Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
26/03/2024, 15:43
Static task
static1
Behavioral task
behavioral1
Sample
df859feda2e7af11ce9b81ecb9090691.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
df859feda2e7af11ce9b81ecb9090691.exe
Resource
win10v2004-20240226-en
General
-
Target
df859feda2e7af11ce9b81ecb9090691.exe
-
Size
61KB
-
MD5
df859feda2e7af11ce9b81ecb9090691
-
SHA1
2cca84df83856523c36b8da73e5bac5bd147771d
-
SHA256
60cba11aef72dd5f445f90673fafe42c748f8cce0770ea6dad0c57611986b61c
-
SHA512
01abb312363d01ef4d1336fcc0b33dee8fb22e5610be4fd4e0d8e2b4045785ca7ffc545721d1989394cea13716530d08105734a09d1a1bcfce4be5b110ae986d
-
SSDEEP
1536:pA2yIzeIHTgI0Tv8Q5VnVQ2broOpgpi6FBej:uIzsITQ5VuKrnoFgj
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2652 systems.exe 2544 systems.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft = "C:\\Windows\\systems.exe" df859feda2e7af11ce9b81ecb9090691.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft = "C:\\Windows\\systems.exe" systems.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2036 set thread context of 2088 2036 df859feda2e7af11ce9b81ecb9090691.exe 28 PID 2652 set thread context of 2544 2652 systems.exe 30 -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\systems.exe df859feda2e7af11ce9b81ecb9090691.exe File opened for modification C:\Windows\noruns.reg systems.exe File opened for modification C:\Windows\systems.exe systems.exe File created C:\Windows\systems.exe systems.exe File created C:\Windows\noruns.reg df859feda2e7af11ce9b81ecb9090691.exe File opened for modification C:\Windows\noruns.reg df859feda2e7af11ce9b81ecb9090691.exe File opened for modification C:\Windows\systems.exe df859feda2e7af11ce9b81ecb9090691.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2668 sc.exe 2232 sc.exe 1740 sc.exe 2276 sc.exe 2332 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs .reg file with regedit 1 IoCs
pid Process 2456 regedit.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2088 df859feda2e7af11ce9b81ecb9090691.exe 2088 df859feda2e7af11ce9b81ecb9090691.exe 2544 systems.exe 2544 systems.exe 2544 systems.exe 2544 systems.exe 2544 systems.exe 2544 systems.exe 2544 systems.exe 2544 systems.exe 2544 systems.exe 2544 systems.exe 2544 systems.exe 2544 systems.exe 2544 systems.exe 2544 systems.exe 2544 systems.exe 2544 systems.exe 2544 systems.exe 2544 systems.exe 2544 systems.exe 2544 systems.exe 2544 systems.exe 2544 systems.exe 2544 systems.exe 2544 systems.exe 2544 systems.exe 2544 systems.exe 2544 systems.exe 2544 systems.exe 2544 systems.exe 2544 systems.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2088 2036 df859feda2e7af11ce9b81ecb9090691.exe 28 PID 2036 wrote to memory of 2088 2036 df859feda2e7af11ce9b81ecb9090691.exe 28 PID 2036 wrote to memory of 2088 2036 df859feda2e7af11ce9b81ecb9090691.exe 28 PID 2036 wrote to memory of 2088 2036 df859feda2e7af11ce9b81ecb9090691.exe 28 PID 2036 wrote to memory of 2088 2036 df859feda2e7af11ce9b81ecb9090691.exe 28 PID 2036 wrote to memory of 2088 2036 df859feda2e7af11ce9b81ecb9090691.exe 28 PID 2088 wrote to memory of 2652 2088 df859feda2e7af11ce9b81ecb9090691.exe 29 PID 2088 wrote to memory of 2652 2088 df859feda2e7af11ce9b81ecb9090691.exe 29 PID 2088 wrote to memory of 2652 2088 df859feda2e7af11ce9b81ecb9090691.exe 29 PID 2088 wrote to memory of 2652 2088 df859feda2e7af11ce9b81ecb9090691.exe 29 PID 2652 wrote to memory of 2544 2652 systems.exe 30 PID 2652 wrote to memory of 2544 2652 systems.exe 30 PID 2652 wrote to memory of 2544 2652 systems.exe 30 PID 2652 wrote to memory of 2544 2652 systems.exe 30 PID 2652 wrote to memory of 2544 2652 systems.exe 30 PID 2652 wrote to memory of 2544 2652 systems.exe 30 PID 2544 wrote to memory of 2456 2544 systems.exe 31 PID 2544 wrote to memory of 2456 2544 systems.exe 31 PID 2544 wrote to memory of 2456 2544 systems.exe 31 PID 2544 wrote to memory of 2456 2544 systems.exe 31 PID 2544 wrote to memory of 2504 2544 systems.exe 32 PID 2544 wrote to memory of 2504 2544 systems.exe 32 PID 2544 wrote to memory of 2504 2544 systems.exe 32 PID 2544 wrote to memory of 2504 2544 systems.exe 32 PID 2544 wrote to memory of 2796 2544 systems.exe 34 PID 2544 wrote to memory of 2796 2544 systems.exe 34 PID 2544 wrote to memory of 2796 2544 systems.exe 34 PID 2544 wrote to memory of 2796 2544 systems.exe 34 PID 2544 wrote to memory of 2668 2544 systems.exe 35 PID 2544 wrote to memory of 2668 2544 systems.exe 35 PID 2544 wrote to memory of 2668 