Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 12:18
Static task
static1
Behavioral task
behavioral1
Sample
996887ad773945a7884931c5f1ff5c94.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
996887ad773945a7884931c5f1ff5c94.exe
Resource
win10v2004-20231215-en
General
-
Target
996887ad773945a7884931c5f1ff5c94.exe
-
Size
61KB
-
MD5
996887ad773945a7884931c5f1ff5c94
-
SHA1
bbe87a1764221a20f8f35b4291ddb5cce7a8f468
-
SHA256
ff1caada5738fcb6cd6e4e83841e2bdfe49cbf767d7d4d6f1fd437e56b702a89
-
SHA512
7ec3b233032423ce0d09dbb23b31af24f82469b07e0ff11b728bcbc3e22bf95e829a14565fe8b8199d461ed431f3b2d19146ff8cf934c92fb2eb650266a0dfaa
-
SSDEEP
1536:B4lqiNHnPSMQQ+Z45SNTxdBlsZr48ECzJP0xBt7haC:GaMQ/7NdrlxaFPkt9
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\996887ad773945a7884931c5f1ff5c94.exe\"" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\996887ad773945a7884931c5f1ff5c94.exe\"" regedit.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3601492379-692465709-652514833-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 996887ad773945a7884931c5f1ff5c94.exe -
Executes dropped EXE 2 IoCs
pid Process 3024 msdtr.exe 2924 ctfmon.exe -
Loads dropped DLL 4 IoCs
pid Process 1732 996887ad773945a7884931c5f1ff5c94.exe 1732 996887ad773945a7884931c5f1ff5c94.exe 3024 msdtr.exe 3024 msdtr.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\w: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\z: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\j: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\v: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\m: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\s: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\b: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\g: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\x: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\f: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\p: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\k: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\e: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\h: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\n: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\u: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\a: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\d: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\i: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\q: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\y: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\l: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\o: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\r: 996887ad773945a7884931c5f1ff5c94.exe File opened (read-only) \??\t: 996887ad773945a7884931c5f1ff5c94.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2924 set thread context of 2728 2924 ctfmon.exe 35 -
Runs .reg file with regedit 3 IoCs
pid Process 2496 regedit.exe 2700 regedit.exe 2784 regedit.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2496 1732 996887ad773945a7884931c5f1ff5c94.exe 28 PID 1732 wrote to memory of 2496 1732 996887ad773945a7884931c5f1ff5c94.exe 28 PID 1732 wrote to memory of 2496 1732 996887ad773945a7884931c5f1ff5c94.exe 28 PID 1732 wrote to memory of 2496 1732 996887ad773945a7884931c5f1ff5c94.exe 28 PID 1732 wrote to memory of 3024 1732 996887ad773945a7884931c5f1ff5c94.exe 29 PID 1732 wrote to memory of 3024 1732 996887ad773945a7884931c5f1ff5c94.exe 29 PID 1732 wrote to memory of 3024 1732 996887ad773945a7884931c5f1ff5c94.exe 29 PID 1732 wrote to memory of 3024 1732 996887ad773945a7884931c5f1ff5c94.exe 29 PID 3024 wrote to memory of 2692 3024 msdtr.exe 30 PID 3024 wrote