Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10/01/2024, 22:13
Static task
static1
Behavioral task
behavioral1
Sample
51c169ee9613134ff19f469ea62497a4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
51c169ee9613134ff19f469ea62497a4.exe
Resource
win10v2004-20231215-en
General
-
Target
51c169ee9613134ff19f469ea62497a4.exe
-
Size
144KB
-
MD5
51c169ee9613134ff19f469ea62497a4
-
SHA1
1a8f40bbc83ad8d1f66295a20a7195904c34338c
-
SHA256
3b5a733b83f48fb79d6ba81e8ca6d3f08fa3db062fb1bae6da7af166f9a9a3c5
-
SHA512
c91d4fc33dac3515a5212930e378e0dd33c4a177086bb600aef27736288bec149866b68e9096ca754e02c7444df7c3b872c497527daf2976c77181d7b1da2c5f
-
SSDEEP
3072:RT7wfo4gaGu3GpRGtXuZV91KQCrq/l4pyXM1nIpfcPv:hnnRGdc9kCks8IW
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 51c169ee9613134ff19f469ea62497a4.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Public\C-76947-8457-2745\winmsnliv.exe = "C:\\Users\\Public\\C-76947-8457-2745\\winmsnliv.exe:*:Enabled:WindowsDriverControl" 51c169ee9613134ff19f469ea62497a4.exe -
Executes dropped EXE 3 IoCs
pid Process 2724 winmsnliv.exe 2620 winmsnliv.exe 2180 winmsnliv.exe -
Loads dropped DLL 2 IoCs
pid Process 2796 51c169ee9613134ff19f469ea62497a4.exe 2796 51c169ee9613134ff19f469ea62497a4.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsDriverControl = "C:\\Users\\Public\\C-76947-8457-2745\\winmsnliv.exe" 51c169ee9613134ff19f469ea62497a4.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 51c169ee9613134ff19f469ea62497a4.exe File opened for modification \??\PhysicalDrive0 winmsnliv.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2908 set thread context of 3040 2908 51c169ee9613134ff19f469ea62497a4.exe 28 PID 3040 set thread context of 2796 3040 51c169ee9613134ff19f469ea62497a4.exe 29 PID 2724 set thread context of 2620 2724 winmsnliv.exe 31 PID 2620 set thread context of 2180 2620 winmsnliv.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2908 51c169ee9613134ff19f469ea62497a4.exe 3040 51c169ee9613134ff19f469ea62497a4.exe 2724 winmsnliv.exe 2620 winmsnliv.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2908 wrote to memory of 3040 2908 51c169ee9613134ff19f469ea62497a4.exe 28 PID 2908 wrote to memory of 3040 2908 51c169ee9613134ff19f469ea62497a4.exe 28 PID 2908 wrote to memory of 3040 2908 51c169ee9613134ff19f469ea62497a4.exe 28 PID 2908 wrote to memory of 3040 2908 51c169ee9613134ff19f469ea62497a4.exe 28 PID 2908 wrote to memory of 3040 2908 51c169ee9613134ff19f469ea62497a4.exe 28 PID 2908 wrote to memory of 3040 2908 51c169ee9613134ff19f469ea62497a4.exe 28 PID 2908 wrote to memory of 3040 2908 51c169ee9613134ff19f469ea62497a4.exe 28 PID 2908 wrote to memory of 3040 2908 51c169ee9613134ff19f469ea62497a4.exe 28 PID 2908 wrote to memory of 3040 2908 51c169ee9613134ff19f469ea62497a4.exe 28 PID 3040 wrote to memory of 2796 3040 51c169ee9613134ff19f469ea62497a4.exe 29 PID 3040 wrote to memory of 2796 3040 51c169ee9613134ff19f469ea62497a4.exe 29 PID 3040 wrote to memory of 2796 3040 51c169ee9613134ff19f469ea62497a4.exe 29 PID 3040 wrote to memory of 