Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 05:10
Static task
static1
Behavioral task
behavioral1
Sample
c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583.exe
Resource
win10v2004-20231215-en
General
-
Target
c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583.exe
-
Size
4.4MB
-
MD5
9631809ff9e66cc5809e51e2929dfbe8
-
SHA1
4ee1085393d94978fc17b1453517f0aa7f40b8a3
-
SHA256
c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583
-
SHA512
3e350e41e7a86756438762c0a6772e5781757bb941e8c88c58238e1f19e15a3eb743301119050b30476d69bc68568a0bad1cdd4560f1ecac2cf4c0c72c9d77d1
-
SSDEEP
98304:k8sjkFhRWieWT0ywsagZ9VeXD3qJJXg2cMUGZWh:2jyhRPeWvnzwrivWh
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 4 IoCs
resource yara_rule behavioral1/files/0x0009000000012270-5.dat UPX behavioral1/memory/2684-10-0x0000000000400000-0x0000000000623000-memory.dmp UPX behavioral1/files/0x0009000000012270-17.dat UPX behavioral1/memory/2684-49-0x0000000000400000-0x0000000000623000-memory.dmp UPX -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion WindowsLoader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate WindowsLoader.exe -
Executes dropped EXE 1 IoCs
pid Process 2684 WindowsLoader.exe -
Loads dropped DLL 2 IoCs
pid Process 2976 c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583.exe 2892 regsvr32.exe -
resource yara_rule behavioral1/files/0x0009000000012270-5.dat upx behavioral1/memory/2684-10-0x0000000000400000-0x0000000000623000-memory.dmp upx behavioral1/files/0x0009000000012270-17.dat upx behavioral1/memory/2684-49-0x0000000000400000-0x0000000000623000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Win = "rundll32 shell32,ShellExec_RunDLL regsvr32 -s \"C:\\Users\\Admin\\AppData\\Local\\Temp\\sfx.dll\"" c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS WindowsLoader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct WindowsLoader.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2684 WindowsLoader.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 2684 WindowsLoader.exe Token: SeIncBasePriorityPrivilege 2684 WindowsLoader.exe Token: 33 2684 WindowsLoader.exe Token: SeIncBasePriorityPrivilege 2684 WindowsLoader.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2684 WindowsLoader.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2684 2976 c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583.exe 28 PID 2976 wrote to memory of 2684 2976 c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583.exe 28 PID 2976 wrote to memory of 2684 2976 c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583.exe 28 PID 2976 wrote to memory of 2684 2976 c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583.exe 28 PID 2976 wrote to memory of 2864 2976 c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583.exe 29 PID 2976 wrote to memory of 2864 2976 c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583.exe 29 PID 2976 wrote to memory of 2864 2976 c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583.exe 29 PID 2976 wrote to memory of 2864 2976 c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583.exe 29 PID 2864 wrote to memory of 2892 2864 cmd.exe 31 PID 2864 wrote to memory of 2892 2864 cmd.exe 31 PID 2864 wrote to memory of 2892 2864 cmd.exe 31 PID 2864 wrote to memory of 2892 2864 cmd.exe 31 PID 2864 wrote to memory of 2892 2864 cmd.exe 31 PID 2864 wrote to memory of 2892 2864 cmd.exe 31 PID 2864 wrote to memory of 2892 2864 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583.exe"C:\Users\Admin\AppData\Local\Temp\c88140bcf066a56fb1d067ab538f7f7a9b39190b955ba370ffdf91cbcbf02583.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\WindowsLoader.exeC:\Users\Admin\AppData\Local\Temp\WindowsLoader.exe2⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2684
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c start regsvr32 -s "C:\Users\Admin\AppData\Local\Temp\sfx.dll"2⤵
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 -s "C:\Users\Admin\AppData\Local\Temp\sfx.dll"3⤵
- Loads dropped DLL
PID:2892
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.8MB
MD5323c0fd51071400b51eedb1be90a8188
SHA10efc35935957c25193bbe9a83ab6caa25a487ada
SHA2562f2aba1e074f5f4baa08b524875461889f8f04d4ffc43972ac212e286022ab94
SHA5124c501c7135962e2f02b68d6069f2191ddb76f990528dacd209955a44972122718b9598400ba829abab2d4345b4e1a4b93453c8e7ba42080bd492a34cf8443e7e
-
Filesize
1.5MB
MD575a8f49df6ce2e0891df1b2e91060898
SHA1bc4121d05cf3e49c65857334bc65f51888bea5da
SHA256c952aeee2b0930e700e07e7a051f05f70cddd219563080ca76447dccbdc65d97
SHA512755f0d744d962c2ade061e5f06041cee26097f6abe928d6b71f666a4e311c443db6fb2925dac41dc724b17fc2c20817a8be433a7e999d4172d9e959958e7aced
-
Filesize
1.7MB
MD5213477e5ea9cc5e1a553dedb7f0545ac
SHA123204a5ac52da20047555f58246528f7cc3c44fb
SHA256f03074dc1b7ed148915c112edf33d7ff09601ed718a971e0d0574d314f74cdfc
SHA512472b0304098dbcb489e5b3f4fef99add3f79e253dad638f96e75bd5f1c9ecdaf6d4e8e1fcd964e69256d9d8bd6dbb14632952e9da64c4d608d8818c11b156612
-
Filesize
2.4MB
MD57cdf60df6599975e4fa5541ca6d61540
SHA11f0744e4a56a7c304b9595bd58bfd85ad7bfa737
SHA256ff2a328695c5418831eb6f0ac8e5faf2b28e3f98020ef34849960111eeda432a
SHA51287e36c66aea88f70d2c32ae92b79d37b2286ba424fa2d19d78150b68948638e4b7ef8ec11cde1570c5eddde0c62cf108133ec2022b97a5c623e29c58b0d65f21