Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 20:14
Static task
static1
Behavioral task
behavioral1
Sample
1fa5f289c2dd624b4da157b67c4b3954.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1fa5f289c2dd624b4da157b67c4b3954.exe
Resource
win10v2004-20231215-en
General
-
Target
1fa5f289c2dd624b4da157b67c4b3954.exe
-
Size
15KB
-
MD5
1fa5f289c2dd624b4da157b67c4b3954
-
SHA1
1fe176203eced9cfd6a1f6b920b7ab54c8b804de
-
SHA256
c0d3d9536f434075022bb09d0523b74aee433dec55d96103d93c1ba4498d2fed
-
SHA512
900f0d8827957dc93f86875537ec5da8ef037a8df81e969f1bec6dc82aeee48027758e78fe74b1582c67b44fcc2886bd211bdd140ccf58a1843d68d515cc8322
-
SSDEEP
384:WqPKe+qWpQsSV/PpHgbcWP7BswEb9vJEyT:WTUYQ/P0VPhe9F
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\cmwlqxln.dll = "{AF976DCD-754F-4ac2-BE49-951DC7AA57D2}" 1fa5f289c2dd624b4da157b67c4b3954.exe -
Deletes itself 1 IoCs
pid Process 2944 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2080 1fa5f289c2dd624b4da157b67c4b3954.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\cmwlqxln.tmp 1fa5f289c2dd624b4da157b67c4b3954.exe File opened for modification C:\Windows\SysWOW64\cmwlqxln.tmp 1fa5f289c2dd624b4da157b67c4b3954.exe File opened for modification C:\Windows\SysWOW64\cmwlqxln.nls 1fa5f289c2dd624b4da157b67c4b3954.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AF976DCD-754F-4ac2-BE49-951DC7AA57D2}\InProcServer32 1fa5f289c2dd624b4da157b67c4b3954.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AF976DCD-754F-4ac2-BE49-951DC7AA57D2}\InProcServer32\ = "C:\\Windows\\SysWow64\\cmwlqxln.dll" 1fa5f289c2dd624b4da157b67c4b3954.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AF976DCD-754F-4ac2-BE49-951DC7AA57D2}\InProcServer32\ThreadingModel = "Apartment" 1fa5f289c2dd624b4da157b67c4b3954.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AF976DCD-754F-4ac2-BE49-951DC7AA57D2} 1fa5f289c2dd624b4da157b67c4b3954.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2080 1fa5f289c2dd624b4da157b67c4b3954.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2080 1fa5f289c2dd624b4da157b67c4b3954.exe 2080 1fa5f289c2dd624b4da157b67c4b3954.exe 2080 1fa5f289c2dd624b4da157b67c4b3954.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2944 2080 1fa5f289c2dd624b4da157b67c4b3954.exe 29 PID 2080 wrote to memory of 2944 2080 1fa5f289c2dd624b4da157b67c4b3954.exe 29 PID 2080 wrote to memory of 2944 2080 1fa5f289c2dd624b4da157b67c4b3954.exe 29 PID 2080 wrote to memory of 2944 2080 1fa5f289c2dd624b4da157b67c4b3954.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fa5f289c2dd624b4da157b67c4b3954.exe"C:\Users\Admin\AppData\Local\Temp\1fa5f289c2dd624b4da157b67c4b3954.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\9222.tmp.bat2⤵
- Deletes itself
PID:2944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
179B
MD5393bdbd91735c4f179c5d4b621e21dcd
SHA165ef56551ac6b757d65fb29a2eb66eaa07723f79
SHA256e63b9004f84eb91798db51d4a746cc670575a55adee20e5ab9e55a85cb295534
SHA512ebfdc7e180b6f98a11bb8123fb3279670fc7f263e6f69f574d517c49a4e1ea76bacb0db0279de64dc345ea4f5c418bd85dbd8712838166d7dc8f8283f3c42c1c
-
Filesize
428B
MD5de74ac117042d88ba41481a8d8762d58
SHA10b9bc83b2f4b4867dcda00ade4dd7b42ce8d884c
SHA2563d7f2907e48ae8242207935f444d7d75cd0b15f2291112d35bb103612647872d
SHA512973345e037cf46b5364ccd955927d07ec8666d5923ea6740406527a0170c72b5814598f81bab4d5434dfb36a3acf131ebeec65206b0b7c9bc320f285acc2a612
-
Filesize
2.2MB
MD5b9e718754dc41ee678ac3111c8ee34e8
SHA1d4e2657a0398f3007785923bcae6615bb142151b
SHA2569a9596c54b6a22830258ff88f64f20c16b18baf47a6ce099127f0063fe3075b8
SHA512dd1dfb1eca1e39238cf97dd71234bb15666667497b5b5de28b2aee0f436e296b4d4f3ec6d27a1b94cb926a4f3c7c459074ba1a3f85448563039cc13cbb3bcb20