Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 12:43
Static task
static1
Behavioral task
behavioral1
Sample
72454051b03c281f006cd3f8e88426b3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
72454051b03c281f006cd3f8e88426b3.exe
Resource
win10v2004-20231222-en
General
-
Target
72454051b03c281f006cd3f8e88426b3.exe
-
Size
673KB
-
MD5
72454051b03c281f006cd3f8e88426b3
-
SHA1
05bfa914bd7b1b64ffbf0bba9bd8ee78e17956b7
-
SHA256
5998bc5d720691c9a28f1c3d2fafb55195be1a1afdda292064d9fb9aef9ae04b
-
SHA512
d13cde9152191dacb811a81831a5106b2ccec49c6a366aabe4254f99d628f867bc4b64747c958dbdfe4321b70a811b2d46e21cd33925697fc5395d22920d7a46
-
SSDEEP
12288:JMnBszy90Q7YX+CFTc5GDnbu/qmvSBjh+4nqjuwNhyiIgf96rNiBW:wszyUTmGf8Dv2VLqNNhyilYrNi
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\0000000000000000000000000000003333333333333333333333333333322222222222222222222222222222222222 = "C:\\Users\\Admin\\AppData\\Roaming\\00000000000000000000000000000033333333333333333333333333333222222222222222222222222222222222222222222666666666666666666666666666666666666999999999999999999999999999\\new.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\update.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\windows = "C:\\Users\\Admin\\AppData\\Roaming\\00000000000000000000000000000033333333333333333333333333333222222222222222222222222222222222222222222666666666666666666666666666666666666999999999999999999999999999\\new.exe" update.exe -
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8B17D053-BDCE-AAED-BAAB-BAB8C0ACCFAD}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\00000000000000000000000000000033333333333333333333333333333222222222222222222222222222222222222222222666666666666666666666666666666666666999999999999999999999999999\\new.exe" update.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{8B17D053-BDCE-AAED-BAAB-BAB8C0ACCFAD} update.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{8B17D053-BDCE-AAED-BAAB-BAB8C0ACCFAD}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\00000000000000000000000000000033333333333333333333333333333222222222222222222222222222222222222222222666666666666666666666666666666666666999999999999999999999999999\\new.exe" update.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{8B17D053-BDCE-AAED-BAAB-BAB8C0ACCFAD} update.exe -
Executes dropped EXE 6 IoCs
pid Process 2936 update.exe 2480 update.exe 2272 update.exe 3172 update.exe 4304 update.exe 900 update.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 72454051b03c281f006cd3f8e88426b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\windows = "C:\\Users\\Admin\\AppData\\Roaming\\00000000000000000000000000000033333333333333333333333333333222222222222222222222222222222222222222222666666666666666666666666666666666666999999999999999999999999999\\new.exe" update.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\windows = "C:\\Users\\Admin\\AppData\\Roaming\\00000000000000000000000000000033333333333333333333333333333222222222222222222222222222222222222222222666666666666666666666666666666666666999999999999999999999999999\\new.exe" update.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 update.exe File opened for modification \??\PhysicalDrive0 update.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2936 set thread context of 2480 2936 update.exe 91 PID 2480 set thread context of 3172 2480 update.exe 93 PID 2272 set thread context of 4304 2272 update.exe 108 PID 4304 set thread context of 900 4304 update.exe 109 -
Modifies registry key 1 TTPs 4 IoCs
