Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 12:51
Static task
static1
Behavioral task
behavioral1
Sample
36c4f2289cbfeb319219743392141a67.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
36c4f2289cbfeb319219743392141a67.exe
Resource
win10v2004-20231215-en
General
-
Target
36c4f2289cbfeb319219743392141a67.exe
-
Size
1.0MB
-
MD5
36c4f2289cbfeb319219743392141a67
-
SHA1
4b2b2f483e3e2663c0be603817bc038cce4941ed
-
SHA256
2f7c4ee4fde198e54e5f29ef1eafe326bda0f24f21bb4bf36e6416d32e75d246
-
SHA512
3f3c9472397055e44ecf6a14b34b07a0384e759cc4b618b33e994bd076271fdc2085078396b88ed33b5d4a07d6ddf61a75e90fc02e024d68539449a13ed6f52a
-
SSDEEP
24576:+JeJfAKijp98zHpneTXdp9aepOBm1oc7KbvyFyK9:0eJfALGperduepOBm+c79
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe rundll.exe" 36c4f2289cbfeb319219743392141a67.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 36c4f2289cbfeb319219743392141a67.exe -
Disables Task Manager via registry modification
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Yahoo Messengger = "C:\\Windows\\system32\\regsvr.exe" 36c4f2289cbfeb319219743392141a67.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\z: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\n: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\w: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\j: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\l: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\q: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\e: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\g: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\o: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\p: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\s: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\u: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\v: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\x: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\i: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\k: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\y: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\h: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\m: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\r: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\t: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\a: 36c4f2289cbfeb319219743392141a67.exe File opened (read-only) \??\b: 36c4f2289cbfeb319219743392141a67.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\system = "Winhelp.exe" 36c4f2289cbfeb319219743392141a67.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4840-0-0x0000000000400000-0x00000000004A1000-memory.dmp autoit_exe behavioral2/files/0x0006000000023227-13.dat autoit_exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\regsvr.exe 36c4f2289cbfeb319219743392141a67.exe File opened for modification C:\Windows\SysWOW64\regsvr.exe 36c4f2289cbfeb319219743392141a67.exe File created C:\Windows\SysWOW64\winhelp.exe 36c4f2289cbfeb319219743392141a67.exe File opened for modification C:\Windows\SysWOW64\winhelp.exe 36c4f2289cbfeb319219743392141a67.exe File opened for modification C:\Windows\SysWOW64\setup.ini 36c4f2289cbfeb319219743392141a67.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\regsvr.exe 36c4f2289cbfeb319219743392141a67.exe File opened for modification C:\Windows\regsvr.exe 36c4f2289cbfeb319219743392141a67.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe 4840 36c4f2289cbfeb319219743392141a67.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4840 wrote to memory of 3428 4840 36c4f2289cbfeb319219743392141a67.exe 89 PID 4840 wrote to memory of 3428 4840 36c4f2289cbfeb319219743392141a67.exe 89 PID 4840 wrote to memory of 3428 4840 36c4f2289cbfeb319219743392141a67.exe 89 PID 3428 wrote to memory of 4420 3428 cmd.exe 90 PID 3428 wrote to memory of 4420 3428 cmd.exe 90 PID 3428 wrote to memory of 4420 3428 cmd.exe 90 PID 4840 wrote to memory of 1904 4840 36c4f2289cbfeb319219743392141a67.exe 95 PID 4840 wrote to memory of 1904 4840 36c4f2289cbfeb319219743392141a67.exe 95 PID 4840 wrote to memory of 1904 4840 36c4f2289cbfeb319219743392141a67.exe 95 PID 1904 wrote to memory of 3384 1904 cmd.exe 93 PID 1904 wrote to memory of 3384 1904 cmd.exe 93 PID 1904 wrote to memory of 3384 1904 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\36c4f2289cbfeb319219743392141a67.exe"C:\Users\Admin\AppData\Local\Temp\36c4f2289cbfeb319219743392141a67.exe"1⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Adds Run key to start application
- Enumerates connected drives
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT /delete /yes2⤵
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Windows\SysWOW64\at.exeAT /delete /yes3⤵PID:4420
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\winhelp.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1904
-
-
C:\Windows\SysWOW64\at.exeAT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\winhelp.exe1⤵PID:3384
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
1Winlogon Helper DLL
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD536c4f2289cbfeb319219743392141a67
SHA14b2b2f483e3e2663c0be603817bc038cce4941ed
SHA2562f7c4ee4fde198e54e5f29ef1eafe326bda0f24f21bb4bf36e6416d32e75d246
SHA5123f3c9472397055e44ecf6a14b34b07a0384e759cc4b618b33e994bd076271fdc2085078396b88ed33b5d4a07d6ddf61a75e90fc02e024d68539449a13ed6f52a