Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
206s -
max time network
200s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 06:14
Behavioral task
behavioral1
Sample
2b607447d7329e4b4cf411321d39be60.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2b607447d7329e4b4cf411321d39be60.exe
Resource
win10v2004-20231222-en
General
-
Target
2b607447d7329e4b4cf411321d39be60.exe
-
Size
1.7MB
-
MD5
2b607447d7329e4b4cf411321d39be60
-
SHA1
5e102f5055eb327d965e1ff542708f5c22993cb3
-
SHA256
c6106ddc8029c3572223d988965baa220e14dbbe120b078a4b5a7d0546f7eb36
-
SHA512
9640cd9eebcc85971c25a8617c73241ae37029509140bccae1ef6b9e1e74fe1e4ac0a3869c4448b7ad043ccc4b81be7060098627b0cfcadff6a6fbcef6f0e4a8
-
SSDEEP
24576:h7WsPkA8QsBPyoG0HBrC2zJSKD5YKPmg/ptFL2De60BtKF+ho3njkoo/LZSS9e:hrEQsBT1D5YKPp/j0jN
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\fservice.exe" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\fservice.exe" 2b607447d7329e4b4cf411321d39be60.exe -
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\DirectX For Microsoft® Windows = "C:\\Windows\\system32\\fservice.exe" 2b607447d7329e4b4cf411321d39be60.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\DirectX For Microsoft® Windows = "C:\\Windows\\system32\\fservice.exe" services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 2b607447d7329e4b4cf411321d39be60.exe -
Modifies Installed Components in the registry 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\StubPath = "C:\\Windows\\system\\sservice.exe" 2b607447d7329e4b4cf411321d39be60.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\ services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\StubPath = "C:\\Windows\\system\\sservice.exe" services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y} 2b607447d7329e4b4cf411321d39be60.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\ 2b607447d7329e4b4cf411321d39be60.exe -
Deletes itself 1 IoCs
pid Process 1492 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1664 fservice.exe 2536 services.exe -
Loads dropped DLL 6 IoCs
pid Process 2616 2b607447d7329e4b4cf411321d39be60.exe 2616 2b607447d7329e4b4cf411321d39be60.exe 2536 services.exe 2536 services.exe 1664 fservice.exe 2616 2b607447d7329e4b4cf411321d39be60.exe -
resource yara_rule behavioral1/memory/2616-0-0x0000000000400000-0x00000000005FF000-memory.dmp upx behavioral1/memory/2616-1-0x0000000000400000-0x00000000005FF000-memory.dmp upx behavioral1/memory/2616-3-0x0000000000400000-0x00000000005FF000-memory.dmp upx behavioral1/memory/2616-4-0x0000000000400000-0x00000000005FF000-memory.dmp upx behavioral1/files/0x0004000000004ed7-9.dat upx behavioral1/memory/2616-10-0x0000000002F00000-0x00000000030FF000-memory.dmp upx behavioral1/memory/2616-11-0x0000000000400000-0x00000000005FF000-memory.dmp upx behavioral1/files/0x0004000000004ed7-13.dat upx behavioral1/memory/1664-19-0x0000000000400000-0x00000000005FF000-memory.dmp upx behavioral1/files/0x0004000000004ed7-18.dat upx behavioral1/files/0x001000000000b1f5-23.dat upx behavioral1/files/0x0004000000004ed7-20.dat upx behavioral1/files/0x0004000000004ed7-14.dat upx behavioral1/files/0x000c000000012274-29.dat upx behavioral1/memory/2536-32-0x0000000000400000-0x00000000005FF000-memory.dmp upx behavioral1/memory/2536-38-0x0000000000400000-0x00000000005FF000-memory.dmp upx behavioral1/memory/2536-41-0x0000000000400000-0x00000000005FF000-memory.dmp upx behavioral1/files/0x000c000000012274-45.dat upx behavioral1/memory/1664-49-0x0000000000400000-0x00000000005FF000-memory.dmp upx behavioral1/memory/2616-50-0x0000000000400000-0x00000000005FF000-memory.dmp upx behavioral1/memory/2616-59-0x0000000000400000-0x00000000005FF000-memory.dmp upx behavioral1/memory/2536-61-0x0000000000400000-0x00000000005FF000-memory.dmp upx behavioral1/memory/2536-63-0x0000000000400000-0x00000000005FF000-memory.dmp upx behavioral1/memory/2536-64-0x0000000000400000-0x00000000005FF000-memory.dmp upx behavioral1/memory/2536-65-0x0000000000400000-0x00000000005FF000-memory.dmp upx behavioral1/memory/2536-66-0x0000000000400000-0x00000000005FF000-memory.dmp upx behavioral1/memory/2536-67-0x0000000000400000-0x00000000005FF000-memory.dmp upx behavioral1/memory/2536-68-0x0000000000400000-0x00000000005FF000-memory.dmp upx behavioral1/memory/2536-69-0x0000000000400000-0x00000000005FF000-memory.dmp upx behavioral1/memory/2536-70-0x0000000000400000-0x00000000005FF000-memory.dmp upx -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ 2b607447d7329e4b4cf411321d39be60.