Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
06/01/2024, 10:01
Static task
static1
Behavioral task
behavioral1
Sample
63c8627a6c976f688318f0525793cf5e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
63c8627a6c976f688318f0525793cf5e.exe
Resource
win10v2004-20231222-en
General
-
Target
63c8627a6c976f688318f0525793cf5e.exe
-
Size
272KB
-
MD5
63c8627a6c976f688318f0525793cf5e
-
SHA1
1043bb40a39e946f82bc8f5d0c572048bef8f716
-
SHA256
e4c9e2f70abb3e8f02e91f3ed7846ab5283da5d19ca481e43e03ae1f4fdc3cae
-
SHA512
c1573736307f1669a0e9730b6e8df2b537763f0208608cda64fce7e5b516663042490450213c0327b6245147e937101fc8d20d63f5b2c08f6cc62c579f11d58b
-
SSDEEP
6144:iOBrgUg0ehFSoLMXUFZTT2PwXIZFge7whRySVVFh:i8c0eTMXUFZTewX4K8S9
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" 63c8627a6c976f688318f0525793cf5e.exe -
Disables taskbar notifications via registry modification
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Executes dropped EXE 1 IoCs
pid Process 1744 F1AF.tmp -
Loads dropped DLL 2 IoCs
pid Process 2484 63c8627a6c976f688318f0525793cf5e.exe 2484 63c8627a6c976f688318f0525793cf5e.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2484-2-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2484-4-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2484-14-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2972-16-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2484-189-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2800-192-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2800-193-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2484-328-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2484-334-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2800-337-0x00000000005C0000-0x00000000006C0000-memory.dmp upx behavioral1/memory/2484-338-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AA8.exe = "C:\\Program Files (x86)\\LP\\A226\\AA8.exe" 63c8627a6c976f688318f0525793cf5e.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\A226\AA8.exe 63c8627a6c976f688318f0525793cf5e.exe File opened for modification C:\Program Files (x86)\LP\A226\F1AF.tmp 63c8627a6c976f688318f0525793cf5e.exe File opened for modification C:\Program Files (x86)\LP\A226\AA8.exe 63c8627a6c976f688318f0525793cf5e.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2484 63c8627a6c976f688318f0525793cf5e.exe 2484 63c8627a6c976f688318f0525793cf5e.exe 2484 63c8627a6c976f688318f0525793cf5e.exe 2484 63c8627a6c976f688318f0525793cf5e.exe 2484 63c8627a6c976f688318f0525793cf5e.exe 2484 63c8627a6c976f688318f0525793cf5e.exe 2484 63c8627a6c976f688318f0525793cf5e.exe 2484 63c8627a6c976f688318f0525793cf5e.exe 2484 63c8627a6c976f688318f0525793cf5e.exe 2484 63c8627a6c976f688318f0525793cf5e.exe 2484 63c8627a6c976f688318f0525793cf5e.exe 2484 63c8627a6c976f688318f0525793cf5e.exe 2484 63c8627a6c976f688318f0525793cf5e.exe 2484 63c8627a6c976f688318f0525793cf5e.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1488 explorer.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeRestorePrivilege 2828 msiexec.exe Token: SeTakeOwnershipPrivilege 2828 msiexec.exe Token: SeSecurityPrivilege 2828 msiexec.exe Token: SeShutdownPrivilege 1488 explorer.exe Token: SeShutdownPrivilege 1488 explorer.exe Token: SeShutdownPrivilege 1488 explorer.exe Token: SeShutdownPrivilege 1488 explorer.exe Token: SeShutdownPrivilege 1488 explorer.exe Token: SeShutdownPrivilege 1488 explorer.exe Token: SeShutdownPrivilege 1488 explorer.exe Token: SeShutdownPrivilege 1488 explorer.exe Token: SeShutdownPrivilege 1488 explorer.exe Token: SeShutdownPrivilege 1488 explorer.exe Token: SeShutdownPrivilege 1488 explorer.exe Token: SeShutdownPrivilege 1488 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe -
