Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 12:51
Static task
static1
Behavioral task
behavioral1
Sample
36c4f2289cbfeb319219743392141a67.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
36c4f2289cbfeb319219743392141a67.exe
Resource
win10v2004-20231215-en
General
-
Target
36c4f2289cbfeb319219743392141a67.exe
-
Size
1.0MB
-
MD5
36c4f2289cbfeb319219743392141a67
-
SHA1
4b2b2f483e3e2663c0be603817bc038cce4941ed
-
SHA256
2f7c4ee4fde198e54e5f29ef1eafe326bda0f24f21bb4bf36e6416d32e75d246
-
SHA512
3f3c9472397055e44ecf6a14b34b07a0384e759cc4b618b33e994bd076271fdc2085078396b88ed33b5d4a07d6ddf61a75e90fc02e024d68539449a13ed6f52a
-
SSDEEP
24576:+JeJfAKijp98zHpneTXdp9aepOBm1oc7KbvyFyK9:0eJfALGperduepOBm+c79
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe rundll.exe" 36c4f2289cbfeb319219743392141a67.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 36c4f2289cbfeb319219743392141a67.exe -
Disables Task Manager via registry modification
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Yahoo Messengger = "C:\\Windows\\system32\\regsvr.exe" 36c4f2289cbfeb319219743392141a67.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\t: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\z: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\a: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\h: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\i: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\l: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\p: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\j: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\r: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\y: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\s: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\v: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\x: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\b: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\e: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\g: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\m: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\q: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\k: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\n: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\o: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\u: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\w: 36c4f2289cbfeb319219743392141a67.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\system = "Winhelp.exe" 36c4f2289cbfeb319219743392141a67.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1600-0-0x0000000000400000-0x00000000004A1000-memory.dmp autoit_exe behavioral1/files/0x00090000000155f7-13.dat autoit_exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\winhelp.exe 36c4f2289cbfeb319219743392141a67.exe File opened for modification C:\Windows\SysWOW64\setup.ini 36c4f2289cbfeb319219743392141a67.exe File created C:\Windows\SysWOW64\regsvr.exe 36c4f2289cbfeb319219743392141a67.exe File opened for modification C:\Windows\SysWOW64\regsvr.exe 36c4f2289cbfeb319219743392141a67.exe File created C:\Windows\SysWOW64\winhelp.exe 36c4f2289cbfeb319219743392141a67.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\regsvr.exe 36c4f2289cbfeb319219743392141a67.exe File opened for modification C:\Windows\regsvr.exe 36c4f2289cbfeb319219743392141a67.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1600 36c4f2289cbfeb319219743392141a67.exe 1600 36c4f2289cbfeb319219743392141a67.exe 1600 36c4f2289cbfeb319219743392141a67.exe 1600 36c4f2289cbfeb319219743392141a67.exe 1600 36c4f2289cbfeb319219743392141a67.exe 1600 36c4f2289cbfeb319219743392141a67.exe 1600 36c4f2289cbfeb319219743392141a67.exe 1600 36c4f2289cbfeb319219743392141a67.exe 1600 36c4f2289cbfeb319219743392141a67.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1600 wrote to memory of 3028 1600 36c4f2289cbfeb319219743392141a67.exe 19 PID 1600 wrote to memory of 3028 1600 36c4f2289cbfeb319219743392141a67.exe 19 PID 1600 wrote to memory of 3028 1600 36c4f2289cbfeb319219743392141a67.exe 19 PID 1600 wrote to memory of 3028 1600 36c4f2289cbfeb319219743392141a67.exe 19 PID 3028 wrote to memory of 2384 3028 cmd.exe 18 PID 3028 wrote to memory of 2384 3028 cmd.exe 18 PID 3028 wrote to memory of 2384 3028 cmd.exe 18 PID 3028 wrote to memory of 2384 3028 cmd.exe 18 PID 1600 wrote to memory of 1464 1600 36c4f2289cbfeb319219743392141a67.exe 17 PID 1600 wrote to memory of 1464 1600 36c4f2289cbfeb319219743392141a67.exe 17 PID 1600 wrote to memory of 1464 1600 36c4f2289cbfeb319219743392141a67.exe 17 PID 1600 wrote to memory of 1464 1600 36c4f2289cbfeb319219743392141a67.exe 17 PID 1464 wrote to memory of 1680 1464 cmd.exe 15 PID 1464 wrote to memory of 1680 1464 cmd.exe 15 PID 1464 wrote to memory of 1680 1464 cmd.exe 15 PID 1464 wrote to memory of 1680 1464 cmd.exe 15
Processes
-
C:\Windows\SysWOW64\at.exeAT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\winhelp.exe1⤵PID:1680
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\winhelp.exe1⤵
- Suspicious use of WriteProcessMemory
PID:1464
-
C:\Windows\SysWOW64\at.exeAT /delete /yes1⤵PID:2384
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT /delete /yes1⤵
- Suspicious use of WriteProcessMemory
PID:3028
-
C:\Users\Admin\AppData\Local\Temp\36c4f2289cbfeb319219743392141a67.exe"C:\Users\Admin\AppData\Local\Temp\36c4f2289cbfeb319219743392141a67.exe"1⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1600
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
165KB
MD513f842278c996a61154c7550cef3f391
SHA10825e819d169cbb847a6497dfe5ebc64559e49c1
SHA2563b5419997d37f54f1b2e82d2f1560ffba61128896fa69336dfd3400ed9b3273e
SHA5120577ce383b62d960c71d3bdb1607eb609c14f7e608f66f5234fbe4cda2d8216320e1853f054695a85e80d06e4caf0d3b4eb2fb38bf95ed053362749cb9581336