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ services.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\fservice.exe services.exe File created C:\Windows\SysWOW64\fservice.exe 2b607447d7329e4b4cf411321d39be60.exe File opened for modification C:\Windows\SysWOW64\fservice.exe 2b607447d7329e4b4cf411321d39be60.exe File created C:\Windows\SysWOW64\fservice.exe fservice.exe File opened for modification C:\Windows\SysWOW64\fservice.exe fservice.exe File created C:\Windows\SysWOW64\winkey.dll services.exe File created C:\Windows\SysWOW64\reginv.dll services.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\system\sservice.exe fservice.exe File opened for modification C:\Windows\system\sservice.exe fservice.exe File created C:\Windows\system\sservice.exe services.exe File opened for modification C:\Windows\system\sservice.exe services.exe File created C:\Windows\system\sservice.exe 2b607447d7329e4b4cf411321d39be60.exe File opened for modification C:\Windows\system\sservice.exe 2b607447d7329e4b4cf411321d39be60.exe File created C:\Windows\services.exe fservice.exe File opened for modification C:\Windows\services.exe fservice.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 63 IoCs
pid Process 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe 2536 services.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2536 services.exe 2536 services.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2616 wrote to memory of 1664 2616 2b607447d7329e4b4cf411321d39be60.exe 28 PID 2616 wrote to memory of 1664 2616 2b607447d7329e4b4cf411321d39be60.exe 28 PID 2616 wrote to memory of 1664 2616 2b607447d7329e4b4cf411321d39be60.exe 28 PID 2616 wrote to memory of 1664 2616 2b607447d7329e4b4cf411321d39be60.exe 28 PID 1664 wrote to memory of 2536 1664 fservice.exe 29 PID 1664 wrote to memory of 2536 1664 fservice.exe 29 PID 1664 wrote to memory of 2536 1664 fservice.exe 29 PID 1664 wrote to memory of 2536 1664 fservice.exe 29 PID 2536 wrote to memory of 792 2536 services.exe 30 PID 2536 wrote to memory of 792 2536 services.exe 30 PID 2536 wrote to memory of 792 2536 services.exe 30 PID 2536 wrote to memory of 792 2536 services.exe 30 PID 2536 wrote to memory of 880 2536 services.exe 31 PID 2536 wrote to memory of 880 2536 services.exe 31 PID 2536 wrote to memory of 880 2536 services.exe 31 PID 2536 wrote to memory of 880 2536 services.exe 31 PID 2616 wrote to memory of 1492 2616 2b607447d7329e4b4cf411321d39be60.exe 34 PID 2616 wrote to memory of 1492 2616 2b607447d7329e4b4cf411321d39be60.exe 34 PID 2616 wrote to memory of 1492 2616 2b607447d7329e4b4cf411321d39be60.exe 34 PID 2616 wrote to memory of 1492 2616 2b607447d7329e4b4cf411321d39be60.exe 34 PID 792 wrote to memory of 2416 792 NET.exe 36 PID 792 wrote to memory of 2416 792 NET.exe 36 PID 792 wrote to memory of 2416 792 NET.exe 36 PID 792 wrote to memory of 2416 792 NET.exe 36 PID 880 wrote to memory of 2372 880 NET.exe 37 PID 880 wrote to memory of 2372 880 NET.exe 37 PID 880 wrote to memory of 2372 880 NET.exe 37 PID 880 wrote to memory of 2372 880 NET.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b607447d7329e4b4cf411321d39be60.exe"C:\Users\Admin\AppData\Local\Temp\2b607447d7329e4b4cf411321d39be60.exe"1⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Loads dropped DLL
