Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
29/02/2024, 08:59 UTC
Static task
static1
Behavioral task
behavioral1
Sample
80a7dbee8158a3b6fde39bceceec0635c414145c069852a9047d06c124361d6d.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
80a7dbee8158a3b6fde39bceceec0635c414145c069852a9047d06c124361d6d.exe
Resource
win10v2004-20240226-en
General
-
Target
80a7dbee8158a3b6fde39bceceec0635c414145c069852a9047d06c124361d6d.exe
-
Size
2.1MB
-
MD5
36883a998e16240311949a43f5c1ecb7
-
SHA1
50edc4c84eb8c15ab1653433700fce86af60f0b0
-
SHA256
80a7dbee8158a3b6fde39bceceec0635c414145c069852a9047d06c124361d6d
-
SHA512
c9321e31756ff0e2d4ff115293a4e44399ef8fcde3a470e0d7e989f107776a1d6c383f12815ea19d57820d39e94e4bbb40deae5d695ec5fa4e2d055fb59d95a0
-
SSDEEP
49152:MwdhBkGMb18MLjRkRl+2HxYc0vFuvNX/oj6nPtI:MwdhBkGMb188jaz+2RY
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,\"C:\\Users\\Admin\\AppData\\Local\\Pic1fPBkmq\\LOHejsSdpL.exe\" -s" 80a7dbee8158a3b6fde39bceceec0635c414145c069852a9047d06c124361d6d.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 80a7dbee8158a3b6fde39bceceec0635c414145c069852a9047d06c124361d6d.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 13 IoCs
flow ioc 2 raw.githubusercontent.com 6 raw.githubusercontent.com 7 raw.githubusercontent.com 9 raw.githubusercontent.com 18 raw.githubusercontent.com 21 raw.githubusercontent.com 12 raw.githubusercontent.com 13 raw.githubusercontent.com 15 raw.githubusercontent.com 25 raw.githubusercontent.com 3 raw.githubusercontent.com 19 raw.githubusercontent.com 24 raw.githubusercontent.com -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 80a7dbee8158a3b6fde39bceceec0635c414145c069852a9047d06c124361d6d.exe
Processes
Network
-
Remote address:8.8.8.8:53Requestraw.githubusercontent.comIN AResponseraw.githubusercontent.comIN A185.199.108.133raw.githubusercontent.comIN A185.199.109.133raw.githubusercontent.comIN A185.199.110.133raw.githubusercontent.comIN A185.199.111.133
-
Remote address:8.8.8.8:53Requesthaxlifec.mlIN AResponse
-
185.199.108.133:443raw.githubusercontent.comtls80a7dbee8158a3b6fde39bceceec0635c414145c069852a9047d06c124361d6d.exe359 B 219 B 5 5
-
185.199.108.133:443raw.githubusercontent.comtls80a7dbee8158a3b6fde39bceceec0635c414145c069852a9047d06c124361d6d.exe288 B 219 B 5 5
-
185.199.108.133:443raw.githubusercontent.comtls80a7dbee8158a3b6fde39bceceec0635c414145c069852a9047d06c124361d6d.exe288 B 219 B 5 5
-
185.199.108.133:443raw.githubusercontent.comtls80a7dbee8158a3b6fde39bceceec0635c414145c069852a9047d06c124361d6d.exe359 B 219 B 5 5
-
185.199.108.133:443raw.githubusercontent.comtls80a7dbee8158a3b6fde39bceceec0635c414145c069852a9047d06c124361d6d.exe359 B 219 B 5 5
-
185.199.108.133:443raw.githubusercontent.comtls80a7dbee8158a3b6fde39bceceec0635c414145c069852a9047d06c124361d6d.exe288 B 219 B 5 5
-
185.199.108.133:443raw.githubusercontent.comtls80a7dbee8158a3b6fde39bceceec0635c414145c069852a9047d06c124361d6d.exe359 B 219 B 5 5
-
185.199.108.133:443raw.githubusercontent.comtls80a7dbee8158a3b6fde39bceceec0635c414145c069852a9047d06c124361d6d.exe288 B 219 B 5 5
-
185.199.108.133:443raw.githubusercontent.comtls80a7dbee8158a3b6fde39bceceec0635c414145c069852a9047d06c124361d6d.exe334 B 219 B 6 5
-
185.199.108.133:443raw.githubusercontent.comtls80a7dbee8158a3b6fde39bceceec0635c414145c069852a9047d06c124361d6d.exe405 B 219 B 6 5
-
185.199.108.133:443raw.githubusercontent.comtls80a7dbee8158a3b6fde39bceceec0635c414145c069852a9047d06c124361d6d.exe359 B 219 B 5 5
-
185.199.108.133:443raw.githubusercontent.comtls80a7dbee8158a3b6fde39bceceec0635c414145c069852a9047d06c124361d6d.exe288 B 219 B 5 5
-
185.199.108.133:443raw.githubusercontent.comtls80a7dbee8158a3b6fde39bceceec0635c414145c069852a9047d06c124361d6d.exe359 B 219 B 5 5
-
185.199.108.133:443raw.githubusercontent.comtls80a7dbee8158a3b6fde39bceceec0635c414145c069852a9047d06c124361d6d.exe288 B 219 B 5 5
-
185.199.108.133:443raw.githubusercontent.comtls80a7dbee8158a3b6fde39bceceec0635c414145c069852a9047d06c124361d6d.exe288 B 219 B 5 5
-
185.199.108.133:443raw.githubusercontent.comtls80a7dbee8158a3b6fde39bceceec0635c414145c069852a9047d06c124361d6d.exe359 B 219 B 5 5
-
185.199.108.133:443raw.githubusercontent.comtls80a7dbee8158a3b6fde39bceceec0635c414145c069852a9047d06c124361d6d.exe359 B 219 B 5 5
-
185.199.108.133:443raw.githubusercontent.comtls80a7dbee8158a3b6fde39bceceec0635c414145c069852a9047d06c124361d6d.exe288 B 219 B 5 5
-
185.199.108.133:443raw.githubusercontent.comtls80a7dbee8158a3b6fde39bceceec0635c414145c069852a9047d06c124361d6d.exe359 B 219 B 5 5
-
185.199.108.133:443raw.githubusercontent.comtls80a7dbee8158a3b6fde39bceceec0635c414145c069852a9047d06c124361d6d.exe288 B 219 B 5 5
-
185.199.108.133:443raw.githubusercontent.comtls80a7dbee8158a3b6fde39bceceec0635c414145c069852a9047d06c124361d6d.exe288 B 219 B 5 5
-
185.199.108.133:443raw.githubusercontent.comtls80a7dbee8158a3b6fde39bceceec0635c414145c069852a9047d06c124361d6d.exe359 B 219 B 5 5
-
185.199.108.133:443raw.githubusercontent.comtls80a7dbee8158a3b6fde39bceceec0635c414145c069852a9047d06c124361d6d.exe359 B 219 B 5 5
-
185.199.108.133:443raw.githubusercontent.comtls80a7dbee8158a3b6fde39bceceec0635c414145c069852a9047d06c124361d6d.exe288 B 219 B 5 5
-
8.8.8.8:53raw.githubusercontent.comdns80a7dbee8158a3b6fde39bceceec0635c414145c069852a9047d06c124361d6d.exe71 B 135 B 1 1
DNS Request
raw.githubusercontent.com
DNS Response
185.199.108.133185.199.109.133185.199.110.133185.199.111.133
-
57 B 115 B 1 1
DNS Request
haxlifec.ml
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1