAAC-4BFB-8C4B-56AC567B40C0}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{E488DF21-EAAC-4BFB-8C4B-56AC567B40C0}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B759577D-1179-4A92-B261-B852B1F5584F}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B759577D-1179-4A92-B261-B852B1F5584F}\InprocServer32\ = "C:\\Windows\\SysWOW64\\win32.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\wind32.Class1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E488DF21-EAAC-4BFB-8C4B-56AC567B40C0}\ = "Class1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{E488DF21-EAAC-4BFB-8C4B-56AC567B40C0}\ProxyStubClsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B759577D-1179-4A92-B261-B852B1F5584F}\Implemented Categories regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B759577D-1179-4A92-B261-B852B1F5584F}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B759577D-1179-4A92-B261-B852B1F5584F}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} regsvr32.exe -
Runs .reg file with regedit 1 IoCs
pid Process 2224 regedit.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2628 taskkill.exe Token: SeDebugPrivilege 2664 taskkill.exe Token: SeDebugPrivilege 2940 taskkill.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2720 247f965412d63d354bef7362057fec0f.exe 2720 247f965412d63d354bef7362057fec0f.exe 2720 247f965412d63d354bef7362057fec0f.exe 2324 247f965412d63d354bef7362057fec0f.exe 2324 247f965412d63d354bef7362057fec0f.exe 2324 247f965412d63d354bef7362057fec0f.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2628 2720 247f965412d63d354bef7362057fec0f.exe 28 PID 2720 wrote to memory of 2628 2720 247f965412d63d354bef7362057fec0f.exe 28 PID 2720 wrote to memory of 2628 2720 247f965412d63d354bef7362057fec0f.exe 28 PID 2720 wrote to memory of 2628 2720 247f965412d63d354bef7362057fec0f.exe 28 PID 2720 wrote to memory of 2324 2720 247f965412d63d354bef7362057fec0f.exe 30 PID 2720 wrote to memory of 2324 2720 247f965412d63d354bef7362057fec0f.exe 30 PID 2720 wrote to memory of 2324 2720 247f965412d63d354bef7362057fec0f.exe 30 PID 2720 wrote to memory of 2324 2720 247f965412d63d354bef7362057fec0f.exe 30 PID 2720 wrote to memory of 2664 2720 247f965412d63d354bef7362057fec0f.exe 31 PID 2720 wrote to memory of 2664 2720 247f965412d63d354bef7362057fec0f.exe 31 PID 2720 wrote to memory of 2664 2720 247f965412d63d354bef7362057fec0f.exe 31 PID 2720 wrote to memory of 2664 2720 247f965412d63d354bef7362057fec0f.exe 31 PID 2720 wrote to memory of 2940 2720 247f965412d63d354bef7362057fec0f.exe 34 PID 2720 wrote to memory of 2940 2720 247f965412d63d354bef7362057fec0f.exe 34 PID 2720 wrote to memory of 2940 2720 247f965412d63d354bef7362057fec0f.exe 34 PID 2720 wrote to memory of 2940 2720 247f965412d63d354bef7362057fec0f.exe 34 PID 2720 wrote to memory of 2552 2720 247f965412d63d354bef7362057fec0f.exe 36 PID 2720 wrote to memory of 2552 2720 247f965412d63d354bef7362057fec0f.exe 36 PID 2720 wrote to memory of 2552 2720 247f965412d63d354bef7362057fec0f.exe 36 PID 2720 wrote to memory of 2552 2720 247f965412d63d354bef7362057fec0f.exe 36 PID 2720 wrote to memory of 2552 2720 247f965412d63d354bef7362057fec0f.exe 36 PID 2720 wrote to memory of 2552 2720 247f965412d63d354bef7362057fec0f.exe 36 PID 2720 wrote to memory of 2552 2720 247f965412d63d354bef7362057fec0f.exe 36 PID 2720 wrote to memory of 2224 2720 247f965412d63d354bef7362057fec0f.exe 37 PID 2720 wrote to memory of 2224 2720 247f965412d63d354bef7362057fec0f.exe 37 PID 2720 wrote to memory of 2224 2720 247f965412d63d354bef7362057fec0f.exe 37 PID 2720 wrote to memory of 2224 2720 247f965412d63d354bef7362057fec0f.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\247f965412d63d354bef7362057fec0f.exe"C:\Users\Admin\AppData\Local\Temp\247f965412d63d354bef7362057fec0f.exe"1⤵
- Drops startup file
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /im iResearchiClick.exe /f2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2628
-
-
C:\Users\Admin\AppData\Local\Temp\247f965412d63d354bef7362057fec0f.exeC:\Users\Admin\AppData\Local\Temp\247f965412d63d354bef7362057fec0f.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:2324
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /im internat.exe /f2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2664
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /im internat.exe /f2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe win32.dll /s2⤵
- Loads dropped DLL
- Modifies registry class
PID:2552
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s C:\1.reg2⤵
- Adds Run key to start application
- Runs .reg file with regedit
PID:2224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173B
MD5132519462eabd6f910fa0ea9484a5460
SHA1d4c995ccca314898acfce542245299735d5ab0fc
SHA2567440736c8b540442a672db6b211b1b41e358a8383fec9135cae6fd76e2103108
SHA5122d4aa9a12f083bfc54db59137041e05091cc797c2ec5844f0a26ad5294f14dc3670ba9c58f3739f5b0466b292a55d7be31efc7ede6d6dedd4f5dd9a1261aadb8
-
Filesize
177KB
MD5883ac7135634266a9ec7dfcc6b315750
SHA146233bcc6d7dd69e87a6b4e23e7eb5be266705ad
SHA256f9dd2f8c28980161e252c981d05bce3c715c469b7e2853301759c53d1cc6b520
SHA512b1f55266fac30e12bcf39d5c50278556da2b4dad3c39207e607bafeb8984b5927d4284ed955b846b8b57ffb48d59d1eb0f499562a54cf072a4a5250ceca4a3b1
-
Filesize
24KB
MD523907e6a40471b9b69418dca9024bc28
SHA14fc47c091485b6e8fb3f59ce3b71bf116491cc02
SHA256a7ed49b72b689a4a1f150c125677acb5a2bdd63df49ecf12ef59da5877dc5256
SHA5124967f626fcec5cd34c36a77841a63c15d2e2632f56708f078d0d8e8d3e0bccfcc00f7239c4249975aef4f9513b240ac3acd20805b42d669b341d39fdb9c0921b