Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
24s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05/01/2024, 04:42
Static task
static1
Behavioral task
behavioral1
Sample
42c8d6e62450936d2f72ca5446744903.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
42c8d6e62450936d2f72ca5446744903.exe
Resource
win10v2004-20231222-en
General
-
Target
42c8d6e62450936d2f72ca5446744903.exe
-
Size
282KB
-
MD5
42c8d6e62450936d2f72ca5446744903
-
SHA1
56c6ecdfb3e2f4aead73f913fdef1bc929eacf22
-
SHA256
bff99db18fcc1668218698292bb23e804a7b6abed80af194347785f9db7e59a7
-
SHA512
aab9e5f27eba15bb49f7c5908b1b08f1c740e5f4dc03cbb738ae73bda4ce8f1f3c5f3f60d23730e5837e240889ee699e763eaf90d5cbb6522d9a7757a12b2c35
-
SSDEEP
6144:crPrPEYF57R69Um+nEY0kqk4PXzCPamiHtRNCI6X:2PXF9R6ym+skK07mKX
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" 42c8d6e62450936d2f72ca5446744903.exe -
Disables taskbar notifications via registry modification
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2324-1-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/776-44-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/776-43-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2324-46-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2324-130-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1900-133-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2324-136-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2324-218-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1900-220-0x00000000020F0000-0x00000000021F0000-memory.dmp upx behavioral1/memory/2324-223-0x0000000000400000-0x000000000046C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\079.exe = "C:\\Program Files (x86)\\LP\\C90F\\079.exe" 42c8d6e62450936d2f72ca5446744903.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\LP\C90F\079.exe 42c8d6e62450936d2f72ca5446744903.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2324 42c8d6e62450936d2f72ca5446744903.exe 2324 42c8d6e62450936d2f72ca5446744903.exe 2324 42c8d6e62450936d2f72ca5446744903.exe 2324 42c8d6e62450936d2f72ca5446744903.exe 2324 42c8d6e62450936d2f72ca5446744903.exe 2324 42c8d6e62450936d2f72ca5446744903.exe 2324 42c8d6e62450936d2f72ca5446744903.exe 2324 42c8d6e62450936d2f72ca5446744903.exe 2324 42c8d6e62450936d2f72ca5446744903.exe 2324 42c8d6e62450936d2f72ca5446744903.exe 2324 42c8d6e62450936d2f72ca5446744903.exe 2324 42c8d6e62450936d2f72ca5446744903.exe 2324 42c8d6e62450936d2f72ca5446744903.exe 2324 42c8d6e62450936d2f72ca5446744903.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeRestorePrivilege 2832 msiexec.exe Token: SeTakeOwnershipPrivilege 2832 msiexec.exe Token: SeSecurityPrivilege 2832 msiexec.exe Token: SeShutdownPrivilege 2196 explorer.exe Token: SeShutdownPrivilege 2196 explorer.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2324 wrote to memory of 776 2324 42c8d6e62450936d2f72ca5446744903.exe 31 PID 2324 wrote to memory of 776 2324 42c8d6e62450936d2f72ca5446744903.exe 31 PID 2324 wrote to memory of 776 2324 42c8d6e62450936d2f72ca5446744903.exe 31 PID 2324 wrote to memory of 776 2324 42c8d6e62450936d2f72ca5446744903.exe 31 PID 2324 wrote to memory of 1900 2324 42c8d6e62450936d2f72ca5446744903.exe 32 PID 2324 wrote to memory of 1900 2324 42c8d6e62450936d2f72ca5446744903.exe 32 PID 2324 wrote to memory of 1900 2324 42c8d6e62450936d2f72ca5446744903.exe 32 PID 2324 wrote to memory of 1900 2324 42c8d6e62450936d2f72ca5446744903.exe 32 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 42c8d6e62450936d2f72ca5446744903.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" 42c8d6e62450936d2f72ca5446744903.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\42c8d6e62450936d2f72ca5446744903.exe"C:\Users\Admin\AppData\Local\Temp\42c8d6e62450936d2f72ca5446744903.exe"1⤵
- Modifies security service
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\42c8d6e62450936d2f72ca5446744903.exeC:\Users\Admin\AppData\Local\Temp\42c8d6e62450936d2f72ca5446744903.exe startC:\Users\Admin\AppData\Roaming\F806D\A24C9.exe%C:\Users\Admin\AppData\Roaming\F806D2⤵PID:776
-
-
C:\Users\Admin\AppData\Local\Temp\42c8d6e62450936d2f72ca5446744903.exeC:\Users\Admin\AppData\Local\Temp\42c8d6e62450936d2f72ca5446744903.exe startC:\Program Files (x86)\6D081\lvvm.exe%C:\Program Files (x86)\6D0812⤵PID:1900
-
-
C:\Program Files (x86)\LP\C90F\8D03.tmp"C:\Program Files (x86)\LP\C90F\8D03.tmp"2⤵PID:2752
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Suspicious use of AdjustPrivilegeToken
PID:2196
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1