Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12/03/2024, 19:32
Static task
static1
Behavioral task
behavioral1
Sample
c42f3bc7ca2b4c438c915a79901f88e2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c42f3bc7ca2b4c438c915a79901f88e2.exe
Resource
win10v2004-20240226-en
General
-
Target
c42f3bc7ca2b4c438c915a79901f88e2.exe
-
Size
284KB
-
MD5
c42f3bc7ca2b4c438c915a79901f88e2
-
SHA1
7e3b89096fe86d2eadd08faea78a3432093651cf
-
SHA256
2c91d8968755f474876a4e7f093447fb1de9608b2a95e69b0ed46fc885561b65
-
SHA512
595278cd721b5c206b0641d44f6baeb6233850665e497fddb4afd18166f211fae3e055bda1fb260e0271e0ebca4891fc451b0ff059be791824c30af7ba46bd70
-
SSDEEP
6144:wHbeYb8eXeJgwWG3h/GgtnmJxzUH2zvP6srbUxhaV3P2N6rk:wHa68eXeJgwWG3dGgtmJxzs2rP6q6oV6
Malware Config
Signatures
-
Disables taskbar notifications via registry modification
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
pid Process 2320 pcj.exe -
Executes dropped EXE 1 IoCs
pid Process 2320 pcj.exe -
Loads dropped DLL 2 IoCs
pid Process 2276 c42f3bc7ca2b4c438c915a79901f88e2.exe 2276 c42f3bc7ca2b4c438c915a79901f88e2.exe -
Modifies system executable filetype association 2 TTPs 17 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\exefile\shell pcj.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\exefile\shell\open\command pcj.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\exefile\shell\open pcj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" pcj.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\exefile\shell\runas pcj.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\exefile\shell\runas\command pcj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" pcj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" pcj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\exefile\ = "Application" pcj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\exefile\DefaultIcon\ = "%1" pcj.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\exefile\shell\start\command pcj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\pcj.exe\" -a \"%1\" %*" pcj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" pcj.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\exefile\shell\start pcj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" pcj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\exefile\Content Type = "application/x-msdownload" pcj.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\exefile\DefaultIcon pcj.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\ctfmon.exe = "C:\\WINDOWS\\system32\\ctfmon.exe" pcj.exe -
Modifies registry class 41 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\pcj.exe\" -a \"%1\" %*" pcj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.exe\ = "exefile" pcj.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.exe\shell\open pcj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\pcj.exe\" -a \"%1\" %*" pcj.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.exe\shell\start pcj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.exe\shell\start\command\IsolatedCommand = "\"%1\" %*" pcj.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\exefile\DefaultIcon pcj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" pcj.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.exe\shell\runas pcj.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\exefile\shell\runas pcj.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\exefile\shell pcj.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\exefile\shell\open\command pcj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" pcj.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.exe\shell pcj.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.exe\shell\open\command pcj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" pcj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\exefile\ = "Application" pcj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" pcj.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.exe\DefaultIcon\ = "%1" pcj.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\exefile pcj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" pcj.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\exefile\shell\start\command pcj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.exe\shell\start\command\ = "\"%1\" %*" pcj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" pcj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" pcj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\exefile\DefaultIcon\ = "%1" pcj.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.exe pcj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.exe\Content Type = "application/x-msdownload" pcj.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.exe\DefaultIcon pcj.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.exe\shell\runas\command pcj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" pcj.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\exefile\shell\runas\command pcj.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\.exe\shell\start\command pcj.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\exefile\Content Type = "application/x-msdownload" pcj.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\exefile\shell\open pcj.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000_CLASSES\exefile\shell\start pcj.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2276 c42f3bc7ca2b4c438c915a79901f88e2.exe 2276 c42f3bc7ca2b4c438c915a79901f88e2.exe 2276 c42f3bc7ca2b4c438c915a79901f88e2.exe 2276 c42f3bc7ca2b4c438c915a79901f88e2.exe 2276 c42f3bc7ca2b4c438c915a79901f88e2.exe 2276 c42f3bc7ca2b4c438c915a79901f88e2.exe 2276 c42f3bc7ca2b4c438c915a79901f88e2.exe 2276 c42f3bc7ca2b4c438c915a79901f88e2.exe 2276 c42f3bc7ca2b4c438c915a79901f88e2.exe 2320 pcj.exe 2320 pcj.exe 2320 pcj.exe 2320 pcj.exe 2320 pcj.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2568 explorer.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeShutdownPrivilege 2568 explorer.exe Token: SeShutdownPrivilege 2568 explorer.exe Token: SeShutdownPrivilege 2568 explorer.exe Token: SeShutdownPrivilege 2568 explorer.exe Token: SeShutdownPrivilege 2568 explorer.exe Token: SeShutdownPrivilege 2568 explorer.exe Token: SeShutdownPrivilege 2568 explorer.exe Token: SeShutdownPrivilege 2568 explorer.exe Token: SeShutdownPrivilege 2568 explorer.exe Token: SeShutdownPrivilege 2568 explorer.exe Token: SeShutdownPrivilege 2568 explorer.exe Token: SeShutdownPrivilege 2568 explorer.exe Token: SeShutdownPrivilege 2568 explorer.exe Token: SeShutdownPrivilege 2568 explorer.exe Token: SeShutdownPrivilege 2568 explorer.exe Token: SeShutdownPrivilege 2568 explorer.exe Token: SeShutdownPrivilege 2568 explorer.exe Token: SeShutdownPrivilege 2568 explorer.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2320 pcj.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2320 pcj.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe -
Suspicious use of SendNotifyMessage 19 IoCs
pid Process 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2568 explorer.exe 2320 pcj.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2320 2276 c42f3bc7ca2b4c438c915a79901f88e2.exe 28 PID 2276 wrote to memory of 2320 2276 c42f3bc7ca2b4c438c915a79901f88e2.exe 28 PID 2276 wrote to memory of 2320 2276 c42f3bc7ca2b4c438c915a79901f88e2.exe 28 PID 2276 wrote to memory of 2320 2276 c42f3bc7ca2b4c438c915a79901f88e2.exe 28 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c42f3bc7ca2b4c438c915a79901f88e2.exe"C:\Users\Admin\AppData\Local\Temp\c42f3bc7ca2b4c438c915a79901f88e2.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\pcj.exe"C:\Users\Admin\AppData\Local\pcj.exe" -gav C:\Users\Admin\AppData\Local\Temp\c42f3bc7ca2b4c438c915a79901f88e2.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2320
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2568
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD55b45ee8d5055b3788dc37d734e2ff057
SHA17b6112e818e844263b2a9310b25fca1f2ddc87cf
SHA256bdb099d7427e87bbff8886304e3ec24ff036f64d9c94561b9f64c52b3f8100bc
SHA51235c5921409fc558f41d6f7bea415f1279c6380fdcd2a305fafa5e31b8e914b78ef1e776c22d776e1d426f2c50c5f0c521eaf87dfcb4c5de8e75ff0c64e6f8a21