Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 08:42
Static task
static1
Behavioral task
behavioral1
Sample
c83006e7ae807153f6fc0f13f4550a3a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c83006e7ae807153f6fc0f13f4550a3a.exe
Resource
win10v2004-20240226-en
General
-
Target
c83006e7ae807153f6fc0f13f4550a3a.exe
-
Size
761KB
-
MD5
c83006e7ae807153f6fc0f13f4550a3a
-
SHA1
66e36a66084c4727b58503fe92a1512bc04c33c8
-
SHA256
f16d44151db20fb23e0f282931fa937f485e7f0725716238c631a583169c7ff8
-
SHA512
9fa5df46a1f4b71948d8e25a35fdfc41f6850e93c5b7ac03024bdd426cb138cfc325bca1048644c4ea50a7b184b2fb839aa2f49cabaaee2618e2e4b012818aea
-
SSDEEP
12288:18IdtzeU0qKiWKQ0zu8zdpDOPReZs8W8R66WZF3Z4mxxbARuxuYT6Vxxa1/:18Idtz77KiWB0KU5OpeK8K6WZQmXbpFT
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2628 WINDOW~1.EXE 2612 winxp -
Loads dropped DLL 2 IoCs
pid Process 1964 c83006e7ae807153f6fc0f13f4550a3a.exe 1964 c83006e7ae807153f6fc0f13f4550a3a.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c83006e7ae807153f6fc0f13f4550a3a.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat winxp -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\winxp WINDOW~1.EXE File created C:\Windows\Delete.bat WINDOW~1.EXE File created C:\Windows\winxp WINDOW~1.EXE -
Modifies data under HKEY_USERS 37 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\System\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick\Winmm winxp Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties winxp Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CA94FFC9-7328-4C87-9E94-9778EEAD1F81}\8a-b6-eb-6d-e6-d2 winxp Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" winxp Key created \REGISTRY\USER\.DEFAULT\System winxp Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections winxp Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 winxp Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" winxp Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-b6-eb-6d-e6-d2\WpadDetectedUrl winxp Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0027000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 winxp Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CA94FFC9-7328-4C87-9E94-9778EEAD1F81}\WpadDecisionReason = "1" winxp Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CA94FFC9-7328-4C87-9E94-9778EEAD1F81}\WpadDecision = "0" winxp Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-b6-eb-6d-e6-d2\WpadDecision = "0" winxp Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CA94FFC9-7328-4C87-9E94-9778EEAD1F81}\WpadDecisionTime = c027ffcbeb75da01 winxp Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick\Winmm winxp Set value (int) \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick\Winmm\wheel = "1" winxp Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings winxp Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CA94FFC9-7328-4C87-9E94-9778EEAD1F81}\WpadDecisionTime = c09372a1eb75da01 winxp Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CA94FFC9-7328-4C87-9E94-9778EEAD1F81}\WpadNetworkName = "Network 2" winxp Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-b6-eb-6d-e6-d2\WpadDecisionReason = "1" winxp Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0027000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 winxp Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties\Joystick winxp Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" winxp Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ winxp Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CA94FFC9-7328-4C87-9E94-9778EEAD1F81} winxp Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" winxp Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" winxp Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-b6-eb-6d-e6-d2 winxp Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet winxp Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control winxp Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings winxp Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 winxp Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad winxp Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-b6-eb-6d-e6-d2\WpadDecisionTime = c027ffcbeb75da01 winxp Key created \REGISTRY\USER\.DEFAULT\SYSTEM\CurrentControlSet\Control\MediaProperties\PrivateProperties winxp Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\8a-b6-eb-6d-e6-d2\WpadDecisionTime = c09372a1eb75da01 winxp Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix winxp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2612 winxp -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2628 1964 c83006e7ae807153f6fc0f13f4550a3a.exe 28 PID 1964 wrote to memory of 2628 1964 c83006e7ae807153f6fc0f13f4550a3a.exe 28 PID 1964 wrote to memory of 2628 1964 c83006e7ae807153f6fc0f13f4550a3a.exe 28 PID 1964 wrote to memory of 2628 1964 c83006e7ae807153f6fc0f13f4550a3a.exe 28 PID 2628 wrote to memory of 2436 2628 WINDOW~1.EXE 30 PID 2628 wrote to memory of 2436 2628 WINDOW~1.EXE 30 PID 2628 wrote to memory of 2436 2628 WINDOW~1.EXE 30 PID 2628 wrote to memory of 2436 2628 WINDOW~1.EXE 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c83006e7ae807153f6fc0f13f4550a3a.exe"C:\Users\Admin\AppData\Local\Temp\c83006e7ae807153f6fc0f13f4550a3a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WINDOW~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\WINDOW~1.EXE2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\Delete.bat3⤵PID:2436
-
-
-
C:\Windows\winxpC:\Windows\winxp1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
PID:2612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD571fd399aa754775b9bbb7ab2936cee3b
SHA1270bdadeec70be60efa5dcd0ef84a54bf9b8f29f
SHA25680d1edb991279fd8567faff0c420320ce04c74a359af20823045057a52e14612
SHA512bd97285e5d17b668af879212e25d020a607156b415a767111d1d56353ab2c91b733b9d5af39061e75a586b0785db58190b82c45409e24e11c4d5d998d0bdbeea
-
Filesize
64KB
MD56d2ac884b3824652ac187998f8ca4df7
SHA1701a2ab393a8ad1e0c5c4fc505b01c6d59665601
SHA256497180d89caa11b99fceb03e4b37fa9d16eb86fc80ae26fbb6a638107ceb582c
SHA512ee571c920c90ba488d2b4de2500adee1f5891205cd9aa5abe4feb95a98ea587cccb83f0089549baffdda4b64aa070f0f902b056476a086186d7e798685646dba
-
Filesize
160B
MD5a36877fec4fde35c6b0927285e6d751b
SHA11122da3f21167b4bcaf3866408e06e35d85cca07
SHA256a925132d0062d8b3bd95071e438a82ce0dcb70950cfa56f17a873f99cf6c4618
SHA5122d734ef1843597ecfc2992d1ad822c2374476ee310eee68e73f27f80abe393014a57acc112ad9479f471e4f5919b176b541261d4a46b61931b1308ba51b69758
-
Filesize
398KB
MD5f557305e284e3f0008b5556ed0aea4f4
SHA1304af015334bc75d17fd5b81d8788cff929ead6c
SHA2566629b16df99db497d6dc5f08e382e53fecebd6a022ae7e4ba2b0745d7f211f18
SHA512bcb87fe4fdc5f8dc27a5999087b6139ac09a5e355b573372832521d2b8960d20c372d77c67774452625eb473f3650275bea2523795b8dec2d1a027c200d549cb
-
Filesize
155KB
MD52b2242729835aa9314f65ef230c064aa
SHA196ea8147b59b424bdee4afb42452fb31d9af070c
SHA256a48c8b89bdd40200d5fb1ca382a5743062debcbf276f3d93ab5b262bbe27bf09
SHA512653bceba3666440c7492ba59de6a1544330986397412134c2dd35ac78e0952347585a5dd8f77cb45bbf74613c03e6c730ce3711b362d74eed524e94cff4a9bef