Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
13/03/2024, 18:51
Static task
static1
Behavioral task
behavioral1
Sample
c69e864715348c2f660dc2ac3c1f224e.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
c69e864715348c2f660dc2ac3c1f224e.exe
Resource
win10v2004-20240226-en
General
-
Target
c69e864715348c2f660dc2ac3c1f224e.exe
-
Size
200KB
-
MD5
c69e864715348c2f660dc2ac3c1f224e
-
SHA1
4e6fd2fb2faf70ae04f43bc4128bc2889e937355
-
SHA256
12c641c0ee76131f0b31f1585d9592d7b12c8d6590a27e1a7f398d2778cf4406
-
SHA512
b7f9d415dd85ae18a07b042f3a068411ae3092dca462aab80d4dc12b434bb18953dec6f53b3f430691683418ec55b93c9898ccff63ab9900daa7c9cfd4d43cef
-
SSDEEP
6144:jlLq/I+mO31DBybYdTJgr9OuZjOVce3BHdmzG39:hLqbN33RJgnRgVH4zGt
Malware Config
Signatures
-
Disables taskbar notifications via registry modification
-
Modifies Installed Components in the registry 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Executes dropped EXE 1 IoCs
pid Process 2636 xpg.exe -
Loads dropped DLL 2 IoCs
pid Process 2364 c69e864715348c2f660dc2ac3c1f224e.exe 2364 c69e864715348c2f660dc2ac3c1f224e.exe -
Modifies system executable filetype association 2 TTPs 17 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\xpg.exe\" -a \"%1\" %*" xpg.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\exefile\shell\runas xpg.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\exefile\shell xpg.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\exefile\shell\open\command xpg.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\exefile\shell\runas\command xpg.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\exefile\shell\start xpg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\exefile\ = "Application" xpg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" xpg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" xpg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" xpg.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\exefile\shell\start\command xpg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\exefile\DefaultIcon\ = "%1" xpg.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\exefile\shell\open xpg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" xpg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" xpg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\exefile\Content Type = "application/x-msdownload" xpg.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\exefile\DefaultIcon xpg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Windows\CurrentVersion\Run\ctfmon.exe = "C:\\WINDOWS\\system32\\ctfmon.exe" xpg.exe -
Modifies registry class 41 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\DefaultIcon\ = "%1" xpg.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\exefile\DefaultIcon xpg.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\exefile\shell xpg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\exefile\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\xpg.exe\" -a \"%1\" %*" xpg.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe xpg.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\shell\runas xpg.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\shell\start\command xpg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\shell\start\command\ = "\"%1\" %*" xpg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\exefile\ = "Application" xpg.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\exefile\shell\runas xpg.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\xpg.exe\" -a \"%1\" %*" xpg.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\shell\start xpg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\shell\start\command\IsolatedCommand = "\"%1\" %*" xpg.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\exefile xpg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\exefile\Content Type = "application/x-msdownload" xpg.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\exefile\shell\open xpg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\exefile\shell\start\command\IsolatedCommand = "\"%1\" %*" xpg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\Content Type = "application/x-msdownload" xpg.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\ = "exefile" xpg.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\DefaultIcon xpg.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\shell\open xpg.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\exefile\shell\runas\command xpg.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\exefile\shell\start xpg.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" xpg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" xpg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\exefile\DefaultIcon\ = "%1" xpg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\exefile\shell\runas\command\ = "\"%1\" %*" xpg.exe Set value (data) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\exefile\shell\open\command xpg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\exefile\shell\open\command\IsolatedCommand = "\"%1\" %*" xpg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\exefile\shell\runas\command\IsolatedCommand = "\"%1\" %*" xpg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\exefile\shell\start\command\ = "\"%1\" %*" xpg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" xpg.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\exefile\shell\start\command xpg.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\shell\runas\command xpg.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\shell\open\command xpg.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\.exe\shell xpg.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2364 c69e864715348c2f660dc2ac3c1f224e.exe 2364 c69e864715348c2f660dc2ac3c1f224e.exe 2364 c69e864715348c2f660dc2ac3c1f224e.exe 2364 c69e864715348c2f660dc2ac3c1f224e.exe 2364 c69e864715348c2f660dc2ac3c1f224e.exe 2364 c69e864715348c2f660dc2ac3c1f224e.exe 2364 c69e864715348c2f660dc2ac3c1f224e.exe 2364 c69e864715348c2f660dc2ac3c1f224e.exe 2364 c69e864715348c2f660dc2ac3c1f224e.exe 2636 xpg.exe 2636 xpg.exe 2636 xpg.exe 2636 xpg.exe 2636 xpg.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2600 explorer.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeShutdownPrivilege 2600 explorer.exe Token: SeShutdownPrivilege 2600 explorer.exe Token: SeShutdownPrivilege 2600 explorer.exe Token: SeShutdownPrivilege 2600 explorer.exe Token: SeShutdownPrivilege 2600 explorer.exe Token: SeShutdownPrivilege 2600 explorer.exe Token: SeShutdownPrivilege 2600 explorer.exe Token: SeShutdownPrivilege 2600 explorer.exe Token: SeShutdownPrivilege 2600 explorer.exe Token: SeShutdownPrivilege 2600 explorer.exe Token: SeShutdownPrivilege 2600 explorer.exe Token: SeShutdownPrivilege 2600 explorer.exe Token: SeShutdownPrivilege 2600 explorer.exe Token: SeShutdownPrivilege 2600 explorer.exe Token: SeShutdownPrivilege 2600 explorer.exe Token: SeShutdownPrivilege 2600 explorer.exe Token: SeShutdownPrivilege 2600 explorer.exe Token: SeShutdownPrivilege 2600 explorer.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2636 xpg.exe 2600 explorer.exe 2600 explorer.exe 2636 xpg.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe -
Suspicious use of SendNotifyMessage 21 IoCs
pid Process 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2600 explorer.exe 2636 xpg.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2636 2364 c69e864715348c2f660dc2ac3c1f224e.exe 28 PID 2364 wrote to memory of 2636 2364 c69e864715348c2f660dc2ac3c1f224e.exe 28 PID 2364 wrote to memory of 2636 2364 c69e864715348c2f660dc2ac3c1f224e.exe 28 PID 2364 wrote to memory of 2636 2364 c69e864715348c2f660dc2ac3c1f224e.exe 28 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c69e864715348c2f660dc2ac3c1f224e.exe"C:\Users\Admin\AppData\Local\Temp\c69e864715348c2f660dc2ac3c1f224e.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\xpg.exe"C:\Users\Admin\AppData\Local\xpg.exe" -gav C:\Users\Admin\AppData\Local\Temp\c69e864715348c2f660dc2ac3c1f224e.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2636
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Modifies Installed Components in the registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2600
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD55a5439bde175c6f3621b2d09589f6c7b
SHA1c789c642c252c04c6e0ebb711fe27620d73fffe2
SHA2563c52f9649d2ac6e85c6b918a9bc214237250c5d3dcace87adbf3b5a610475295
SHA512b1885ec5c849d69d0ca4321f9de1c47f7ffb6eb756dc26e7be8bc0a65a3bd151bbe2b7c12817cdc814a2cea1f9c3e4928a64376fb41f5d9bda543897e085b634