Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 08:14
Static task
static1
Behavioral task
behavioral1
Sample
3c58a768806b7cf7102828a36a931788.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3c58a768806b7cf7102828a36a931788.exe
Resource
win10v2004-20231222-en
General
-
Target
3c58a768806b7cf7102828a36a931788.exe
-
Size
89KB
-
MD5
3c58a768806b7cf7102828a36a931788
-
SHA1
4ed8363c4265f163f9bd038d76105662bd9bbf96
-
SHA256
8f75ba411a122ff607c30e29db68a561f49174920182a6862b709c20e55be4c8
-
SHA512
cae00b6f51ebf2f1cf9b8d55f53d00a230891647843b6376b93161169e27140b1d83953eebd010505374f2c69f0f54737d2df364d129b1a3b4465d2c9f62e56d
-
SSDEEP
1536:5f69FF9pvyv5H3Yq7ODyYE++llwwMs2M5J:5iPF9pvyRXxN+s2M5J
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 3c58a768806b7cf7102828a36a931788.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Mstsc = "C:\\Windows\\System32\\drivers\\mstsc.exe /waitservice" 3c58a768806b7cf7102828a36a931788.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 3c58a768806b7cf7102828a36a931788.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\ClipSrv = "C:\\Users\\Admin\\LOCALS~1\\APPLIC~1\\MICROS~1\\clipsrv.exe /waitservice" 3c58a768806b7cf7102828a36a931788.exe -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\mstsc.exe 3c58a768806b7cf7102828a36a931788.exe File opened for modification C:\Windows\SysWOW64\drivers\mstsc.exe 3c58a768806b7cf7102828a36a931788.exe -
Executes dropped EXE 1 IoCs
pid Process 2296 logman.exe -
Loads dropped DLL 2 IoCs
pid Process 1056 3c58a768806b7cf7102828a36a931788.exe 1056 3c58a768806b7cf7102828a36a931788.exe -
Modifies data under HKEY_USERS 10 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft 3c58a768806b7cf7102828a36a931788.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 3c58a768806b7cf7102828a36a931788.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows 3c58a768806b7cf7102828a36a931788.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion 3c58a768806b7cf7102828a36a931788.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies 3c58a768806b7cf7102828a36a931788.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 3c58a768806b7cf7102828a36a931788.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Cisvc = "C:\\Users\\Admin\\AppData\\Roaming\\cisvc.exe /waitservice" 3c58a768806b7cf7102828a36a931788.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 3c58a768806b7cf7102828a36a931788.exe Key created \REGISTRY\USER\.DEFAULT 3c58a768806b7cf7102828a36a931788.exe Key created \REGISTRY\USER\.DEFAULT\Software 3c58a768806b7cf7102828a36a931788.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1056 wrote to memory of 2296 1056 3c58a768806b7cf7102828a36a931788.exe 28 PID 1056 wrote to memory of 2296 1056 3c58a768806b7cf7102828a36a931788.exe 28 PID 1056 wrote to memory of 2296 1056 3c58a768806b7cf7102828a36a931788.exe 28 PID 1056 wrote to memory of 2296 1056 3c58a768806b7cf7102828a36a931788.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c58a768806b7cf7102828a36a931788.exe"C:\Users\Admin\AppData\Local\Temp\3c58a768806b7cf7102828a36a931788.exe"1⤵
- Adds policy Run key to start application
- Drops file in Drivers directory
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Roaming\MICROS~1\logman.exeC:\Users\Admin\AppData\Roaming\MICROS~1\logman.exe /waitservice2⤵
- Executes dropped EXE
PID:2296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD53c58a768806b7cf7102828a36a931788
SHA14ed8363c4265f163f9bd038d76105662bd9bbf96
SHA2568f75ba411a122ff607c30e29db68a561f49174920182a6862b709c20e55be4c8
SHA512cae00b6f51ebf2f1cf9b8d55f53d00a230891647843b6376b93161169e27140b1d83953eebd010505374f2c69f0f54737d2df364d129b1a3b4465d2c9f62e56d