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\fservice.exeC:\Windows\system32\fservice.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\services.exeC:\Windows\services.exe -XP3⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\NET.exeNET STOP srservice4⤵
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP srservice5⤵PID:2416
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP navapsvc4⤵
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP navapsvc5⤵PID:2372
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\2b607447d7329e4b4cf411321d39be60.exe.bat2⤵
- Deletes itself
PID:1492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133B
MD55300e7900660b56890cef6fb2a30d084
SHA1343273fde8fbc94031b1d208b532d19cb7188e7a
SHA256f8e986e36ebe53831268b627b4e2cd5c1a77b7b6e6384eb8a3cf90624b820e90
SHA5126ab940529b9476e1b89cd5c05eb38e66a7e323409a5d0ca796ece522ba800cd90bf352d7cad2d479a4d12d5e4134ba3445c8ccd6df74748cb1538a4cf03c1e95
-
Filesize
1.1MB
MD5c83631f686fbca7dbc0c9e9d5a5ee0cd
SHA11252d7c8732c719db251fb4eb0de5cdbfd8a2e2e
SHA256afa4685f5b37589f8b952703eb2187281101b3e018309591c1463e257196b898
SHA5125b0483051ca0d3bf315fdbc4c23cf6ad8745e4a87c03734e583ed2e3eed8d06d71a83d7e58d4660b27d830ddd5f88d1c364dc17786bc7c3c8d3fc99a8793c726
-
Filesize
725KB
MD5b96167317b1c5f78bcf78535468b59e6
SHA1794ab7055fcc8fe21ca3b57f4ceec4209177475e
SHA25684c8a7859f276473fc0e7802ac1436ae525e7ad9cc1d64af7a115f96d1b3fe27
SHA51205fb435f14d3724a58075d37ba5edf775d34ad3d2e62d9a9d64d87e3f783bf6b43cdf72775dcb4607dd0ba7ec69cec0ce8af58f900eac3a8cf1c9170572b1ecb
-
Filesize
562KB
MD563792c537f1822e0a21e6bacc110d602
SHA1614aa55ffc59df96320ef451775810f023b53dc6
SHA256a956beb0faf1d3f8ae10bc4dfa01032930b5bded02d2ffe431592219c642735d
SHA512ea34bc924a0c38af2c1ece2268a187f391d2a82d86113624592639173ded861066891c05b62bb9686c4b5f8b559fed53a86abd710de2e85160e7a009b61d8e95
-
Filesize
351KB
MD55d4ca9409c12359e0aaa4a75ae02453c
SHA168652e1d8feb46ebbc1c3872ec2d6c6428c7453b
SHA256280f585a9081fb04fb2631189669234c87628b313240a4f5cbf82da7db86049c
SHA5128d70faf551257fe87f865e424b03881312357515d2317ae6ce34b39cf25095e9270fff818cbcafa9bd6be0248988d7ceed1f1451489ed454d930c7fa5fde41d1
-
Filesize
1.7MB
MD52b607447d7329e4b4cf411321d39be60
SHA15e102f5055eb327d965e1ff542708f5c22993cb3
SHA256c6106ddc8029c3572223d988965baa220e14dbbe120b078a4b5a7d0546f7eb36
SHA5129640cd9eebcc85971c25a8617c73241ae37029509140bccae1ef6b9e1e74fe1e4ac0a3869c4448b7ad043ccc4b81be7060098627b0cfcadff6a6fbcef6f0e4a8
-
Filesize
699KB
MD5f119e21a304b2abde405a277397834dc
SHA1130b068c8df08051b7dd1353dfbd5bed744ba02d
SHA2568507e739f5cbe0777d5e1d57e7225f80e05015b53cfa5c24c31290b1a2f443ff
SHA512a710f39475846175ead92f1a6cc1fab2d193106d629c425d4d608745f70102a3d0beae49b0a436a646d049d5c750dd67b6b56b0d30c3365bb6d5e4ca7d0319cf
-
Filesize
633KB
MD5150cf70d6afab712cde519b3dc772572
SHA12aac6066d459a40dce5ab3423ea169732ccde0f6
SHA2561e79ffd69d0df0275f191770098cdd45a0adb9007b91b4201741a8985fa942eb
SHA512b1310ae39870dae29168394fe1e7e5cc28a4e7478d7081ddf5ad77a19390135595e68de3bb139b4d5bafc0eb16766ebd78f58f07faaf126e311f1d6ed9665dcb
-
Filesize
1014KB
MD5e13327722ccdf152c2b63334fd7657f3
SHA11e983ba044c0c1bf076813fabce69aa6424cb764
SHA256abf0d015dc0329e1877e326c42640be72af1bd9c087a8bb218b2de78b9d5cc3e
SHA512cc108e610c264fdfb7edf2a9e263b7927d35170f51747ff8862a6cba8a3cbbb7c93bf5f8ef250f3d21225fde6bb6f775bda0d93caf0471605b16dad8ed04457a
-
Filesize
36KB
MD5d4a3f90e159ffbcbc4f9740de4b7f171
SHA10542f5d1e2c23dca8d90766b3a8537dc3880e5c9
SHA2562200dd5f83d2fb8c5d3994206a4fa9ff34b4cbfe56ed39a9a03c954cf45d8f77
SHA5125493beb50b5f7d8ec52f32718d01696916ae173456005d0c1294ce695161ce5004aff58ee3892bf5db0f9b23720146a6d3ae8ffbcbbd81f84d894fdc8cf75a94
-
Filesize
24KB
MD543e7d9b875c921ba6be38d45540fb9dd
SHA1f22a73fc0d4aa3ea6c0b8f61d974b028f308acc4
SHA256f1b2b0abe844e6ba812c7f8709a463a7f6c56fa6ac38d376a0739cc3469f795b
SHA5122e74e23c0875b69b82319391c392132f28f4eb45aa412805130382498ae48969a06a2b3a7528b626fa7d7ddb6b006f19f0ef8d73cf73cb9a0c0df44a21077622