Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2024, 17:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
7ae5e6d316295cce611a993f8f43fb4c.exe
Resource
win7-20231215-en
6 signatures
150 seconds
General
-
Target
7ae5e6d316295cce611a993f8f43fb4c.exe
-
Size
22KB
-
MD5
7ae5e6d316295cce611a993f8f43fb4c
-
SHA1
0b4496b669d7f192705f1db208a7dfbf754b6a2e
-
SHA256
66cea97d93ab0a1a8e0072a612280de98364b9bca28333256fd7b1103eabebf8
-
SHA512
31fda50c728d6262894b3a8078cbec7bf8125fc88c2106c7a50119127a878ce85c3371a3d80a5728954498bdcaf7f307cbe018ce74c9cd1fafb7e8d0dfda9212
-
SSDEEP
384:Bhd4HiCJDslUEa3fPdz1dMb2EsqjLgccesSTEpkfvq4/UUkEf0KCuDqOuTH/gRb9:BhCClU3fRjMb3sqjL9hvEp+iDThH/gRB
Malware Config
Signatures
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA} 7ae5e6d316295cce611a993f8f43fb4c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} 7ae5e6d316295cce611a993f8f43fb4c.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\MapWmi.dll 7ae5e6d316295cce611a993f8f43fb4c.exe -
Modifies registry class 17 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\InprocServer32 7ae5e6d316295cce611a993f8f43fb4c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} 7ae5e6d316295cce611a993f8f43fb4c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Implemented Categories 7ae5e6d316295cce611a993f8f43fb4c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA}\TypeLib 7ae5e6d316295cce611a993f8f43fb4c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\TypeLib 7ae5e6d316295cce611a993f8f43fb4c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA}\Implemented Categories 7ae5e6d316295cce611a993f8f43fb4c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA} 7ae5e6d316295cce611a993f8f43fb4c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\VersionIndependentProgID 7ae5e6d316295cce611a993f8f43fb4c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA}\Programmable 7ae5e6d316295cce611a993f8f43fb4c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA}\InprocServer32 7ae5e6d316295cce611a993f8f43fb4c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} 7ae5e6d316295cce611a993f8f43fb4c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\Programmable 7ae5e6d316295cce611a993f8f43fb4c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C}\ProgID 7ae5e6d316295cce611a993f8f43fb4c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} 7ae5e6d316295cce611a993f8f43fb4c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA}\VersionIndependentProgID 7ae5e6d316295cce611a993f8f43fb4c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA}\Version 7ae5e6d316295cce611a993f8f43fb4c.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA}\ProgID 7ae5e6d316295cce611a993f8f43fb4c.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4028 7ae5e6d316295cce611a993f8f43fb4c.exe 4028 7ae5e6d316295cce611a993f8f43fb4c.exe 4028 7ae5e6d316295cce611a993f8f43fb4c.exe 4028 7ae5e6d316295cce611a993f8f43fb4c.exe 4028 7ae5e6d316295cce611a993f8f43fb4c.exe 4028 7ae5e6d316295cce611a993f8f43fb4c.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4028 7ae5e6d316295cce611a993f8f43fb4c.exe Token: SeDebugPrivilege 4028 7ae5e6d316295cce611a993f8f43fb4c.exe Token: SeDebugPrivilege 4028 7ae5e6d316295cce611a993f8f43fb4c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4028 wrote to memory of 612 4028 7ae5e6d316295cce611a993f8f43fb4c.exe 4 PID 4028 wrote to memory of 612 4028 7ae5e6d316295cce611a993f8f43fb4c.exe 4 PID 4028 wrote to memory of 612 4028 7ae5e6d316295cce611a993f8f43fb4c.exe 4
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:612
-
C:\Users\Admin\AppData\Local\Temp\7ae5e6d316295cce611a993f8f43fb4c.exe"C:\Users\Admin\AppData\Local\Temp\7ae5e6d316295cce611a993f8f43fb4c.exe"1⤵
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4028