Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 23:30
Static task
static1
Behavioral task
behavioral1
Sample
7324f00bd75b6feb0fae0783c2fb6c15.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7324f00bd75b6feb0fae0783c2fb6c15.exe
Resource
win10v2004-20231222-en
General
-
Target
7324f00bd75b6feb0fae0783c2fb6c15.exe
-
Size
691KB
-
MD5
7324f00bd75b6feb0fae0783c2fb6c15
-
SHA1
f68d0b69134fe33c2131706338ff7135a5197519
-
SHA256
6adeb5f78a223c558b233b3474f4c65a993f61895f2a2b176b1a38c76d6a8522
-
SHA512
8f2817a0a18ca37a08b6fdfb5c24501f420daddf848f77eaccae1bf50a292171491beb9efc7104d02885fc0bddec1c6e85887f8426dadce80ac068737ab9bdba
-
SSDEEP
12288:UTHxGNKvvQtEXh4FarF7Uz0bBMOzr9zF3Z4mxxUDqVTVOC7:UTHxGNKIZF+F4zciO1zQmXDVTz7
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2084 5.exe 2992 win32.ini -
Loads dropped DLL 2 IoCs
pid Process 2188 7324f00bd75b6feb0fae0783c2fb6c15.exe 2188 7324f00bd75b6feb0fae0783c2fb6c15.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7324f00bd75b6feb0fae0783c2fb6c15.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat win32.ini -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\win32.ini 5.exe File opened for modification C:\Windows\win32.ini 5.exe File created C:\Windows\uninstal.bat 5.exe -
Modifies data under HKEY_USERS 28 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9DEE426E-D3AB-4CFE-A4A2-280CD14CC3EB}\72-81-4d-73-d2-81 win32.ini Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-81-4d-73-d2-81\WpadDecisionTime = f02360841d4fda01 win32.ini Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 win32.ini Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad win32.ini Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9DEE426E-D3AB-4CFE-A4A2-280CD14CC3EB}\WpadDecisionReason = "1" win32.ini Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9DEE426E-D3AB-4CFE-A4A2-280CD14CC3EB}\WpadDecision = "0" win32.ini Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9DEE426E-D3AB-4CFE-A4A2-280CD14CC3EB}\WpadDecisionTime = f02360841d4fda01 win32.ini Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" win32.ini Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" win32.ini Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections win32.ini Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings win32.ini Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-81-4d-73-d2-81\WpadDecisionTime = 10cb15531d4fda01 win32.ini Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ win32.ini Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings win32.ini Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 win32.ini Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-81-4d-73-d2-81 win32.ini Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9DEE426E-D3AB-4CFE-A4A2-280CD14CC3EB} win32.ini Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-81-4d-73-d2-81\WpadDecision = "0" win32.ini Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" win32.ini Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0041000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 win32.ini Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9DEE426E-D3AB-4CFE-A4A2-280CD14CC3EB}\WpadDecisionTime = 10cb15531d4fda01 win32.ini Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{9DEE426E-D3AB-4CFE-A4A2-280CD14CC3EB}\WpadNetworkName = "Network 3" win32.ini Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-81-4d-73-d2-81\WpadDecisionReason = "1" win32.ini Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" win32.ini Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\72-81-4d-73-d2-81\WpadDetectedUrl win32.ini Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" win32.ini Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0041000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 