Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/03/2024, 12:40
Static task
static1
Behavioral task
behavioral1
Sample
b4b7bb8f2d66b1694ffd5c510d0a243b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b4b7bb8f2d66b1694ffd5c510d0a243b.exe
Resource
win10v2004-20240226-en
General
-
Target
b4b7bb8f2d66b1694ffd5c510d0a243b.exe
-
Size
158KB
-
MD5
b4b7bb8f2d66b1694ffd5c510d0a243b
-
SHA1
73b6a556d403c45137cc1f9401092d450b488868
-
SHA256
efb6103147d123a4c99b751d58a420d42fbbfb726bc1093a2b1bf188b1b81c23
-
SHA512
c9a41f407a6f0055f6e12f3fd1d03b1cd502c7496238811f6cb53e4ec922d4880f8136239deb8b33551dd94fefc86648d419653012c039067ae9b79632996cd1
-
SSDEEP
3072:mU01A7ku2d2eBknZAIW4z73N/RnX4eC5EGtpcv6k3:mPZ/d2Kmnz5RnorEGtTk3
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2900 A7350D82DDC.exe 2600 65P3BC8.exe -
Loads dropped DLL 4 IoCs
pid Process 2260 b4b7bb8f2d66b1694ffd5c510d0a243b.exe 2260 b4b7bb8f2d66b1694ffd5c510d0a243b.exe 2900 A7350D82DDC.exe 2900 A7350D82DDC.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Windows\CurrentVersion\Run\XWWWVA1IVG8UWD6GKIGR = "C:\\servi3e.bin\\A7350D82DDC.exe /q" 65P3BC8.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\PhishingFilter 65P3BC8.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\PhishingFilter\EnabledV8 = "0" 65P3BC8.exe Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ShownServiceDownBalloon = "0" 65P3BC8.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery\ClearBrowsingHistoryOnExit = "0" 65P3BC8.exe Key created \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Microsoft\Internet Explorer\Recovery 65P3BC8.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2260 b4b7bb8f2d66b1694ffd5c510d0a243b.exe 2260 b4b7bb8f2d66b1694ffd5c510d0a243b.exe 2900 A7350D82DDC.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe 2600 65P3BC8.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2260 b4b7bb8f2d66b1694ffd5c510d0a243b.exe Token: SeDebugPrivilege 2260 b4b7bb8f2d66b1694ffd5c510d0a243b.exe Token: SeDebugPrivilege 2260 b4b7bb8f2d66b1694ffd5c510d0a243b.exe Token: SeDebugPrivilege 2260 b4b7bb8f2d66b1694ffd5c510d0a243b.exe Token: SeDebugPrivilege 2900 A7350D82DDC.exe Token: SeDebugPrivilege 2900 A7350D82DDC.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe Token: SeDebugPrivilege 2600 65P3BC8.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2900 2260 b4b7bb8f2d66b1694ffd5c510d0a243b.exe 28 PID 2260 wrote to memory of 2900 2260 b4b7bb8f2d66b1694ffd5c510d0a243b.exe 28 PID 2260 wrote to memory of 2900 2260 b4b7bb8f2d66b1694ffd5c510d0a243b.exe 28 PID 2260 wrote to memory of 2900 2260 b4b7bb8f2d66b1694ffd5c510d0a243b.exe 28 PID 2900 wrote to memory of 2600 2900 A7350D82DDC.exe 29 PID 2900 wrote to memory of 2600 2900 A7350D82DDC.exe 29 PID 2900 wrote to memory of 2600 2900 A7350D82DDC.exe 29 PID 2900 wrote to memory of 2600 2900 A7350D82DDC.exe 29 PID 2900 wrote to memory of 2600 2900 A7350D82DDC.exe 29 PID 2900 wrote to memory of 2600 2900 A7350D82DDC.exe 29 PID 2600 wrote to memory of 2260 2600 65P3BC8.exe 27 PID 2600 wrote to memory of 2260 2600 65P3BC8.exe 27 PID 2600 wrote to memory of 2260 2600 65P3BC8.exe 27 PID 2600 wrote to memory of 2260 2600 65P3BC8.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4b7bb8f2d66b1694ffd5c510d0a243b.exe"C:\Users\Admin\AppData\Local\Temp\b4b7bb8f2d66b1694ffd5c510d0a243b.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\servi3e.bin\A7350D82DDC.exe"C:\servi3e.bin\A7350D82DDC.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\65P3BC8.exe"C:\Users\Admin\AppData\Local\Temp\65P3BC8.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2600
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD529090b6b4d6605a97ac760d06436ac2d
SHA1d929d3389642e52bae5ad8512293c9c4d3e4fab5
SHA25698a24f0caf5b578e230e6f1103a5fba6aecb28a9128cad5520fcde546d643272
SHA5129121ec42fa66e14a4fc3932c8dbcc8fb1a93ab9de00da57a82e176faa70b73f6992f8c5e2ab52c02fc28c8f0c59aee73b6fbbd39107db7d15105054f4390e9be
-
Filesize
5KB
MD5f56193ca932f0b765c493f1dcd579608
SHA1cce79dbd87546a419d3a8ca02e643934670f4841
SHA256a0810b82f712ab51ec25b51374b81d5803754e53ed83cc2d36079e5a0a8a3885
SHA51277e390ba8a9d74f02217594fddd5a85cf126c975d0a7dd82b59aad1c1e91a8dfc777c16c6a8e14409f3f826c6be9a3132bb1a9b3774d8ee2edbdcb228fac0b68
-
Filesize
158KB
MD5b4b7bb8f2d66b1694ffd5c510d0a243b
SHA173b6a556d403c45137cc1f9401092d450b488868
SHA256efb6103147d123a4c99b751d58a420d42fbbfb726bc1093a2b1bf188b1b81c23
SHA512c9a41f407a6f0055f6e12f3fd1d03b1cd502c7496238811f6cb53e4ec922d4880f8136239deb8b33551dd94fefc86648d419653012c039067ae9b79632996cd1