Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
161s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 19:11
Static task
static1
Behavioral task
behavioral1
Sample
a31d59e190008f0a3a2abc334c6ce9f9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a31d59e190008f0a3a2abc334c6ce9f9.exe
Resource
win10v2004-20231215-en
General
-
Target
a31d59e190008f0a3a2abc334c6ce9f9.exe
-
Size
828KB
-
MD5
a31d59e190008f0a3a2abc334c6ce9f9
-
SHA1
37456e8559512dff814b09f9ca3710517148f8f2
-
SHA256
27e663cc439cf3ff7b2f66260a851c8cf0ea5292d259bd1c22171685017dbd4c
-
SHA512
47bdeb93ec8e8b659d3279c43524b4410bb91fc8b96e6f3a8044f189d91269b9e0d3fa236063f2fc05c12cf73777079f6e84f4b935e8122c095e85e525b49d75
-
SSDEEP
24576:Gqv5LEymyQvPvS8cZTouk1wRhZ2Bq8aChQ:GqBL1AXvA0B1lw8/hQ
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" a31d59e190008f0a3a2abc334c6ce9f9.exe -
Executes dropped EXE 3 IoCs
pid Process 3048 msdcsc.exe 2740 msdcsc.exe 2108 msdcsc.exe -
Loads dropped DLL 2 IoCs
pid Process 2296 a31d59e190008f0a3a2abc334c6ce9f9.exe 2296 a31d59e190008f0a3a2abc334c6ce9f9.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" a31d59e190008f0a3a2abc334c6ce9f9.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 a31d59e190008f0a3a2abc334c6ce9f9.exe File opened for modification \??\PhysicalDrive0 msdcsc.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2416 set thread context of 1692 2416 a31d59e190008f0a3a2abc334c6ce9f9.exe 28 PID 1692 set thread context of 2296 1692 a31d59e190008f0a3a2abc334c6ce9f9.exe 29 PID 3048 set thread context of 2740 3048 msdcsc.exe 31 PID 2740 set thread context of 2108 2740 msdcsc.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2296 a31d59e190008f0a3a2abc334c6ce9f9.exe Token: SeSecurityPrivilege 2296 a31d59e190008f0a3a2abc334c6ce9f9.exe Token: SeTakeOwnershipPrivilege 2296 a31d59e190008f0a3a2abc334c6ce9f9.exe Token: SeLoadDriverPrivilege 2296 a31d59e190008f0a3a2abc334c6ce9f9.exe Token: SeSystemProfilePrivilege 2296 a31d59e190008f0a3a2abc334c6ce9f9.exe Token: SeSystemtimePrivilege 2296 a31d59e190008f0a3a2abc334c6ce9f9.exe Token: SeProfSingleProcessPrivilege 2296 a31d59e190008f0a3a2abc334c6ce9f9.exe Token: SeIncBasePriorityPrivilege 2296 a31d59e190008f0a3a2abc334c6ce9f9.exe Token: SeCreatePagefilePrivilege 2296 a31d59e190008f0a3a2abc334c6ce9f9.exe Token: SeBackupPrivilege 2296 a31d59e190008f0a3a2abc334c6ce9f9.exe Token: SeRestorePrivilege 2296 a31d59e190008f0a3a2abc334c6ce9f9.exe Token: SeShutdownPrivilege 2296 a31d59e190008f0a3a2abc334c6ce9f9.exe Token: SeDebugPrivilege 2296 a31d59e190008f0a3a2abc334c6ce9f9.exe Token: SeSystemEnvironmentPrivilege 2296 a31d59e190008f0a3a2abc334c6ce9f9.exe Token: SeChangeNotifyPrivilege 2296 a31d59e190008f0a3a2abc334c6ce9f9.exe Token: SeRemoteShutdownPrivilege 2296 a31d59e190008f0a3a2abc334c6ce9f9.exe Token: SeUndockPrivilege 2296 a31d59e190008f0a3a2abc334c6ce9f9.exe Token: SeManageVolumePrivilege 2296 a31d59e190008f0a3a2abc334c6ce9f9.exe Token: SeImpersonatePrivilege 2296 a31d59e190008f0a3a2abc334c6ce9f9.exe Token: SeCreateGlobalPrivilege 2296 a31d59e190008f0a3a2abc334c6ce9f9.exe Token: 33 2296 a31d59e190008f0a3a2abc334c6ce9f9.exe Token: 34 2296 a31d59e190008f0a3a2abc334c6ce9f9.exe Token: 35 2296 a31d59e190008f0a3a2abc334c6ce9f9.exe Token: SeIncreaseQuotaPrivilege 