pid Process 932 reg.exe 5108 reg.exe 1288 reg.exe 4256 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 3172 update.exe Token: SeCreateTokenPrivilege 3172 update.exe Token: SeAssignPrimaryTokenPrivilege 3172 update.exe Token: SeLockMemoryPrivilege 3172 update.exe Token: SeIncreaseQuotaPrivilege 3172 update.exe Token: SeMachineAccountPrivilege 3172 update.exe Token: SeTcbPrivilege 3172 update.exe Token: SeSecurityPrivilege 3172 update.exe Token: SeTakeOwnershipPrivilege 3172 update.exe Token: SeLoadDriverPrivilege 3172 update.exe Token: SeSystemProfilePrivilege 3172 update.exe Token: SeSystemtimePrivilege 3172 update.exe Token: SeProfSingleProcessPrivilege 3172 update.exe Token: SeIncBasePriorityPrivilege 3172 update.exe Token: SeCreatePagefilePrivilege 3172 update.exe Token: SeCreatePermanentPrivilege 3172 update.exe Token: SeBackupPrivilege 3172 update.exe Token: SeRestorePrivilege 3172 update.exe Token: SeShutdownPrivilege 3172 update.exe Token: SeDebugPrivilege 3172 update.exe Token: SeAuditPrivilege 3172 update.exe Token: SeSystemEnvironmentPrivilege 3172 update.exe Token: SeChangeNotifyPrivilege 3172 update.exe Token: SeRemoteShutdownPrivilege 3172 update.exe Token: SeUndockPrivilege 3172 update.exe Token: SeSyncAgentPrivilege 3172 update.exe Token: SeEnableDelegationPrivilege 3172 update.exe Token: SeManageVolumePrivilege 3172 update.exe Token: SeImpersonatePrivilege 3172 update.exe Token: SeCreateGlobalPrivilege 3172 update.exe Token: 31 3172 update.exe Token: 32 3172 update.exe Token: 33 3172 update.exe Token: 34 3172 update.exe Token: 35 3172 update.exe Token: SeDebugPrivilege 3172 update.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 2936 update.exe 2480 update.exe 2272 update.exe 3172 update.exe 3172 update.exe 3172 update.exe 4304 update.exe 900 update.exe 900 update.exe -
Suspicious use of WriteProcessMemory 62 IoCs
description pid Process procid_target PID 3308 wrote to memory of 2936 3308 72454051b03c281f006cd3f8e88426b3.exe 85 PID 3308 wrote to memory of 2936 3308 72454051b03c281f006cd3f8e88426b3.exe 85 PID 3308 wrote to memory of 2936 3308 72454051b03c281f006cd3f8e88426b3.exe 85 PID 2936 wrote to memory of 2480 2936 update.exe 91 PID 2936 wrote to memory of 2480 2936 update.exe 91 PID 2936 wrote to memory of 2480 2936 update.exe 91 PID 2936 wrote to memory of 2480 2936 update.exe 91 PID 2936 wrote to memory of 2480 2936 update.exe 91 PID 2936 wrote to memory of 2480 2936 update.exe 91 PID 2936 wrote to memory of 2480 2936 update.exe 91 PID 2936 wrote to memory of 2480 2936 update.exe 91 PID 3308 wrote to memory of 2272 3308 72454051b03c281f006cd3f8e88426b3.exe 92 PID 3308 wrote to memory of 2272 3308 72454051b03c281f006cd3f8e88426b3.exe 92 PID 3308 wrote to memory of 2272 3308 72454051b03c281f006cd3f8e88426b3.exe 92 PID 2480 wrote to memory of 3172 2480 update.exe 93 PID 2480 wrote to memory of 3172 2480 update.exe 93 PID 2480 wrote to memory of 3172 2480 update.exe 93 PID 2480 wrote to memory of 3172 2480 update.exe 93 PID 2480 wrote to memory of 3172 2480 update.exe 93 PID 2480 wrote to memory of 3172 2480 update.exe 93 PID 2480 wrote to memory of 3172 2480 update.exe 93 PID 2480 wrote to memory of 3172 2480 update.exe 93 PID 3172 wrote to memory of 736 3172 update.exe 102 PID 3172 wrote to memory of 736 3172 update.exe 102 PID 3172 wrote to memory of 736 3172 update.exe 102 PID 3172 wrote to memory of 4656 3172 update.exe 101 PID 3172 wrote to memory of 4656 3172 update.exe 101 PID 3172 wrote to memory of 4656 3172 update.exe 101 PID 3172 wrote to memory of 3688 3172 update.exe 100 PID 3172 wrote to memory of 3688 3172 update.exe 100 PID 3172 wrote to memory of 3688 3172 update.exe 100 PID 3172 wrote to memory of 3024 3172 update.exe 95 PID 3172 wrote to memory of 3024 3172 update.exe 95 PID 3172 wrote to memory of 3024 3172 update.exe 95 PID 4656 wrote to memory of 932 4656 cmd.exe 103 PID 4656 wrote to memory of 932 4656 cmd.exe 103 PID 4656 wrote to memory of 932 4656 cmd.exe 103 PID 736 wrote to memory of 4256 736 cmd.exe 107 PID 736 wrote to memory of 4256 736 cmd.exe 107 PID 736 wrote to memory of 4256 736 cmd.exe 107 PID 3688 wrote to memory of 1288 3688 cmd.exe 106 PID 3688 wrote to memory of 1288 3688 cmd.exe 106 PID 3688 wrote to memory of 1288 3688 cmd.exe 106 PID 3024 wrote to memory of 5108 3024 cmd.exe 105 PID 3024 wrote to memory of 5108 3024 cmd.exe 105 PID 3024 wrote to memory of 5108 3024 cmd.exe 105 PID 2272 wrote to memory of 4304 2272 update.exe 108 PID 2272 wrote to memory of 4304 2272 update.exe 108 PID 2272 wrote to memory of 4304 2272 update.exe 108 PID 2272 wrote to memory of 4304 2272 