Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
12/01/2024, 03:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
555a1eec596af5ecb4a6aff7944687d1.exe
Resource
win7-20231129-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
555a1eec596af5ecb4a6aff7944687d1.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
555a1eec596af5ecb4a6aff7944687d1.exe
-
Size
445KB
-
MD5
555a1eec596af5ecb4a6aff7944687d1
-
SHA1
276a07057ced21ecf7060cf5184bda2e64977626
-
SHA256
e4c7e3f4ad123575676d72e2607862d7590381aa8b131786a3b5571c65da5d7c
-
SHA512
9a2f2e2ceb0c58be4e7cf34e01e83feab28461935f1b83f8898d2c653b747b75e50a3f7c19ed470db475bbc2aeaa0fb16b195da26c67b67f5705ff3a6855f83f
-
SSDEEP
6144:MA8u1rX7YsuEtPaqYYIJ4m/a5iULyptqCeGn4tmiFQBDO86V/hl1UsVwfXpgG2NP:b8uFXp3Pa10240iuBNGhl1Usc
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rundll32 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\555a1eec596af5ecb4a6aff7944687d1.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rundll32 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\555a1eec596af5ecb4a6aff7944687d1.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rundll32 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\555a1eec596af5ecb4a6aff7944687d1.exe" REG.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rundll32 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\555a1eec596af5ecb4a6aff7944687d1.exe" REG.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main 555a1eec596af5ecb4a6aff7944687d1.exe Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main REG.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.mbuscas.com" REG.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2168 555a1eec596af5ecb4a6aff7944687d1.exe 2168 555a1eec596af5ecb4a6aff7944687d1.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2320 2168 555a1eec596af5ecb4a6aff7944687d1.exe 28 PID 2168 wrote to memory of 2320 2168 555a1eec596af5ecb4a6aff7944687d1.exe 28 PID 2168 wrote to memory of 2320 2168 555a1eec596af5ecb4a6aff7944687d1.exe 28 PID 2168 wrote to memory of 2320 2168 555a1eec596af5ecb4a6aff7944687d1.exe 28 PID 2168 wrote to memory of 1812 2168 555a1eec596af5ecb4a6aff7944687d1.exe 29 PID 2168 wrote to memory of 1812 2168 555a1eec596af5ecb4a6aff7944687d1.exe 29 PID 2168 wrote to memory of 1812 2168 555a1eec596af5ecb4a6aff7944687d1.exe 29 PID 2168 wrote to memory of 1812 2168 555a1eec596af5ecb4a6aff7944687d1.exe 29 PID 2168 wrote to memory of 2368 2168 555a1eec596af5ecb4a6aff7944687d1.exe 31 PID 2168 wrote to memory of 2368 2168 555a1eec596af5ecb4a6aff7944687d1.exe 31 PID 2168 wrote to memory of 2368 2168 555a1eec596af5ecb4a6aff7944687d1.exe 31 PID 2168 wrote to memory of 2368 2168 555a1eec596af5ecb4a6aff7944687d1.exe 31 PID 2168 wrote to memory of 2932 2168 555a1eec596af5ecb4a6aff7944687d1.exe 34 PID 2168 wrote to memory of 2932 2168 555a1eec596af5ecb4a6aff7944687d1.exe 34 PID 2168 wrote to memory of 2932 2168 555a1eec596af5ecb4a6aff7944687d1.exe 34 PID 2168 wrote to memory of 2932 2168 555a1eec596af5ecb4a6aff7944687d1.exe 34 PID 2168 wrote to memory of 1080 2168 555a1eec596af5ecb4a6aff7944687d1.exe 38 PID 2168 wrote to memory of 1080 2168 555a1eec596af5ecb4a6aff7944687d1.exe 38 PID 2168 wrote to memory of 1080 2168 555a1eec596af5ecb4a6aff7944687d1.exe 38 PID 2168 wrote to memory of 1080 2168 555a1eec596af5ecb4a6aff7944687d1.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\555a1eec596af5ecb4a6aff7944687d1.exe"C:\Users\Admin\AppData\Local\Temp\555a1eec596af5ecb4a6aff7944687d1.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /V "Rundll32" /T REG_SZ /D C:\Users\Admin\AppData\Local\Temp\555a1eec596af5ecb4a6aff7944687d1.exe /F2⤵
- Adds Run key to start application
PID:2320
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /V "Rundll32" /T REG_SZ /D C:\Users\Admin\AppData\Local\Temp\555a1eec596af5ecb4a6aff7944687d1.exe /F2⤵
- Adds Run key to start application
PID:1812
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /V "Rundll32" /T REG_SZ /D C:\Users\Admin\AppData\Local\Temp\555a1eec596af5ecb4a6aff7944687d1.exe /F2⤵
- Adds Run key to start application
PID:2368
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /V "Rundll32" /T REG_SZ /D C:\Users\Admin\AppData\Local\Temp\555a1eec596af5ecb4a6aff7944687d1.exe /F2⤵
- Adds Run key to start application
PID:2932
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /V "Start Page" /T REG_SZ /D http://www.mbuscas.com /F2⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
PID:1080
-