2108 msdcsc.exe Token: SeSecurityPrivilege 2108 msdcsc.exe Token: SeTakeOwnershipPrivilege 2108 msdcsc.exe Token: SeLoadDriverPrivilege 2108 msdcsc.exe Token: SeSystemProfilePrivilege 2108 msdcsc.exe Token: SeSystemtimePrivilege 2108 msdcsc.exe Token: SeProfSingleProcessPrivilege 2108 msdcsc.exe Token: SeIncBasePriorityPrivilege 2108 msdcsc.exe Token: SeCreatePagefilePrivilege 2108 msdcsc.exe Token: SeBackupPrivilege 2108 msdcsc.exe Token: SeRestorePrivilege 2108 msdcsc.exe Token: SeShutdownPrivilege 2108 msdcsc.exe Token: SeDebugPrivilege 2108 msdcsc.exe Token: SeSystemEnvironmentPrivilege 2108 msdcsc.exe Token: SeChangeNotifyPrivilege 2108 msdcsc.exe Token: SeRemoteShutdownPrivilege 2108 msdcsc.exe Token: SeUndockPrivilege 2108 msdcsc.exe Token: SeManageVolumePrivilege 2108 msdcsc.exe Token: SeImpersonatePrivilege 2108 msdcsc.exe Token: SeCreateGlobalPrivilege 2108 msdcsc.exe Token: 33 2108 msdcsc.exe Token: 34 2108 msdcsc.exe Token: 35 2108 msdcsc.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2416 a31d59e190008f0a3a2abc334c6ce9f9.exe 1692 a31d59e190008f0a3a2abc334c6ce9f9.exe 3048 msdcsc.exe 2740 msdcsc.exe 2108 msdcsc.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2416 wrote to memory of 1692 2416 a31d59e190008f0a3a2abc334c6ce9f9.exe 28 PID 2416 wrote to memory of 1692 2416 a31d59e190008f0a3a2abc334c6ce9f9.exe 28 PID 2416 wrote to memory of 1692 2416 a31d59e190008f0a3a2abc334c6ce9f9.exe 28 PID 2416 wrote to memory of 1692 2416 a31d59e190008f0a3a2abc334c6ce9f9.exe 28 PID 2416 wrote to memory of 1692 2416 a31d59e190008f0a3a2abc334c6ce9f9.exe 28 PID 2416 wrote to memory of 1692 2416 a31d59e190008f0a3a2abc334c6ce9f9.exe 28 PID 2416 wrote to memory of 1692 2416 a31d59e190008f0a3a2abc334c6ce9f9.exe 28 PID 2416 wrote to memory of 1692 2416 a31d59e190008f0a3a2abc334c6ce9f9.exe 28 PID 2416 wrote to memory of 1692 2416 a31d59e190008f0a3a2abc334c6ce9f9.exe 28 PID 1692 wrote to memory of 2296 1692 a31d59e190008f0a3a2abc334c6ce9f9.exe 29 PID 1692 wrote to memory of 2296 1692 a31d59e190008f0a3a2abc334c6ce9f9.exe 29 PID 1692 wrote to memory of 2296 1692 a31d59e190008f0a3a2abc334c6ce9f9.exe 29 PID 1692 wrote to memory of 2296 1692 a31d59e190008f0a3a2abc334c6ce9f9.exe 29 PID 1692 wrote to memory of 2296 1692 a31d59e190008f0a3a2abc334c6ce9f9.exe 29 PID 1692 wrote to memory of 2296 1692 a31d59e190008f0a3a2abc334c6ce9f9.exe 29 PID 1692 wrote to memory of 2296 1692 a31d59e190008f0a3a2abc334c6ce9f9.exe 29 PID 1692 wrote to memory of 2296 1692 a31d59e190008f0a3a2abc334c6ce9f9.exe 29 PID 1692 wrote to memory of 2296 1692 a31d59e190008f0a3a2abc334c6ce9f9.exe 29 PID 1692 wrote to memory of 2296 1692 a31d59e190008f0a3a2abc334c6ce9f9.exe 29 PID 1692 wrote to memory of 2296 1692 a31d59e190008f0a3a2abc334c6ce9f9.exe 29 PID 1692 wrote to memory of 2296 1692 a31d59e190008f0a3a2abc334c6ce9f9.exe 29 PID 1692 wrote to memory of 2296 1692 a31d59e190008f0a3a2abc334c6ce9f9.exe 29 PID 2296 wrote to memory of 3048 2296 a31d59e190008f0a3a2abc334c6ce9f9.exe 30 PID 2296 wrote to memory of 3048 2296 a31d59e190008f0a3a2abc334c6ce9f9.exe 30 PID 2296 wrote to memory of 3048 2296 a31d59e190008f0a3a2abc334c6ce9f9.exe 30 PID 2296 wrote to memory of 3048 2296 a31d59e190008f0a3a2abc334c6ce9f9.exe 30 PID 3048 wrote to memory of 