Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06/01/2024, 23:27
Static task
static1
Behavioral task
behavioral1
Sample
4770b1b34dd46ebbf01d2aae352cd199.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4770b1b34dd46ebbf01d2aae352cd199.exe
Resource
win10v2004-20231215-en
General
-
Target
4770b1b34dd46ebbf01d2aae352cd199.exe
-
Size
11KB
-
MD5
4770b1b34dd46ebbf01d2aae352cd199
-
SHA1
ad4d4e37a5c071c3f0ca064bae415a5f1e7f53bb
-
SHA256
90321be8cee235e44256be0128519bca1eaebf5b52880a1c0d9b3d087795c489
-
SHA512
7ff45339d8d1f1a91e8388d27c94672d9989b20eb65c147d6e0d0ca64cccc5f66295ba4e2dab4cff46e8665c71208f304b7a2d3579714cd22346f9004dff4b30
-
SSDEEP
192:Iuh4jDHPGc0eFNzdXYmpE3pTmTIWU8HWqOANOXMde61EattPmXFNYf+553N5kVmm:mjDOc0eb6m8ZmT3U4Wq9O9+EUtPSFNYn
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\kbdswjr.dll = "{00120012-0012-0012-0012-00120012BB15}" 4770b1b34dd46ebbf01d2aae352cd199.exe -
Deletes itself 1 IoCs
pid Process 2912 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2540 4770b1b34dd46ebbf01d2aae352cd199.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\kbdswjr.tmp 4770b1b34dd46ebbf01d2aae352cd199.exe File opened for modification C:\Windows\SysWOW64\kbdswjr.tmp 4770b1b34dd46ebbf01d2aae352cd199.exe File opened for modification C:\Windows\SysWOW64\kbdswjr.nls 4770b1b34dd46ebbf01d2aae352cd199.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00120012-0012-0012-0012-00120012BB15} 4770b1b34dd46ebbf01d2aae352cd199.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00120012-0012-0012-0012-00120012BB15}\InProcServer32 4770b1b34dd46ebbf01d2aae352cd199.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00120012-0012-0012-0012-00120012BB15}\InProcServer32\ = "C:\\Windows\\SysWow64\\kbdswjr.dll" 4770b1b34dd46ebbf01d2aae352cd199.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{00120012-0012-0012-0012-00120012BB15}\InProcServer32\ThreadingModel = "Apartment" 4770b1b34dd46ebbf01d2aae352cd199.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2540 4770b1b34dd46ebbf01d2aae352cd199.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2540 4770b1b34dd46ebbf01d2aae352cd199.exe 2540 4770b1b34dd46ebbf01d2aae352cd199.exe 2540 4770b1b34dd46ebbf01d2aae352cd199.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2912 2540 4770b1b34dd46ebbf01d2aae352cd199.exe 29 PID 2540 wrote to memory of 2912 2540 4770b1b34dd46ebbf01d2aae352cd199.exe 29 PID 2540 wrote to memory of 2912 2540 4770b1b34dd46ebbf01d2aae352cd199.exe 29 PID 2540 wrote to memory of 2912 2540 4770b1b34dd46ebbf01d2aae352cd199.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4770b1b34dd46ebbf01d2aae352cd199.exe"C:\Users\Admin\AppData\Local\Temp\4770b1b34dd46ebbf01d2aae352cd199.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\DEEA.tmp.bat2⤵
- Deletes itself
PID:2912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
179B
MD5cc18dd1180d972b944d9adb3627fcab8
SHA18c75b492b1e3b9ccf3d60d9abdd90bc8136e4009
SHA2567f5b3f0020be23a8b657d8649688fb70fc24b90497074cf6c100a7296b97303e
SHA5121569074aabf4dd6d39487ca142baba9dbeaf04ec4a40d161ebcb806137fa9dd003543568fa9461fac4c5ea1f2808d41c6ba6dfbcf0562657e69b8edf19a5107f
-
Filesize
967KB
MD50527372008b21552b41ddf4a6e0319d1
SHA1a7ce48002235d13d954da439e8f11a326661058d
SHA256f01152ffe16b617f512f7a2a215260c3c9fd45bd8d6369b076b4e5a7031100d8
SHA512d00d3dceb8f403fadf82ce55ad30406535806828546e65844a882a4d8e53a476726a7a20f390215c0134851259d5086e1870319a3a85fe833aa364897217ebec