Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/03/2024, 15:33
Static task
static1
Behavioral task
behavioral1
Sample
c0f1c92a74f2e4d96f26f5f08963ec8e.exe
Resource
win7-20240221-en
General
-
Target
c0f1c92a74f2e4d96f26f5f08963ec8e.exe
-
Size
35KB
-
MD5
c0f1c92a74f2e4d96f26f5f08963ec8e
-
SHA1
8d143e96879e76898a3540b32d1423ea06c10136
-
SHA256
36fe0b9f08dcff684a786175cfb392e6749ea2618bc8ed8bfbb6b90cb76d5961
-
SHA512
26971a4c0544c7958e418eb5d466a5dff27cfaf606707ac5f094af9a2599ceb4ed863827b70ce391340e455d68d3794dfb9fe243e4a70f2e8420cf2c9d1d0eb2
-
SSDEEP
768:LLp41wWGI9sLAqFU+YW/ywFOoWhBQ8+YPeQ6:LLp41B9sLdK9OkhQd
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 3064 cmd.exe -
Installs/modifies Browser Helper Object 2 TTPs 6 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{18DF081C-E8AD-4283-A596-FA578C2EBDC3} c0f1c92a74f2e4d96f26f5f08963ec8e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72853161-30C5-4D22-B7F9-0BBC1D38A37E} c0f1c92a74f2e4d96f26f5f08963ec8e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{B4F3A835-0E21-4959-BA22-42B3008E02FF} c0f1c92a74f2e4d96f26f5f08963ec8e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72C2B273-E2A9-40C4-B147-471A88EA7BEE} c0f1c92a74f2e4d96f26f5f08963ec8e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{72C2B273-E2A9-40C4-B147-471A88EA7BEE}\ = "Yahoo! Messenger" c0f1c92a74f2e4d96f26f5f08963ec8e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects c0f1c92a74f2e4d96f26f5f08963ec8e.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\mssystem.dat c0f1c92a74f2e4d96f26f5f08963ec8e.exe File created C:\Windows\SysWOW64\msyahooea.dll c0f1c92a74f2e4d96f26f5f08963ec8e.exe File opened for modification C:\Windows\SysWOW64\msyahooea.dll c0f1c92a74f2e4d96f26f5f08963ec8e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main c0f1c92a74f2e4d96f26f5f08963ec8e.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\@#$E$@#n%^a&^%b#$%l^%$e^& %^&B#$%r&^%o$%w@#$s^%$e&*r(*& &*E*^&x$^%t%$#e@#$n&^%s#%i*^o$%^n(&*s%^& = "yes" c0f1c92a74f2e4d96f26f5f08963ec8e.exe -
Modifies registry class 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{72C2B273-E2A9-40C4-B147-471A88EA7BEE}\InProcServer32\ThreadingModel = "Apartment" c0f1c92a74f2e4d96f26f5f08963ec8e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID c0f1c92a74f2e4d96f26f5f08963ec8e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{72C2B273-E2A9-40C4-B147-471A88EA7BEE} c0f1c92a74f2e4d96f26f5f08963ec8e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{72C2B273-E2A9-40C4-B147-471A88EA7BEE}\ = "Yahoo! Messenger" c0f1c92a74f2e4d96f26f5f08963ec8e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{72C2B273-E2A9-40C4-B147-471A88EA7BEE}\InProcServer32 c0f1c92a74f2e4d96f26f5f08963ec8e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{72C2B273-E2A9-40C4-B147-471A88EA7BEE}\InProcServer32\ = "%SystemRoot%\\SysWow64\\msyahooea.dll" c0f1c92a74f2e4d96f26f5f08963ec8e.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2904 wrote to memory of 3064 2904 c0f1c92a74f2e4d96f26f5f08963ec8e.exe 28 PID 2904 wrote to memory of 3064 2904 c0f1c92a74f2e4d96f26f5f08963ec8e.exe 28 PID 2904 wrote to memory of 3064 2904 c0f1c92a74f2e4d96f26f5f08963ec8e.exe 28 PID 2904 wrote to memory of 3064 2904 c0f1c92a74f2e4d96f26f5f08963ec8e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0f1c92a74f2e4d96f26f5f08963ec8e.exe"C:\Users\Admin\AppData\Local\Temp\c0f1c92a74f2e4d96f26f5f08963ec8e.exe"1⤵
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C system.bat2⤵
- Deletes itself
PID:3064
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
111B
MD57844a3b91327c09974a966cb36b0f806
SHA1e67afb20f7e0111c7bc0b2c7ea521d83425f6a15
SHA2566d3fb11f4e715fee2fbfd4f7a5ef6a33cf3a481693e1c65a8533215495da9f6d
SHA512ea1c337ea34badaf06d56140837572435d9a05b8cc46c38d6c9d3bec287b422b1f70ebef1c7fb58cd1b2b79c082ab2669188b33d44c6b9161ec2caa007c1f5c9