Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 07:01
Behavioral task
behavioral1
Sample
4033a555895253aac19eb732d9ae8c81.exe
Resource
win7-20231215-en
General
-
Target
4033a555895253aac19eb732d9ae8c81.exe
-
Size
892KB
-
MD5
4033a555895253aac19eb732d9ae8c81
-
SHA1
557f18f34976f431c5e82040f33a29f32747dad2
-
SHA256
5c82c273941ae0386ff31ab236baa2bf16d68a569848e68c1b7f0e0129a00984
-
SHA512
546d6e56003e9e543331eaef8247fc6c88602ddc9796f9d22cbf8e1fb88e563a1f00ef338cabde55488eacb8b9462e883debd8aea6c9a064540f30940f6a380a
-
SSDEEP
24576:efQDX+wVqKz7dftt/kIsRnLCCiHC5/r1nQM33:SQD+w7ntbk/Bj5/rZQe3
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4033a555895253aac19eb732d9ae8c81.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Wine 4033a555895253aac19eb732d9ae8c81.exe -
resource yara_rule behavioral1/memory/2900-0-0x0000000000400000-0x00000000005E8000-memory.dmp themida behavioral1/memory/2900-2-0x0000000000400000-0x00000000005E8000-memory.dmp themida behavioral1/memory/2900-6-0x0000000000400000-0x00000000005E8000-memory.dmp themida behavioral1/memory/2900-7-0x0000000000400000-0x00000000005E8000-memory.dmp themida behavioral1/memory/2900-10-0x0000000000400000-0x00000000005E8000-memory.dmp themida behavioral1/memory/2900-11-0x0000000000400000-0x00000000005E8000-memory.dmp themida behavioral1/memory/2900-12-0x0000000000400000-0x00000000005E8000-memory.dmp themida behavioral1/memory/2900-13-0x0000000000400000-0x00000000005E8000-memory.dmp themida behavioral1/memory/2900-14-0x0000000000400000-0x00000000005E8000-memory.dmp themida behavioral1/memory/2900-15-0x0000000000400000-0x00000000005E8000-memory.dmp themida behavioral1/memory/2900-16-0x0000000000400000-0x00000000005E8000-memory.dmp themida behavioral1/memory/2900-17-0x0000000000400000-0x00000000005E8000-memory.dmp themida behavioral1/memory/2900-18-0x0000000000400000-0x00000000005E8000-memory.dmp themida behavioral1/memory/2900-19-0x0000000000400000-0x00000000005E8000-memory.dmp themida behavioral1/memory/2900-20-0x0000000000400000-0x00000000005E8000-memory.dmp themida behavioral1/memory/2900-21-0x0000000000400000-0x00000000005E8000-memory.dmp themida behavioral1/memory/2900-22-0x0000000000400000-0x00000000005E8000-memory.dmp themida behavioral1/memory/2900-23-0x0000000000400000-0x00000000005E8000-memory.dmp themida -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4033a555895253aac19eb732d9ae8c81.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers 4033a555895253aac19eb732d9ae8c81.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2900 4033a555895253aac19eb732d9ae8c81.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe 4033a555895253aac19eb732d9ae8c81.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2900 4033a555895253aac19eb732d9ae8c81.exe 2900 4033a555895253aac19eb732d9ae8c81.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2900 4033a555895253aac19eb732d9ae8c81.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2900 4033a555895253aac19eb732d9ae8c81.exe Token: SeShutdownPrivilege 2900 4033a555895253aac19eb732d9ae8c81.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2900 4033a555895253aac19eb732d9ae8c81.exe -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 4033a555895253aac19eb732d9ae8c81.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 4033a555895253aac19eb732d9ae8c81.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4033a555895253aac19eb732d9ae8c81.exe"C:\Users\Admin\AppData\Local\Temp\4033a555895253aac19eb732d9ae8c81.exe"1⤵
- UAC bypass
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2900
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Virtualization/Sandbox Evasion
1