2740 3048 msdcsc.exe 31 PID 3048 wrote to memory of 2740 3048 msdcsc.exe 31 PID 3048 wrote to memory of 2740 3048 msdcsc.exe 31 PID 3048 wrote to memory of 2740 3048 msdcsc.exe 31 PID 3048 wrote to memory of 2740 3048 msdcsc.exe 31 PID 3048 wrote to memory of 2740 3048 msdcsc.exe 31 PID 3048 wrote to memory of 2740 3048 msdcsc.exe 31 PID 3048 wrote to memory of 2740 3048 msdcsc.exe 31 PID 3048 wrote to memory of 2740 3048 msdcsc.exe 31 PID 2740 wrote to memory of 2108 2740 msdcsc.exe 32 PID 2740 wrote to memory of 2108 2740 msdcsc.exe 32 PID 2740 wrote to memory of 2108 2740 msdcsc.exe 32 PID 2740 wrote to memory of 2108 2740 msdcsc.exe 32 PID 2740 wrote to memory of 2108 2740 msdcsc.exe 32 PID 2740 wrote to memory of 2108 2740 msdcsc.exe 32 PID 2740 wrote to memory of 2108 2740 msdcsc.exe 32 PID 2740 wrote to memory of 2108 2740 msdcsc.exe 32 PID 2740 wrote to memory of 2108 2740 msdcsc.exe 32 PID 2740 wrote to memory of 2108 2740 msdcsc.exe 32 PID 2740 wrote to memory of 2108 2740 msdcsc.exe 32 PID 2740 wrote to memory of 2108 2740 msdcsc.exe 32 PID 2740 wrote to memory of 2108 2740 msdcsc.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\a31d59e190008f0a3a2abc334c6ce9f9.exe"C:\Users\Admin\AppData\Local\Temp\a31d59e190008f0a3a2abc334c6ce9f9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\a31d59e190008f0a3a2abc334c6ce9f9.exe"C:\Users\Admin\AppData\Local\Temp\a31d59e190008f0a3a2abc334c6ce9f9.exe"2⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\a31d59e190008f0a3a2abc334c6ce9f9.exe"C:\Users\Admin\AppData\Local\Temp\a31d59e190008f0a3a2abc334c6ce9f9.exe"3⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"5⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2108
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD5147524926a4886fe607c30ba89ba0e9c
SHA13828b4e3a78e6f831749142d0f0a43dd965797f8
SHA2569336eb9543c4c18d720231f1c0d8193feab45ae92643db37e7b60c633a0efee7
SHA512850a40516faafb4212546b017caffe781bc4d63bac8e5446b9e5ac9a62cd9028eaa4b652c23fb636a2487f82e1f7449efa802c85f7371b6fa757d31b4ffc805a
-
Filesize
76KB
MD5a1c37cf4aaf204dfef936d85dc814af6
SHA13fba4873d75db51e0f0653d3a696a3195b12d9f5
SHA2567a11eb0d1eb690afd3cc5ac08401aec53a17042ea3c33165d502b5ae44109d4c
SHA512e58bdaabb13bda5f8d026fbf7a749d01edb7b5cf98bb2123c570ff4d965d58a8a6183747e8456868f6c91acbc45cf9f3720edbe7d4f62a9d91247df2f7befc1a
-
Filesize
828KB
MD5a31d59e190008f0a3a2abc334c6ce9f9
SHA137456e8559512dff814b09f9ca3710517148f8f2
SHA25627e663cc439cf3ff7b2f66260a851c8cf0ea5292d259bd1c22171685017dbd4c
SHA51247bdeb93ec8e8b659d3279c43524b4410bb91fc8b96e6f3a8044f189d91269b9e0d3fa236063f2fc05c12cf73777079f6e84f4b935e8122c095e85e525b49d75
-
Filesize
19KB
MD575c9c65f97d7b68282f9c73b6cd5ceb7
SHA1cb7921a9ec8f8a2df4b598be50078e1f56652ca5
SHA256e280e44b3102388f523df9efd9419776bdd1b0202961c6101294e15aca53858a
SHA5120a8db6d67b4c64fd09a0c0c619d16c79a92d566fdf73d72d2b00e1c133339b4fc6aaa3264cd4510e5aad0225ed845f63836b0adf35e4ff937876c99befd18363
-
Filesize
46KB
MD5024492dcc74c59f61fc5ee0debb1dbca
SHA1c7c7510d57de54cb8ea3e6170c543e5c6e434122
SHA256d76c2b1f2aa31ed72f04fd5372f78c9fea43c36a9891c0e6bda5e33687623f00
SHA5123061520c8530960bd750a428cf754b1d10e81dc4beca9cf3d5dbe1dc3fe81b5e1cc1cfb7c6870f2ed5ba3fad36f9a83c180e6033e55e7e876452152370b24f42