Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
124s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/03/2024, 15:01
Static task
static1
Behavioral task
behavioral1
Sample
de49b9addcc48e5c3ccc9c9141435442.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
de49b9addcc48e5c3ccc9c9141435442.exe
Resource
win10v2004-20240226-en
General
-
Target
de49b9addcc48e5c3ccc9c9141435442.exe
-
Size
813KB
-
MD5
de49b9addcc48e5c3ccc9c9141435442
-
SHA1
0862a5a51021a2ae17669367608ba22d62dd6cc1
-
SHA256
1b14147fe3404fe13bb4b845c60ab46b98b0b37b2124dd954503abe9be3c8604
-
SHA512
5d4624ab5eabddef5cfeac472fba68076cca0cc2561932c61d629014ed835a9f836e4fa5fd36f3bd31373ae65d5dc7e1b312154f101c6b4e3eeee6cd26c9ea8a
-
SSDEEP
12288:lmnrwxsroXXhCnNqGgxANeLE1sNs9J5YtN33xRpFhuMRuCH2F4:lMkxsroXXuNRg6EJNr3xRpXwY2F4
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main de49b9addcc48e5c3ccc9c9141435442.exe Key created \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch de49b9addcc48e5c3ccc9c9141435442.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" de49b9addcc48e5c3ccc9c9141435442.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1924 de49b9addcc48e5c3ccc9c9141435442.exe 1924 de49b9addcc48e5c3ccc9c9141435442.exe 1924 de49b9addcc48e5c3ccc9c9141435442.exe 1924 de49b9addcc48e5c3ccc9c9141435442.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1924 de49b9addcc48e5c3ccc9c9141435442.exe Token: SeDebugPrivilege 1924 de49b9addcc48e5c3ccc9c9141435442.exe Token: SeDebugPrivilege 1924 de49b9addcc48e5c3ccc9c9141435442.exe Token: SeDebugPrivilege 1924 de49b9addcc48e5c3ccc9c9141435442.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1924 de49b9addcc48e5c3ccc9c9141435442.exe 1924 de49b9addcc48e5c3ccc9c9141435442.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\de49b9addcc48e5c3ccc9c9141435442.exe"C:\Users\Admin\AppData\Local\Temp\de49b9addcc48e5c3ccc9c9141435442.exe"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63
-
C:\Users\Admin\AppData\Local\Temp\WebInstaller_925C95EA9515466DBC490EC9D6CFE837\WebInstaller_1924.log
Filesize6KB
MD56f846af178bfdd275d034ef0fa2ddffc
SHA15c2f14deabda59417e8a10dec7be521a15a0a07e
SHA256f8af80dbd477917943552d6f8396adadb09f84c0ed9b1ce537fbee722b784c5c
SHA5126c88c39a63fef7493a47420f13e04d1c260b60b65b3cdd2814e8bf3a2989d54c1da4e3937583c9905dd1e240fb85ad2f7c50fc4d6a244ae87cf2d751d1fd896f
-
Filesize
457KB
MD5e09ed04da7c88c2649a84924f25ec442
SHA1926eda1eea5ce401cae785dacf76013c419e615c
SHA2566511aa7386edeaa7c90d8685d0da04d4d5566d0616232fc67ad14d0c9a07db20
SHA512fbc16a2f83ae171a31b369bb7be4dd5718e43a91f6991c9fca6d998684bd40254ffb876c370121b1e126fb5f0c366610d49e0e72d114bdf9e76da89dd47af50a