Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
27/01/2024, 17:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7ae5e6d316295cce611a993f8f43fb4c.exe
Resource
win7-20231215-en
6 signatures
150 seconds
General
-
Target
7ae5e6d316295cce611a993f8f43fb4c.exe
-
Size
22KB
-
MD5
7ae5e6d316295cce611a993f8f43fb4c
-
SHA1
0b4496b669d7f192705f1db208a7dfbf754b6a2e
-
SHA256
66cea97d93ab0a1a8e0072a612280de98364b9bca28333256fd7b1103eabebf8
-
SHA512
31fda50c728d6262894b3a8078cbec7bf8125fc88c2106c7a50119127a878ce85c3371a3d80a5728954498bdcaf7f307cbe018ce74c9cd1fafb7e8d0dfda9212
-
SSDEEP
384:Bhd4HiCJDslUEa3fPdz1dMb2EsqjLgccesSTEpkfvq4/UUkEf0KCuDqOuTH/gRb9:BhCClU3fRjMb3sqjL9hvEp+iDThH/gRB
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} 7ae5e6d316295cce611a993f8f43fb4c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} 7ae5e6d316295cce611a993f8f43fb4c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} 7ae5e6d316295cce611a993f8f43fb4c.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\mapore.dll 7ae5e6d316295cce611a993f8f43fb4c.exe -
Modifies registry class 13 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B4F3A835-0E21-4959-BA22-42B3008E02FF}\VersionIndependentProgID 7ae5e6d316295cce611a993f8f43fb4c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B4F3A835-0E21-4959-BA22-42B3008E02FF}\InprocServer32 7ae5e6d316295cce611a993f8f43fb4c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B4F3A835-0E21-4959-BA22-42B3008E02FF} 7ae5e6d316295cce611a993f8f43fb4c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\Programmable 7ae5e6d316295cce611a993f8f43fb4c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} 7ae5e6d316295cce611a993f8f43fb4c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\VersionIndependentProgID 7ae5e6d316295cce611a993f8f43fb4c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\ProgID 7ae5e6d316295cce611a993f8f43fb4c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} 7ae5e6d316295cce611a993f8f43fb4c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B4F3A835-0E21-4959-BA22-42B3008E02FF}\Version 7ae5e6d316295cce611a993f8f43fb4c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\TypeLib 7ae5e6d316295cce611a993f8f43fb4c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\InprocServer32 7ae5e6d316295cce611a993f8f43fb4c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{72853161-30C5-4D22-B7F9-0BBC1D38A37E}\InprocServer32 7ae5e6d316295cce611a993f8f43fb4c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B4F3A835-0E21-4959-BA22-42B3008E02FF}\ProgID 7ae5e6d316295cce611a993f8f43fb4c.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2464 7ae5e6d316295cce611a993f8f43fb4c.exe 2464 7ae5e6d316295cce611a993f8f43fb4c.exe 2464 7ae5e6d316295cce611a993f8f43fb4c.exe 2464 7ae5e6d316295cce611a993f8f43fb4c.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2464 7ae5e6d316295cce611a993f8f43fb4c.exe Token: SeDebugPrivilege 2464 7ae5e6d316295cce611a993f8f43fb4c.exe Token: SeDebugPrivilege 2464 7ae5e6d316295cce611a993f8f43fb4c.exe Token: SeDebugPrivilege 2464 7ae5e6d316295cce611a993f8f43fb4c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2464 wrote to memory of 420 2464 7ae5e6d316295cce611a993f8f43fb4c.exe 3 PID 2464 wrote to memory of 420 2464 7ae5e6d316295cce611a993f8f43fb4c.exe 3 PID 2464 wrote to memory of 420 2464 7ae5e6d316295cce611a993f8f43fb4c.exe 3 PID 2464 wrote to memory of 420 2464 7ae5e6d316295cce611a993f8f43fb4c.exe 3
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:420
-
C:\Users\Admin\AppData\Local\Temp\7ae5e6d316295cce611a993f8f43fb4c.exe"C:\Users\Admin\AppData\Local\Temp\7ae5e6d316295cce611a993f8f43fb4c.exe"1⤵
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2464