to memory of 2692 3024 msdtr.exe 30 PID 3024 wrote to memory of 2692 3024 msdtr.exe 30 PID 3024 wrote to memory of 2692 3024 msdtr.exe 30 PID 3024 wrote to memory of 2700 3024 msdtr.exe 32 PID 3024 wrote to memory of 2700 3024 msdtr.exe 32 PID 3024 wrote to memory of 2700 3024 msdtr.exe 32 PID 3024 wrote to memory of 2700 3024 msdtr.exe 32 PID 3024 wrote to memory of 2784 3024 msdtr.exe 33 PID 3024 wrote to memory of 2784 3024 msdtr.exe 33 PID 3024 wrote to memory of 2784 3024 msdtr.exe 33 PID 3024 wrote to memory of 2784 3024 msdtr.exe 33 PID 3024 wrote to memory of 2924 3024 msdtr.exe 34 PID 3024 wrote to memory of 2924 3024 msdtr.exe 34 PID 3024 wrote to memory of 2924 3024 msdtr.exe 34 PID 3024 wrote to memory of 2924 3024 msdtr.exe 34 PID 2924 wrote to memory of 2728 2924 ctfmon.exe 35 PID 2924 wrote to memory of 2728 2924 ctfmon.exe 35 PID 2924 wrote to memory of 2728 2924 ctfmon.exe 35 PID 2924 wrote to memory of 2728 2924 ctfmon.exe 35 PID 2924 wrote to memory of 2728 2924 ctfmon.exe 35 PID 2924 wrote to memory of 2728 2924 ctfmon.exe 35 PID 3024 wrote to memory of 2164 3024 msdtr.exe 36 PID 3024 wrote to memory of 2164 3024 msdtr.exe 36 PID 3024 wrote to memory of 2164 3024 msdtr.exe 36 PID 3024 wrote to memory of 2164 3024 msdtr.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\996887ad773945a7884931c5f1ff5c94.exe"C:\Users\Admin\AppData\Local\Temp\996887ad773945a7884931c5f1ff5c94.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\regedit.exeregedit.exe /s C:\Users\Admin\AppData\Local\Temp\aaa.reg2⤵
- Modifies WinLogon for persistence
- Runs .reg file with regedit
PID:2496
-
-
C:\Users\Admin\AppData\Local\Temp\msdtr.exeC:\Users\Admin\AppData\Local\Temp\msdtr.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\cmd.execmd.exe /c copy \*.*3⤵PID:2692
-
-
C:\Windows\SysWOW64\regedit.exeregedit.exe /s /e Lù\back1.reg "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders"3⤵
- Runs .reg file with regedit
PID:2700
-
-
C:\Windows\SysWOW64\regedit.exeregedit.exe /s /e Lù\back2.reg "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders"3⤵
- Runs .reg file with regedit
PID:2784
-
-
C:\ProgramData\Application Data\Microsoft\Comon\ctfmon.exe"C:\ProgramData\Application Data\Microsoft\Comon\ctfmon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵PID:2728
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\ProgramData\Documents\microtm.bat3⤵PID:2164
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62B
MD552494916da068530cd4545e8a376b776
SHA1382641c9522d8a12df6449f5f31b53c3e732f0c5
SHA2568dfdb5794c1ec9b8a108ea0ec682b409527b6c2e79960acae91000b8df239c03
SHA51235e099987dc8001bb7f7c38c105b85533b4bd603f4c1a91f5c6d08c271df0e2bfe3f8811582e36e79847dc3c6f51fe38df531ad063e7de5c328e84a8af985089
-
Filesize
413B
MD5e62423d7be4ca6661ca629d6b7a9a104
SHA1ae0e34911292701ff9c94869364a36b98ef76fed
SHA25611fa728742f4d51b25bc1e16fc77db63226fc702c10b5e3c6f098f562fdae64c
SHA5129de8f6b68f28637ef4844df8914b926a3d7e90e3013b4aa4e871eda3e5d8d9525747541061f9e46528c1201a10bab520c763ad2dc5e841001eb5b24f077f79c7
-
Filesize
35KB
MD50e5e9d9e01f8e7eb7c2a04a88e4899e3
SHA116da045e831a404f25e239602387c72dab3e38b1
SHA256fd7811e18521f4761030e08b5c3ab46b71163637d193dedc1fe91639b3e98f5e
SHA512d1b8b9b5a5e246cdd40ee6fb3c53bb7d36415ea484101548ed3c2468a51b29c3ad7bf1cc7741799e9d80b04a0c821a21759094b90407fcdc7c9faa8449060d4e
-
Filesize
41KB
MD54c3dce52edaec8f5e3a7a8775623d669
SHA1e54587845bb153cade4c025d6519ace63d1ac92f
SHA256b4a33369d9f2b2a43196229106bd21bb4cada7aebf662fa369d65101856df9a9
SHA51270b1f49d8cc39272ef96a11c19d2a2a710bf976402c7091a47b396c476c05b113aadf8be45300477774a7ec8cc2d2e56ba953ea0a181dc934e2b766634dfcc9f