Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/02/2024, 02:24
Static task
static1
Behavioral task
behavioral1
Sample
aac22c5c90004cfeecd76e274e029ef3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aac22c5c90004cfeecd76e274e029ef3.exe
Resource
win10v2004-20240226-en
General
-
Target
aac22c5c90004cfeecd76e274e029ef3.exe
-
Size
972KB
-
MD5
aac22c5c90004cfeecd76e274e029ef3
-
SHA1
eea98faea4d810e940c7d9f62fb8035a0d48b3f6
-
SHA256
350bcbd13848e76b30da41278a0b0f3c2ca6d9c3b4e5b5cdb64ee24c8c8f9470
-
SHA512
04cde8b071172a3f8ac5bc3f74dbcff89c2ec3c1b1884e3f6a569d82b0efcf322bbf883cfb056c29b1769688e916c731770acc355fdd5d4c8f59348779005ce3
-
SSDEEP
12288:45DJZ9aHYol3wwuMx4tbV6LjKm96TVQxbyv99MT5t:45lalbuMWULjKgfyvM
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1640 set thread context of 2144 1640 aac22c5c90004cfeecd76e274e029ef3.exe 38 PID 2144 set thread context of 2704 2144 aac22c5c90004cfeecd76e274e029ef3.exe 40 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1576 schtasks.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2456 powershell.exe 2856 powershell.exe 1192 powershell.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 2456 powershell.exe Token: SeDebugPrivilege 2856 powershell.exe Token: SeDebugPrivilege 1192 powershell.exe Token: SeShutdownPrivilege 668 explorer.exe Token: SeShutdownPrivilege 668 explorer.exe Token: SeShutdownPrivilege 668 explorer.exe Token: SeShutdownPrivilege 668 explorer.exe Token: SeShutdownPrivilege 668 explorer.exe Token: SeShutdownPrivilege 668 explorer.exe Token: SeShutdownPrivilege 668 explorer.exe Token: SeShutdownPrivilege 668 explorer.exe Token: 33 568 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 568 AUDIODG.EXE Token: 33 568 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 568 AUDIODG.EXE Token: SeShutdownPrivilege 668 explorer.exe Token: SeShutdownPrivilege 668 explorer.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe -
Suspicious use of SendNotifyMessage 17 IoCs
pid Process 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe 668 explorer.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2456 1640 aac22c5c90004cfeecd76e274e029ef3.exe 30 PID 1640 wrote to memory of 2456 1640 aac22c5c90004cfeecd76e274e029ef3.exe 30 PID 1640 wrote to memory of 2456 1640 aac22c5c90004cfeecd76e274e029ef3.exe 30 PID 1640 wrote to memory of 2456 1640 aac22c5c90004cfeecd76e274e029ef3.exe 30 PID 1640 wrote to memory of 2856 1640 aac22c5c90004cfeecd76e274e029ef3.exe 32 PID 1640 wrote to memory of 2856 1640 aac22c5c90004cfeecd76e274e029ef3.exe 32 PID 1640 wrote to memory of 2856 1640 aac22c5c90004cfeecd76e274e029ef3.exe 32 PID 1640 wrote to memory of 2856 1640 aac22c5c90004cfeecd76e274e029ef3.exe 32 PID 1640 wrote to memory of 1576 1640 aac22c5c90004cfeecd76e274e029ef3.exe 34 PID 1640 wrote to memory of 1576 1640 aac22c5c90004cfeecd76e274e029ef3.exe 34 PID 1640 wrote to memory of 1576 1640 aac22c5c90004cfeecd76e274e029ef3.exe 34 PID 1640 wrote to memory of 1576 1640 aac22c5c90004cfeecd76e274e029ef3.exe 34 PID 1640 wrote to memory of 1192 1640 aac22c5c90004cfeecd76e274e029ef3.exe 36 PID 1640 wrote to memory of 1192 1640 aac22c5c90004cfeecd76e274e029ef3.exe 36 PID 1640 wrote to memory of 1192 1640 aac22c5c90004cfeecd76e274e029ef3.exe 36 PID 1640 wrote to memory of 1192 1640 aac22c5c90004cfeecd76e274e029ef3.exe 36 PID 1640 wrote to memory of 2144 1640 aac22c5c90004cfeecd76e274e029ef3.exe 38 PID 1640 wrote to memory of 2144 1640 aac22c5c90004cfeecd76e274e029ef3.exe 38 