2796 3040 51c169ee9613134ff19f469ea62497a4.exe 29 PID 3040 wrote to memory of 2796 3040 51c169ee9613134ff19f469ea62497a4.exe 29 PID 3040 wrote to memory of 2796 3040 51c169ee9613134ff19f469ea62497a4.exe 29 PID 3040 wrote to memory of 2796 3040 51c169ee9613134ff19f469ea62497a4.exe 29 PID 3040 wrote to memory of 2796 3040 51c169ee9613134ff19f469ea62497a4.exe 29 PID 3040 wrote to memory of 2796 3040 51c169ee9613134ff19f469ea62497a4.exe 29 PID 2796 wrote to memory of 2724 2796 51c169ee9613134ff19f469ea62497a4.exe 30 PID 2796 wrote to memory of 2724 2796 51c169ee9613134ff19f469ea62497a4.exe 30 PID 2796 wrote to memory of 2724 2796 51c169ee9613134ff19f469ea62497a4.exe 30 PID 2796 wrote to memory of 2724 2796 51c169ee9613134ff19f469ea62497a4.exe 30 PID 2724 wrote to memory of 2620 2724 winmsnliv.exe 31 PID 2724 wrote to memory of 2620 2724 winmsnliv.exe 31 PID 2724 wrote to memory of 2620 2724 winmsnliv.exe 31 PID 2724 wrote to memory of 2620 2724 winmsnliv.exe 31 PID 2724 wrote to memory of 2620 2724 winmsnliv.exe 31 PID 2724 wrote to memory of 2620 2724 winmsnliv.exe 31 PID 2724 wrote to memory of 2620 2724 winmsnliv.exe 31 PID 2724 wrote to memory of 2620 2724 winmsnliv.exe 31 PID 2724 wrote to memory of 2620 2724 winmsnliv.exe 31 PID 2620 wrote to memory of 2180 2620 winmsnliv.exe 32 PID 2620 wrote to memory of 2180 2620 winmsnliv.exe 32 PID 2620 wrote to memory of 2180 2620 winmsnliv.exe 32 PID 2620 wrote to memory of 2180 2620 winmsnliv.exe 32 PID 2620 wrote to memory of 2180 2620 winmsnliv.exe 32 PID 2620 wrote to memory of 2180 2620 winmsnliv.exe 32 PID 2620 wrote to memory of 2180 2620 winmsnliv.exe 32 PID 2620 wrote to memory of 2180 2620 winmsnliv.exe 32 PID 2620 wrote to memory of 2180 2620 winmsnliv.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\51c169ee9613134ff19f469ea62497a4.exe"C:\Users\Admin\AppData\Local\Temp\51c169ee9613134ff19f469ea62497a4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\51c169ee9613134ff19f469ea62497a4.exe"C:\Users\Admin\AppData\Local\Temp\51c169ee9613134ff19f469ea62497a4.exe"2⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\51c169ee9613134ff19f469ea62497a4.exe"C:\Users\Admin\AppData\Local\Temp\51c169ee9613134ff19f469ea62497a4.exe"3⤵
- Modifies firewall policy service
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Public\C-76947-8457-2745\winmsnliv.exe"C:\Users\Public\C-76947-8457-2745\winmsnliv.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Public\C-76947-8457-2745\winmsnliv.exe"C:\Users\Public\C-76947-8457-2745\winmsnliv.exe"5⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Public\C-76947-8457-2745\winmsnliv.exe"C:\Users\Public\C-76947-8457-2745\winmsnliv.exe"6⤵
- Executes dropped EXE
PID:2180
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144KB
MD551c169ee9613134ff19f469ea62497a4
SHA11a8f40bbc83ad8d1f66295a20a7195904c34338c
SHA2563b5a733b83f48fb79d6ba81e8ca6d3f08fa3db062fb1bae6da7af166f9a9a3c5
SHA512c91d4fc33dac3515a5212930e378e0dd33c4a177086bb600aef27736288bec149866b68e9096ca754e02c7444df7c3b872c497527daf2976c77181d7b1da2c5f