win32.ini Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix win32.ini -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2084 5.exe Token: SeDebugPrivilege 2992 win32.ini -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2992 win32.ini -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2084 2188 7324f00bd75b6feb0fae0783c2fb6c15.exe 28 PID 2188 wrote to memory of 2084 2188 7324f00bd75b6feb0fae0783c2fb6c15.exe 28 PID 2188 wrote to memory of 2084 2188 7324f00bd75b6feb0fae0783c2fb6c15.exe 28 PID 2188 wrote to memory of 2084 2188 7324f00bd75b6feb0fae0783c2fb6c15.exe 28 PID 2992 wrote to memory of 2732 2992 win32.ini 30 PID 2992 wrote to memory of 2732 2992 win32.ini 30 PID 2992 wrote to memory of 2732 2992 win32.ini 30 PID 2992 wrote to memory of 2732 2992 win32.ini 30 PID 2084 wrote to memory of 2836 2084 5.exe 31 PID 2084 wrote to memory of 2836 2084 5.exe 31 PID 2084 wrote to memory of 2836 2084 5.exe 31 PID 2084 wrote to memory of 2836 2084 5.exe 31 PID 2084 wrote to memory of 2836 2084 5.exe 31 PID 2084 wrote to memory of 2836 2084 5.exe 31 PID 2084 wrote to memory of 2836 2084 5.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\7324f00bd75b6feb0fae0783c2fb6c15.exe"C:\Users\Admin\AppData\Local\Temp\7324f00bd75b6feb0fae0783c2fb6c15.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\5.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\uninstal.bat3⤵PID:2836
-
-
-
C:\Windows\win32.iniC:\Windows\win32.ini1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
615KB
MD544c77ebc9232bb9b2998076b730b6383
SHA10e04fcfa7ed04e5e9ec6753155186640e252349a
SHA256f7478a3e0e64fb5322c5f400901a9a197d54c063fb5c6a20484b9411f585b7f7
SHA5122bea23d2a8406e2026519c1afb78f52864edc21436e6f3e389195d0f52775f9d5e884baf9866c68d0306fd53de61f6eff934dcabf0484b1caa0e9bf7760c2583
-
Filesize
465KB
MD5b88024e47dbc89652cb254f737ccbf77
SHA12093aaf14d9a6ff4a20b47bac83998a16aef3a6b
SHA256656bd1d6a4b5b6e63e111a8fad539adceae738aa895273068de1cc4ba4bdbfb4
SHA5121872bce2f2646ec8756779263c9c491cc29fdc0a97b25785d035884a459d13fe6ad461238b7b3e8f34a23d4498825d6abcc04b86cf606dc673756ab452888c91
-
Filesize
263KB
MD51a4051ffe9b4e2cf2d8817ae2e801ef9
SHA1ac703d58e81ae3b2b4fc3b2660dd8a4b5ab007ad
SHA2565127ce0da2d85a028a16b19d1d5b11ab44d49dd8a53993e005449fddde28a031
SHA51228024dff989c8f6995f9c782526c009e144a71506021a92b1949964eb5adbf6299b425ab466a2cedb55e0df09c2488e0d278df3283cf2b6e0675d7f1bce652e1
-
Filesize
150B
MD572f9d376b476a7a6936991161cfeb888
SHA1ea53941d2d65213eed7aac7f29f897ecdb34344f
SHA256061cf610c4430e21066e13c91c49e6885cdcb24501095f1f8839e82d3a1d6a02
SHA512543f9178e376d60544d75981c259bbb4ab603411febb991507c25ddb904bf6e934d05173de5632823d53aaee13ee6f8a623179b26d8a6d134104d47e9dbaeaf5
-
Filesize
798KB
MD5548cae355cbc569066fa168ce14252ed
SHA13c9a20dcbfccb8d1ec74dd82bb869c9e43ab9c6e
SHA2569b67a8aefd0df28dc645d75036a9cee451e7285cd8816abcf0e98afb733470bc
SHA5124f51a1d9c9b12ec137025560796d0095d1a78798adc1b0bbbabc487c24891d795ded11aeb2fb2c8485217bc48ac77e1ce8c9e872ade87745962fcda337a6d611
-
Filesize
594KB
MD560ac8cc74db8d5edfbeb0b9911de9ea7
SHA1f836fe1ed105fa7c9821bfc0e17f37633f2f05fc
SHA2562333ae24313af3c615c7e94677e285e8ba941ab6d79fd3c6c9815a95a5be9a74
SHA5129c40f412b76986f12a090b2952d6363f01f435e2ea7f1ec67720d6b748692b02ab888674f281f5884c10e862611d111b531f54fa5ebcea6ecb9e8a1b27a32516
-
Filesize
635KB
MD53c42632d7bfdb8d910ad143084154cff
SHA1e1fc4dba93049defaf6e3a8e68baaea770354670
SHA25674f585263e1d241ea8006e1c43fcbe34df61fb63fa52ca0098bfca3d093e4645
SHA5128a47af4639c051d7cdfc6480b6f2efb21ca6ba0cc7a3d09a5d890c157313ba608cc667bb718c52f0dd9df9e2cf8de87dadbd7bb6e491cc60f0587324f8b65d90