Suspicious use of SendNotifyMessage 22 IoCs
pid Process 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe 1488 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2972 2484 63c8627a6c976f688318f0525793cf5e.exe 30 PID 2484 wrote to memory of 2972 2484 63c8627a6c976f688318f0525793cf5e.exe 30 PID 2484 wrote to memory of 2972 2484 63c8627a6c976f688318f0525793cf5e.exe 30 PID 2484 wrote to memory of 2972 2484 63c8627a6c976f688318f0525793cf5e.exe 30 PID 2484 wrote to memory of 2800 2484 63c8627a6c976f688318f0525793cf5e.exe 35 PID 2484 wrote to memory of 2800 2484 63c8627a6c976f688318f0525793cf5e.exe 35 PID 2484 wrote to memory of 2800 2484 63c8627a6c976f688318f0525793cf5e.exe 35 PID 2484 wrote to memory of 2800 2484 63c8627a6c976f688318f0525793cf5e.exe 35 PID 2484 wrote to memory of 1744 2484 63c8627a6c976f688318f0525793cf5e.exe 36 PID 2484 wrote to memory of 1744 2484 63c8627a6c976f688318f0525793cf5e.exe 36 PID 2484 wrote to memory of 1744 2484 63c8627a6c976f688318f0525793cf5e.exe 36 PID 2484 wrote to memory of 1744 2484 63c8627a6c976f688318f0525793cf5e.exe 36 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 63c8627a6c976f688318f0525793cf5e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" 63c8627a6c976f688318f0525793cf5e.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\63c8627a6c976f688318f0525793cf5e.exe"C:\Users\Admin\AppData\Local\Temp\63c8627a6c976f688318f0525793cf5e.exe"1⤵
- Modifies security service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\63c8627a6c976f688318f0525793cf5e.exeC:\Users\Admin\AppData\Local\Temp\63c8627a6c976f688318f0525793cf5e.exe startC:\Users\Admin\AppData\Roaming\65357\558A2.exe%C:\Users\Admin\AppData\Roaming\653572⤵PID:2972
-
-
C:\Users\Admin\AppData\Local\Temp\63c8627a6c976f688318f0525793cf5e.exeC:\Users\Admin\AppData\Local\Temp\63c8627a6c976f688318f0525793cf5e.exe startC:\Program Files (x86)\57608\lvvm.exe%C:\Program Files (x86)\576082⤵PID:2800
-
-
C:\Program Files (x86)\LP\A226\F1AF.tmp"C:\Program Files (x86)\LP\A226\F1AF.tmp"2⤵
- Executes dropped EXE
PID:1744
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1488
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300B
MD57ddf563bf2e623aa9e6ad9c8372bf1eb
SHA11a9f5c7790502ccb819db4f043365e1af83ebf64
SHA25692ba221272e5ed43952fb7d556b023611d94f4de8bf43ab5175ffb086c49171c
SHA512835446dbb670bf5d85b49e01f0ca8db373943e04a23c27cd3fff20876e6105f1875c12dac5598dc1263011152000a7b53fcf8d989f42f70aeb4fb74bb864f9e1
-
Filesize
996B
MD52bf24de5da6303ff38f53ff38b66a6f6
SHA17e0cd22e13037d93b245ce34c2c925707b2a6354
SHA256786c52304e39efc0d5099ae3ba1cf505036cc8d4390822925a15008eca33994e
SHA512d8425c09619e4cae3e063938dfc0be440e9d7818c10a4d2f942bcff2bb45cb685e632b0728075af6a9622b4cdf431099af48f801750af320d82f7b526bbb2037
-
Filesize
1KB
MD5589ed46c979089e22319d0298bcaeb55
SHA18062701c19884350ee3bf4190144f509905d7aea
SHA256581310a50c1ee780b7900a2d9f342d4e6ddb7dcce8716890b18db1550ea41585
SHA512d3bab07e2d00da815bfd9f13d7004fb6c885c23dca85ae5bbfa375a0cce140ae571c46bce1ec57efb39b08087086e1dc50f56dc9eef94e3d543efd685e7dc2ef
-
Filesize
600B
MD588196a2977531d6e2e0aef6edc23aa9d
SHA178bced5d661f1f94e9383f3e75f27328ab414d14
SHA256287ccc2fa5aa560bc6a5bf959a6d66d636783dba49ed48491cc656814492de60
SHA5129cd2842c8eca4a370a38360a271f9dcd6940f85b572afc7d01f01673fc68ef0efd9a0bac51ebf5b81b991e645e9d6949706c22657a62c78309dbdfabaaf96932
-
Filesize
96KB
MD5741a474e68d21807209d21bb48e3b548
SHA17a1532e0612197de8eac689710ba62fe3f880f34
SHA256db72043327449f366ed96882ea4dfbfa5d9fc16b2d804a0746753f71b38e1f52
SHA512800c06cc898d8be33729573f6671b8887afc3dd26d9f1c89a9cf66cb7030d4950de885e632472c315ea8c9a712bb8cc4067dbf8501a993d961cd7990996948cd