Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
154s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 19:35
Static task
static1
Behavioral task
behavioral1
Sample
54651254208d18cd5567ce9f562936fb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
54651254208d18cd5567ce9f562936fb.exe
Resource
win10v2004-20231222-en
General
-
Target
54651254208d18cd5567ce9f562936fb.exe
-
Size
228KB
-
MD5
54651254208d18cd5567ce9f562936fb
-
SHA1
6fca7f77ff8235dc481fae1b3b53eab820825b1b
-
SHA256
8df3d3ed6875932be1c80b67d11f05f3d85260d4399fa6d9b6d36806955adb4e
-
SHA512
c70491ff1615a30a5c2b5773ca9ed6cdf8e6dc49558666aa36500c371c9e52b17093c6b9d05b301aa6bdf6794b864ad7654b003a7cad375338fa2e19ede4c695
-
SSDEEP
6144:7n53PFKs7H4p7+8EqxF6snji81RUinK6:T1Phu
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 54651254208d18cd5567ce9f562936fb.exe Set value (int) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" kngood.exe -
Executes dropped EXE 1 IoCs
pid Process 2716 kngood.exe -
Loads dropped DLL 2 IoCs
pid Process 1752 54651254208d18cd5567ce9f562936fb.exe 1752 54651254208d18cd5567ce9f562936fb.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\kngood = "C:\\Users\\Admin\\kngood.exe /c" 54651254208d18cd5567ce9f562936fb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\kngood = "C:\\Users\\Admin\\kngood.exe /i" kngood.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\kngood = "C:\\Users\\Admin\\kngood.exe /g" kngood.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\kngood = "C:\\Users\\Admin\\kngood.exe /u" kngood.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\kngood = "C:\\Users\\Admin\\kngood.exe /s" kngood.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\kngood = "C:\\Users\\Admin\\kngood.exe /n" kngood.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\kngood = "C:\\Users\\Admin\\kngood.exe /v" kngood.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\kngood = "C:\\Users\\Admin\\kngood.exe /x" kngood.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\kngood = "C:\\Users\\Admin\\kngood.exe /t" kngood.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\kngood = "C:\\Users\\Admin\\kngood.exe /y" kngood.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\kngood = "C:\\Users\\Admin\\kngood.exe /k" kngood.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\kngood = "C:\\Users\\Admin\\kngood.exe /d" kngood.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\kngood = "C:\\Users\\Admin\\kngood.exe /c" kngood.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\kngood = "C:\\Users\\Admin\\kngood.exe /b" kngood.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\kngood = "C:\\Users\\Admin\\kngood.exe /h" kngood.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\kngood = "C:\\Users\\Admin\\kngood.exe /e" kngood.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\kngood = "C:\\Users\\Admin\\kngood.exe /j" kngood.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\kngood = "C:\\Users\\Admin\\kngood.exe /r" kngood.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\kngood = "C:\\Users\\Admin\\kngood.exe /f" kngood.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\kngood = "C:\\Users\\Admin\\kngood.exe /q" kngood.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\kngood = "C:\\Users\\Admin\\kngood.exe /l" kngood.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\kngood = "C:\\Users\\Admin\\kngood.exe /p" kngood.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\kngood = "C:\\Users\\Admin\\kngood.exe /o" kngood.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\kngood = "C:\\Users\\Admin\\kngood.exe /w" kngood.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\kngood = "C:\\Users\\Admin\\kngood.exe /m" kngood.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\kngood = "C:\\Users\\Admin\\kngood.exe /a" kngood.exe Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Microsoft\Windows\CurrentVersion\Run\kngood = "C:\\Users\\Admin\\kngood.exe /z" kngood.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1752 54651254208d18cd5567ce9f562936fb.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe 2716 kngood.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1752 54651254208d18cd5567ce9f562936fb.exe 2716 kngood.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1752 wrote to memory of 2716 1752 54651254208d18cd5567ce9f562936fb.exe 28 PID 1752 wrote to memory of 2716 1752 54651254208d18cd5567ce9f562936fb.exe 28 PID 1752 wrote to memory of 2716 1752 54651254208d18cd5567ce9f562936fb.exe 28 PID 1752 wrote to memory of 2716 1752 54651254208d18cd5567ce9f562936fb.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\54651254208d18cd5567ce9f562936fb.exe"C:\Users\Admin\AppData\Local\Temp\54651254208d18cd5567ce9f562936fb.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\kngood.exe"C:\Users\Admin\kngood.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2716
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5067bd57e93bdf8c1354b2c1252cf3a02
SHA19f12c76755770e523254fb5eb4bdb68d4b729261
SHA256a88f35ecec72b5d6b467f075bd0ad63eae0ccae7c3394ec48742ad6dc1176cc0
SHA512a6efce3a5de0e70439386c7257b727d0bc2213f7898bf5f25946fb3acc8ec76f31591f6fd430678d69bf3abb2a45959efc3d58012856d4dde19d2abe670f81ca
-
Filesize
228KB
MD5eae2f938eecfdc30e363ed36703d5981
SHA1703191cc1c0d99a182475f6bc66c79a643a6b5f6
SHA256fb533cf09838a4aa174269edbd93a8d79dc41edc3a01fa8984893bc90d0c1c66
SHA51278101e5fe0de3952ea3ded8fc0fd3ed68c77317572bd54695906ae8b937cc43151126a98a1c51028ef0576131b866b295681d4518345b5ff42c3d3684b73511a
-
Filesize
192KB
MD5159b9f75ef1f5225e74c1a601090a4ea
SHA1c266abf79cd561a105c4e0325897a3ef2fc1a120
SHA256b157cb40dba7b323aa9e443e24e9902003700c8d5701ee6eb3f193cbd065c2c4
SHA5129c456d3e4bae44399995a770efa58c18142e73f0b87584f882532b0f4b16b96461a9821a1cc99c65f4c14a391fc2cb2fd947820eaba1aa2241afb939f2ae783c