PID 1640 wrote to memory of 2144 1640 aac22c5c90004cfeecd76e274e029ef3.exe 38 PID 1640 wrote to memory of 2144 1640 aac22c5c90004cfeecd76e274e029ef3.exe 38 PID 1640 wrote to memory of 2144 1640 aac22c5c90004cfeecd76e274e029ef3.exe 38 PID 1640 wrote to memory of 2144 1640 aac22c5c90004cfeecd76e274e029ef3.exe 38 PID 1640 wrote to memory of 2144 1640 aac22c5c90004cfeecd76e274e029ef3.exe 38 PID 1640 wrote to memory of 2144 1640 aac22c5c90004cfeecd76e274e029ef3.exe 38 PID 1640 wrote to memory of 2144 1640 aac22c5c90004cfeecd76e274e029ef3.exe 38 PID 2144 wrote to memory of 668 2144 aac22c5c90004cfeecd76e274e029ef3.exe 39 PID 2144 wrote to memory of 668 2144 aac22c5c90004cfeecd76e274e029ef3.exe 39 PID 2144 wrote to memory of 668 2144 aac22c5c90004cfeecd76e274e029ef3.exe 39 PID 2144 wrote to memory of 668 2144 aac22c5c90004cfeecd76e274e029ef3.exe 39 PID 668 wrote to memory of 2716 668 explorer.exe 41 PID 668 wrote to memory of 2716 668 explorer.exe 41 PID 668 wrote to memory of 2716 668 explorer.exe 41 PID 2144 wrote to memory of 2704 2144 aac22c5c90004cfeecd76e274e029ef3.exe 40 PID 2144 wrote to memory of 2704 2144 aac22c5c90004cfeecd76e274e029ef3.exe 40 PID 2144 wrote to memory of 2704 2144 aac22c5c90004cfeecd76e274e029ef3.exe 40 PID 2144 wrote to memory of 2704 2144 aac22c5c90004cfeecd76e274e029ef3.exe 40 PID 2144 wrote to memory of 2704 2144 aac22c5c90004cfeecd76e274e029ef3.exe 40 PID 2144 wrote to memory of 2704 2144 aac22c5c90004cfeecd76e274e029ef3.exe 40 PID 2144 wrote to memory of 2704 2144 aac22c5c90004cfeecd76e274e029ef3.exe 40 PID 2144 wrote to memory of 2704 2144 aac22c5c90004cfeecd76e274e029ef3.exe 40 PID 2144 wrote to memory of 2704 2144 aac22c5c90004cfeecd76e274e029ef3.exe 40 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\aac22c5c90004cfeecd76e274e029ef3.exe"C:\Users\Admin\AppData\Local\Temp\aac22c5c90004cfeecd76e274e029ef3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\aac22c5c90004cfeecd76e274e029ef3.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\dAFbvNYf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2856
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\dAFbvNYf" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4615.tmp"2⤵
- Creates scheduled task(s)
PID:1576
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\dAFbvNYf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1192
-
-
C:\Users\Admin\AppData\Local\Temp\aac22c5c90004cfeecd76e274e029ef3.exe"C:\Users\Admin\AppData\Local\Temp\aac22c5c90004cfeecd76e274e029ef3.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Windows\system32\ctfmon.exectfmon.exe4⤵PID:2716
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" Default 23.105.131.193 8488 sqMUAgrfv3⤵PID:2704
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2e41⤵
- Suspicious use of AdjustPrivilegeToken
PID:568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ebef1d1386438f7f60ad6af0869bc0e5
SHA1e67faa511ad38126b5926c875d7e1ee83a5775aa
SHA25666f16808a8623ad50a1b6d1fcee19f80e477a3fc12a8a3b104bf57d662553c7e
SHA5127df13710bd87d77b95dba30ee69f386ada30cb4a40e861a690536e540d74f6cbe7aab29ecebeb15605b6e3f79c3f718ea83fe3ffc81714535ba5cebf8db7110b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5735142286ae920a33baa4dbe5df6b1fb
SHA1ca7e8e459d49aa45b3dfa912b385e29d6ec30f61
SHA25628132ec6b3ec82f9b5c157c5db23e6c5663590214b1dd39038693a124237200b
SHA51291407551ee5f7294992510c90b804ead912717040404a9aff9938cd75e004342ae536a5a9b693b2b1434d0b68cebec39e1103359b24ee7daae88cbaac28d88f2