Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/03/2024, 18:04
Static task
static1
Behavioral task
behavioral1
Sample
ChilledWindows.GUI.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ChilledWindows.GUI.exe
Resource
win10v2004-20240226-en
General
-
Target
ChilledWindows.GUI.exe
-
Size
4.3MB
-
MD5
74ff57825e5256a5e145c246bdf55a48
-
SHA1
a09c4666725ee3791a46018899c977747751003c
-
SHA256
1ffaef081b66fba6d95e34d3c7c70b6958f6f76702bea07205162bba32387b1a
-
SHA512
207a63aef56a8941e2560be4242c107e93fa108f837dca59d04092b295cc685d7848840c8920ac7e415671d5902bf080b4ff8bcddfc88182315d9da4c8d39515
-
SSDEEP
98304:U3on4k4113jdraOptUIQu8GMuwxzrH+zpCYP/KTAurli:U3on4HjtUT3kUrHG0a
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2140 CHROMI~2.EXE 2648 helper.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ChilledWindows.GUI.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: helper.exe File opened (read-only) \??\R: helper.exe File opened (read-only) \??\W: helper.exe File opened (read-only) \??\L: helper.exe File opened (read-only) \??\X: helper.exe File opened (read-only) \??\G: helper.exe File opened (read-only) \??\I: helper.exe File opened (read-only) \??\J: helper.exe File opened (read-only) \??\N: helper.exe File opened (read-only) \??\Q: helper.exe File opened (read-only) \??\S: helper.exe File opened (read-only) \??\U: helper.exe File opened (read-only) \??\Y: helper.exe File opened (read-only) \??\A: helper.exe File opened (read-only) \??\E: helper.exe File opened (read-only) \??\K: helper.exe File opened (read-only) \??\P: helper.exe File opened (read-only) \??\T: helper.exe File opened (read-only) \??\V: helper.exe File opened (read-only) \??\Z: helper.exe File opened (read-only) \??\B: helper.exe File opened (read-only) \??\H: helper.exe File opened (read-only) \??\M: helper.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2648 helper.exe Token: SeIncBasePriorityPrivilege 2648 helper.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2648 helper.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1748 wrote to memory of 2140 1748 ChilledWindows.GUI.exe 28 PID 1748 wrote to memory of 2140 1748 ChilledWindows.GUI.exe 28 PID 1748 wrote to memory of 2140 1748 ChilledWindows.GUI.exe 28 PID 2140 wrote to memory of 2648 2140 CHROMI~2.EXE 29 PID 2140 wrote to memory of 2648 2140 CHROMI~2.EXE 29 PID 2140 wrote to memory of 2648 2140 CHROMI~2.EXE 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ChilledWindows.GUI.exe"C:\Users\Admin\AppData\Local\Temp\ChilledWindows.GUI.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CHROMI~2.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CHROMI~2.EXE2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\helper.exe"C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\helper.exe"3⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2648
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD5b840b27df10b80d7d17e7ba88fe549ca
SHA12769b3696b80aa8048fbab5e08629c7369810499
SHA25663ed16670362ddbc0fb96d2762c84f68073988d1f1f49fc4f064fad56076287e
SHA512f1ceeacdbb4101b8e985878f2444840e3aa1dfe0fc2d241ebffbff48b00abf1d895425dbb1833b3a69e93b5edcf291b57c289e6b0d8ff072e7a0d1278f26ceea
-
Filesize
3.6MB
MD5698ddcaec1edcf1245807627884edf9c
SHA1c7fcbeaa2aadffaf807c096c51fb14c47003ac20
SHA256cde975f975d21edb2e5faa505205ab8a2c5a565ba1ff8585d1f0e372b2a1d78b
SHA512a2c326f0c653edcd613a3cefc8d82006e843e69afc787c870aa1b9686a20d79e5ab4e9e60b04d1970f07d88318588c1305117810e73ac620afd1fb6511394155
-
Filesize
4.4MB
MD56a4853cd0584dc90067e15afb43c4962
SHA1ae59bbb123e98dc8379d08887f83d7e52b1b47fc
SHA256ccb9502bf8ba5becf8b758ca04a5625c30b79e2d10d2677cc43ae4253e1288ec
SHA512feb223e0de9bd64e32dc4f3227e175b58196b5e614bca8c2df0bbca2442a564e39d66bcd465154149dc7ebbd3e1ca644ed09d9a9174b52236c76e7388cb9d996