Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/02/2024, 06:28
Static task
static1
Behavioral task
behavioral1
Sample
862d555f7f10302008d6fe78ab8b022e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
862d555f7f10302008d6fe78ab8b022e.exe
Resource
win10v2004-20231215-en
General
-
Target
862d555f7f10302008d6fe78ab8b022e.exe
-
Size
749KB
-
MD5
862d555f7f10302008d6fe78ab8b022e
-
SHA1
35b1f1b301053e9eb0e0addc530c1893898ea352
-
SHA256
681578d4fa37a378d08c805f74acaaab9c0f72c097888f5579554d3e4fdbf812
-
SHA512
fd8e5ae385b89ab79e036447f3d78f7ae6df41adb746d6b7d9cb8d0a82698d698573f3326de067a8b8042ad7bb39cf45c3b3abb8677fcbc969768c8541d63eef
-
SSDEEP
12288:ljXipx70Np/Z9xwy/bAHmdtYpkzz84cNZcu0uAimaLV+qvTOHsGiE:tX1/PWy/bAHmdWpCYNGu0emaZXqHsGi
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0030000000016cdc-19.dat acprotect -
Executes dropped EXE 1 IoCs
pid Process 1420 862d555f7f10302008d6fe78ab8b022e.exe -
Loads dropped DLL 3 IoCs
pid Process 2316 862d555f7f10302008d6fe78ab8b022e.exe 2316 862d555f7f10302008d6fe78ab8b022e.exe 1420 862d555f7f10302008d6fe78ab8b022e.exe -
resource yara_rule behavioral1/files/0x0030000000016cdc-19.dat upx behavioral1/memory/1420-21-0x0000000000250000-0x0000000000261000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\srtserv = "C:\\ProgramData\\srtserv\\862d555f7f10302008d6fe78ab8b022e.exe" 862d555f7f10302008d6fe78ab8b022e.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies registry class 37 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\NodeSlot = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 52003100000000008f570871122041707044617461003c0008000400efbe8f5708718f5708712a000000eb0100000000020000000000000000000000000000004100700070004400610074006100000016000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 4c003100000000008f57337210204c6f63616c00380008000400efbe8f5708718f5733722a000000fe0100000000020000000000000000000000000000004c006f00630061006c00000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 = 4a003100000000004158a033102054656d700000360008000400efbe8f5708714158a0332a000000ff010000000002000000000000000000000000000000540065006d007000000014000000 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" explorer.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 74003100000000008f5708711100557365727300600008000400efbeee3a851a8f5708712a000000e601000000000100000000000000000036000000000055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 = 86003100000000004158a03317003836324435357e3100006e0008000400efbe4158a0334158a0332a000000c422010000000700000000000000000000000000000038003600320064003500350035006600370066003100300033003000320030003000380064003600660065003700380061006200380062003000320032006500000018000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4c003100000000008f571774100041646d696e00380008000400efbe8f5708718f5717742a00000031000000000003000000000000000000000000000000410064006d0069006e00000014000000 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" explorer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1420 862d555f7f10302008d6fe78ab8b022e.exe 1420 862d555f7f10302008d6fe78ab8b022e.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1420 862d555f7f10302008d6fe78ab8b022e.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2380 2316 862d555f7f10302008d6fe78ab8b022e.exe 28 PID 2316 wrote to memory of 2380 2316 862d555f7f10302008d6fe78ab8b022e.exe 28 PID 2316 wrote to memory of 2380 2316 862d555f7f10302008d6fe78ab8b022e.exe 28 PID 2316 wrote to memory of 2380 2316 862d555f7f10302008d6fe78ab8b022e.exe 28 PID 2316 wrote to memory of 1420 2316 862d555f7f10302008d6fe78ab8b022e.exe 29 PID 2316 wrote to memory of 1420 2316 862d555f7f10302008d6fe78ab8b022e.exe 29 PID 2316 wrote to memory of 1420 2316 862d555f7f10302008d6fe78ab8b022e.exe 29 PID 2316 wrote to memory of 1420 2316 862d555f7f10302008d6fe78ab8b022e.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\862d555f7f10302008d6fe78ab8b022e.exe"C:\Users\Admin\AppData\Local\Temp\862d555f7f10302008d6fe78ab8b022e.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe C:\Users\Admin\AppData\Local\Temp\862d555f7f10302008d6fe78ab8b022e2⤵PID:2380
-
-
C:\ProgramData\srtserv\862d555f7f10302008d6fe78ab8b022e.exeC:\ProgramData\srtserv\862d555f7f10302008d6fe78ab8b022e.exe -wait2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1420
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:2068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
292KB
MD575babd1be46847fe4717a91a1d08c1a0
SHA16cb8030ce1c4e8104228993c033eb35111c6e35b
SHA256e47b2e51fd700a880b5a5ff388b9908279abc0542d2ef50d86aca8a6be8f2455
SHA512d6b4cab6eca654964f83ce418086323fc661135bebb262eb53024774da0bf09b19acf0f8d62b881801ac89e22ea39fb229dc0ebeddc72c9cf1be916a7a009cc7
-
Filesize
176KB
MD5bfce00a948c10621e80e5098fd4d6137
SHA1a53994784e471055ea84f787f5fee07185493104
SHA256c3f8bc1a4da69a348b75c2576290e1c3d80392b591db107221b96b69df0950b9
SHA51263ae0a9d6173982f4bf0b00c70170cd849f1b0995682fa8573435c615e5e241bfc7d5385be4c756bcdef2b97102fbb42aaa6b4331d4302a0b4bc2eeec309b7c2
-
Filesize
243KB
MD5d46270fbf201db43572c9694a7d05dba
SHA188816603cba578fc15a1c801d707b07c2d36da4d
SHA2564b1bf048bd89bd711faab1819919fa7969e8b452a02caac49759b02b802cce3f
SHA51265a4ec76b693b516761c9ab620e824fd2e32b540418a74bc3f6c1f1f6d6059b16bae75f6cda9594c183db056448f5a7516e89b08f8d64645bd39064dc2d7002e
-
Filesize
336KB
MD5bce948579cac3d4205980cc3859fd657
SHA1448089b44da6a640329a70500426e53c82391df5
SHA256e0dd2e6424080e81bf352e81614d37f10f46381a68c51d8d281f0382af19ef89
SHA512fc39ed5710dbf010fd5bc3b6ea2fa3196d7ac422e1fa5d08bd1139a4dabfbaabbbb7a91281a123ff06e03dd34893d54f05f536f9cc2a369011ca8ebc52fcd523
-
Filesize
23KB
MD54a68bdeb219f697115c035d5f7000ee4
SHA19b3e7baaceb706b5d4f3c682806a7e27603b32f2
SHA256c505c9c35bc24243aabea8e349145c9dbff2da2ca6567fe2f750d887cc3cc27d
SHA512b9305d262d08171df9b7c8f937c328953ce84b621cdf37ffc74b27d84f1bf364460dc6d4da40dbb94317980699fca8b7b8a9a58a409db74baba81546b0253a34