Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/01/2024, 09:07
Static task
static1
Behavioral task
behavioral1
Sample
673b038fe6b21d1d4e69029e6837037f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
673b038fe6b21d1d4e69029e6837037f.exe
Resource
win10v2004-20231215-en
General
-
Target
673b038fe6b21d1d4e69029e6837037f.exe
-
Size
448KB
-
MD5
673b038fe6b21d1d4e69029e6837037f
-
SHA1
818b11ba12f8ea007a2d740b44ed09db8ea539d7
-
SHA256
600de0d6adb5dda080a4a6cb2b8860d5f104fc628b9a3e34b85d3e844b15f8e4
-
SHA512
4a8f4af37f97349fe524afabdd7e0598b25ab72f97e4b190474a211e069da23536a27fd4a27d4fb01c86cc7217b578383d6f6556b4037cc9461df908c4384fc3
-
SSDEEP
12288:ilQRH00qY1mOKouCzFMHVui7gBcszKAANbGV:pHyY1mhr7QcsZCb0
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Executes dropped EXE 1 IoCs
pid Process 2660 uiCFgiloyP.exe -
Loads dropped DLL 2 IoCs
pid Process 616 673b038fe6b21d1d4e69029e6837037f.exe 616 673b038fe6b21d1d4e69029e6837037f.exe -
resource yara_rule behavioral1/memory/616-3-0x0000000000600000-0x0000000000675000-memory.dmp upx behavioral1/memory/2660-15-0x0000000000600000-0x0000000000675000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows\CurrentVersion\Run\uiCFgiloyP = "C:\\ProgramData\\uiCFgiloyP.exe" 673b038fe6b21d1d4e69029e6837037f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Download 673b038fe6b21d1d4e69029e6837037f.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" 673b038fe6b21d1d4e69029e6837037f.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 616 673b038fe6b21d1d4e69029e6837037f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 616 wrote to memory of 2660 616 673b038fe6b21d1d4e69029e6837037f.exe 28 PID 616 wrote to memory of 2660 616 673b038fe6b21d1d4e69029e6837037f.exe 28 PID 616 wrote to memory of 2660 616 673b038fe6b21d1d4e69029e6837037f.exe 28 PID 616 wrote to memory of 2660 616 673b038fe6b21d1d4e69029e6837037f.exe 28 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 673b038fe6b21d1d4e69029e6837037f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" 673b038fe6b21d1d4e69029e6837037f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\673b038fe6b21d1d4e69029e6837037f.exe"C:\Users\Admin\AppData\Local\Temp\673b038fe6b21d1d4e69029e6837037f.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
- System policy modification
PID:616 -
C:\ProgramData\uiCFgiloyP.exe"C:\ProgramData\uiCFgiloyP.exe"2⤵
- Executes dropped EXE
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
448KB
MD5673b038fe6b21d1d4e69029e6837037f
SHA1818b11ba12f8ea007a2d740b44ed09db8ea539d7
SHA256600de0d6adb5dda080a4a6cb2b8860d5f104fc628b9a3e34b85d3e844b15f8e4
SHA5124a8f4af37f97349fe524afabdd7e0598b25ab72f97e4b190474a211e069da23536a27fd4a27d4fb01c86cc7217b578383d6f6556b4037cc9461df908c4384fc3