Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 03:12
Static task
static1
Behavioral task
behavioral1
Sample
25ed00bc4a03bbbab0ae0ccb79a1b9a9.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
25ed00bc4a03bbbab0ae0ccb79a1b9a9.exe
Resource
win10v2004-20231215-en
General
-
Target
25ed00bc4a03bbbab0ae0ccb79a1b9a9.exe
-
Size
4.1MB
-
MD5
25ed00bc4a03bbbab0ae0ccb79a1b9a9
-
SHA1
22314ffe0affc7d952e93c758624c299afa5f0a6
-
SHA256
5b7dd393e5bd12b7998b78b777324dd882fa8621889f9c4bdc9537574e5e4b22
-
SHA512
80dfe42479b41f7d08fc6f2f970315b868b2e249f3d03b98fe897bb33d497e3422b7e95c7ec6bda98a2098de05c31793d3fdfc43a332d3e60bae06d972e624db
-
SSDEEP
98304:Hz7Xb6rg/JwCcJnsgt1vdo08s2JpQpwh4Vlmfxl7+:/Xb6rgxcp99dIJpQp7Lm6
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2068 netsh.exe -
Stops running service(s) 3 TTPs
-
Uses Session Manager for persistence 2 TTPs 3 IoCs
Creates Session Manager registry key to run executable early in system boot.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SESSION MANAGER\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 reg.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Session Manager\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 reg.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SESSION MANAGER\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 reg.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows32 = "C:\\windows\\system\\system.exe" 25ed00bc4a03bbbab0ae0ccb79a1b9a9.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\autoconvv.RRI 25ed00bc4a03bbbab0ae0ccb79a1b9a9.exe File opened for modification \??\c:\windows\SysWOW64\autoconvv.RRI 25ed00bc4a03bbbab0ae0ccb79a1b9a9.exe File created C:\Windows\SysWOW64\reg_0001.txt 25ed00bc4a03bbbab0ae0ccb79a1b9a9.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\system32AntiDelete 25ed00bc4a03bbbab0ae0ccb79a1b9a9.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2924 sc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2180 25ed00bc4a03bbbab0ae0ccb79a1b9a9.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2924 2180 25ed00bc4a03bbbab0ae0ccb79a1b9a9.exe 37 PID 2180 wrote to memory of 2924 2180 25ed00bc4a03bbbab0ae0ccb79a1b9a9.exe 37 PID 2180 wrote to memory of 2924 2180 25ed00bc4a03bbbab0ae0ccb79a1b9a9.exe 37 PID 2180 wrote to memory of 2924 2180 25ed00bc4a03bbbab0ae0ccb79a1b9a9.exe 37 PID 2180 wrote to memory of 2224 2180 25ed00bc4a03bbbab0ae0ccb79a1b9a9.exe 36 PID 2180 wrote to memory of 2224 2180 25ed00bc4a03bbbab0ae0ccb79a1b9a9.exe 36 PID 2180 wrote to memory of 2224 2180 25ed00bc4a03bbbab0ae0ccb79a1b9a9.exe 36 PID 2180 wrote to memory of 2224 2180 25ed00bc4a03bbbab0ae0ccb79a1b9a9.exe 36 PID 2180 wrote to memory of 1364 2180 25ed00bc4a03bbbab0ae0ccb79a1b9a9.exe 35 PID 2180 wrote to memory of 1364 2180 25ed00bc4a03bbbab0ae0ccb79a1b9a9.exe 35 PID 2180 wrote to memory of 1364 2180 25ed00bc4a03bbbab0ae0ccb79a1b9a9.exe 35 PID 2180 wrote to memory of 1364 2180 25ed00bc4a03bbbab0ae0ccb79a1b9a9.exe 35 PID 2180 wrote to memory of 1916 2180 25ed00bc4a03bbbab0ae0ccb79a1b9a9.exe 33 PID 2180 wrote to memory of 1916 2180 25ed00bc4a03bbbab0ae0ccb79a1b9a9.exe 33 PID 2180 wrote to memory of 1916 2180 25ed00bc4a03bbbab0ae0ccb79a1b9a9.exe 33 PID 2180 wrote to memory of 1916 2180 25ed00bc4a03bbbab0ae0ccb79a1b9a9.exe 33 PID 2180 wrote to memory of 2068 2180 25ed00bc4a03bbbab0ae0ccb79a1b9a9.exe 32 PID 2180 wrote to memory of 2068 2180 25ed00bc4a03bbbab0ae0ccb79a1b9a9.exe 32 PID 2180 wrote to memory of 2068 2180 25ed00bc4a03bbbab0ae0ccb79a1b9a9.exe 32 PID 2180 wrote to memory of 2068 2180 25ed00bc4a03bbbab0ae0ccb79a1b9a9.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\25ed00bc4a03bbbab0ae0ccb79a1b9a9.exe"C:\Users\Admin\AppData\Local\Temp\25ed00bc4a03bbbab0ae0ccb79a1b9a9.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram C:\windows\system\system.exe RPCCC2⤵
- Modifies Windows Firewall
PID:2068
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Control\Session manager" /v BootExecute /t REG_MULTI_SZ /d "autocheck autochk *" /f2⤵
- Uses Session Manager for persistence
PID:1916
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\ControlSet002\Control\Session manager" /v BootExecute /t REG_MULTI_SZ /d "autocheck autochk *" /f2⤵
- Uses Session Manager for persistence
PID:1364
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\ControlSet001\Control\Session manager" /v BootExecute /t REG_MULTI_SZ /d "autocheck autochk *" /f2⤵
- Uses Session Manager for persistence
PID:2224
-
-
C:\Windows\SysWOW64\sc.exesc delete GbpSv2⤵
- Launches sc.exe
PID:2924
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2