2544 systems.exe 35 PID 2544 wrote to memory of 2668 2544 systems.exe 35 PID 2544 wrote to memory of 2972 2544 systems.exe 36 PID 2544 wrote to memory of 2972 2544 systems.exe 36 PID 2544 wrote to memory of 2972 2544 systems.exe 36 PID 2544 wrote to memory of 2972 2544 systems.exe 36 PID 2544 wrote to memory of 2232 2544 systems.exe 37 PID 2544 wrote to memory of 2232 2544 systems.exe 37 PID 2544 wrote to memory of 2232 2544 systems.exe 37 PID 2544 wrote to memory of 2232 2544 systems.exe 37 PID 2544 wrote to memory of 1608 2544 systems.exe 40 PID 2544 wrote to memory of 1608 2544 systems.exe 40 PID 2544 wrote to memory of 1608 2544 systems.exe 40 PID 2544 wrote to memory of 1608 2544 systems.exe 40 PID 2544 wrote to memory of 1740 2544 systems.exe 41 PID 2544 wrote to memory of 1740 2544 systems.exe 41 PID 2544 wrote to memory of 1740 2544 systems.exe 41 PID 2544 wrote to memory of 1740 2544 systems.exe 41 PID 2544 wrote to memory of 2276 2544 systems.exe 42 PID 2544 wrote to memory of 2276 2544 systems.exe 42 PID 2544 wrote to memory of 2276 2544 systems.exe 42 PID 2544 wrote to memory of 2276 2544 systems.exe 42 PID 2544 wrote to memory of 1712 2544 systems.exe 43 PID 2544 wrote to memory of 1712 2544 systems.exe 43 PID 2544 wrote to memory of 1712 2544 systems.exe 43 PID 2544 wrote to memory of 1712 2544 systems.exe 43 PID 2544 wrote to memory of 2332 2544 systems.exe 44 PID 2544 wrote to memory of 2332 2544 systems.exe 44 PID 2544 wrote to memory of 2332 2544 systems.exe 44 PID 2544 wrote to memory of 2332 2544 systems.exe 44 PID 2544 wrote to memory of 1020 2544 systems.exe 46 PID 2544 wrote to memory of 1020 2544 systems.exe 46 PID 2544 wrote to memory of 1020 2544 systems.exe 46 PID 2544 wrote to memory of 1020 2544 systems.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\df859feda2e7af11ce9b81ecb9090691.exe"C:\Users\Admin\AppData\Local\Temp\df859feda2e7af11ce9b81ecb9090691.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\df859feda2e7af11ce9b81ecb9090691.exeC:\Users\Admin\AppData\Local\Temp\df859feda2e7af11ce9b81ecb9090691.exe2⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\systems.exe"C:\Windows\systems.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\systems.exeC:\Windows\systems.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s C:\Windows\noruns.reg5⤵
- Runs .reg file with regedit
PID:2456
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop sharedaccess5⤵PID:2504
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess6⤵PID:1632
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop KVWSC5⤵PID:2796
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop KVWSC6⤵PID:1840
-
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config KVWSC start= disabled5⤵
- Launches sc.exe
PID:2668
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop KVSrvXP5⤵PID:2972
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop KVSrvXP6⤵PID:2280
-
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config KVSrvXP start= disabled5⤵
- Launches sc.exe
PID:2232
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop kavsvc5⤵PID:1608
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop kavsvc6⤵PID:1828
-
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config kavsvc start= disabled5⤵
- Launches sc.exe
PID:1740
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config RsRavMon start= disabled5⤵
- Launches sc.exe
PID:2276
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop RsCCenter5⤵PID:1712
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop RsCCenter6⤵PID:768
-
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config RsCCenter start= disabled5⤵
- Launches sc.exe
PID:2332
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop RsRavMon5⤵PID:1020
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop RsRavMon6⤵PID:1212
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
122B
MD5704f9f14e6c5b902de15f37bbb234bbc
SHA14e7bd14012b5fe1b07b9ed99a00565ed1d86348b
SHA25669c8425b75d3be48f68c1abf33bb9d30688bbd9d28809d92f9dc537393a3d3b4
SHA51202376153d198f415f53aabc67272c6042ee4f2c1048b3c5025200d8946f433669cd48295e1bfcd33d1fc8c24f4e1ff0dfb78e36926ad91a334e02718afa93042
-
Filesize
61KB
MD5df859feda2e7af11ce9b81ecb9090691
SHA12cca84df83856523c36b8da73e5bac5bd147771d
SHA25660cba11aef72dd5f445f90673fafe42c748f8cce0770ea6dad0c57611986b61c
SHA51201abb312363d01ef4d1336fcc0b33dee8fb22e5610be4fd4e0d8e2b4045785ca7ffc545721d1989394cea13716530d08105734a09d1a1bcfce4be5b110ae986d