update.exe 108 PID 2272 wrote to memory of 4304 2272 update.exe 108 PID 2272 wrote to memory of 4304 2272 update.exe 108 PID 2272 wrote to memory of 4304 2272 update.exe 108 PID 2272 wrote to memory of 4304 2272 update.exe 108 PID 4304 wrote to memory of 900 4304 update.exe 109 PID 4304 wrote to memory of 900 4304 update.exe 109 PID 4304 wrote to memory of 900 4304 update.exe 109 PID 4304 wrote to memory of 900 4304 update.exe 109 PID 4304 wrote to memory of 900 4304 update.exe 109 PID 4304 wrote to memory of 900 4304 update.exe 109 PID 4304 wrote to memory of 900 4304 update.exe 109 PID 4304 wrote to memory of 900 4304 update.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\72454051b03c281f006cd3f8e88426b3.exe"C:\Users\Admin\AppData\Local\Temp\72454051b03c281f006cd3f8e88426b3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe3⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe4⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\00000000000000000000000000000033333333333333333333333333333222222222222222222222222222222222222222222666666666666666666666666666666666666999999999999999999999999999\new.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\00000000000000000000000000000033333333333333333333333333333222222222222222222222222222222222222222222666666666666666666666666666666666666999999999999999999999999999\new.exe:*:Enabled:Windows Messanger" /f5⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\00000000000000000000000000000033333333333333333333333333333222222222222222222222222222222222222222222666666666666666666666666666666666666999999999999999999999999999\new.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\00000000000000000000000000000033333333333333333333333333333222222222222222222222222222222222222222222666666666666666666666666666666666666999999999999999999999999999\new.exe:*:Enabled:Windows Messanger" /f6⤵
- Modifies firewall policy service
- Modifies registry key
PID:5108
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f6⤵
- Modifies firewall policy service
- Modifies registry key
PID:1288
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe:*:Enabled:Windows Messanger" /f5⤵
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe:*:Enabled:Windows Messanger" /f6⤵
- Modifies firewall policy service
- Modifies registry key
PID:932
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f6⤵
- Modifies firewall policy service
- Modifies registry key
PID:4256
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe3⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\update.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:900
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
815KB
MD5e61f67a82de9698a6d2818854d1ea304
SHA1356eabfd06603dc107c3d4a9f4ecbe677edaf54e
SHA256be9e5583d4dbfda326b88d1e6e13c5e4379a10f4170216898f26f8e0d9149b7a
SHA512c431604684a320046e1f35a16cf59d3665cda58a72f17f225363a8922d3e0dbfb49a5e09976625310ae4645fd9cb87490744ef205138168acdc4af74e9854833
-
Filesize
857KB
MD579c9a819093896771d52015e5b64b44d
SHA198c777688e5e221e2522b3776709494b6f0070e5
SHA256d5fd75950ecf1c58b47c3c6c84f6506f8ca0a8a9270318702a6b6b67c674436d
SHA5126e22fc8df35b6a54de5828a77d9b700324c314019499e74aa0aff97ae4ea2aeae9eb366d553575ca9f9996a1f55f704058438bf65924369636e066c010c1f4a3
-
Filesize
1024KB
MD58b0075d01feddc0e208f8f2aae108b7f
SHA16053422705f97eaada22b36f18fce84d25b52122
SHA2562f91707c2f568417938f4aea7783e4056f573675440af224e02c5961ad071832
SHA512f476e00f2fae5fb4c9914b52ea6f54f58c9bd26d4e2c2ee97837e1be84498f73fd65293366dd3bd4f3b39425eec7a9826312d0347d2de96290467ab4a86e247c
-
C:\Users\Admin\AppData\Roaming\00000000000000000000000000000033333333333333333333333333333222222222222222222222222222222222222222222666666666666666666666666666666666666999999999999999999999999999\new.exe
Filesize722KB
MD508f4fc93058ef8c21dfabb41fe0c54e6
SHA15ca66f8c880b2fac564347600a206a75cd8ead2d
SHA256c06e44c8accf36458041fe21fb2d29750e19e35f3b862ebcb9f3ac1432d835d0
SHA512b028a70f93204b143a7257abdaa4b21a69bccb7fcce5dfc17a702c802c0e3fa37dc19a4bb5472a5fed8eb26a283466b46a552d6688a8b306a7a2cac7e4741bd5