Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
103s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
25/04/2024, 20:33
Static task
static1
Behavioral task
behavioral1
Sample
WinXP.Horror.Destructive.exe
Resource
win7-20240215-en
General
-
Target
WinXP.Horror.Destructive.exe
-
Size
57.9MB
-
MD5
063ea883f8c67d3bb22e0a465136ca4c
-
SHA1
3a168a9153ee32b86d9a5411b0af13846c55ee1d
-
SHA256
3b64ce283febf3207dd20c99fc53de65b07044231eb544c4c41de374a2571c5c
-
SHA512
2dd6be23a5af8c458b94eeb5a4e83fc8cacb3fd2c2566b5682eee286c01726dca90db3d9b4e218eeded9b0c9bce8ba3c9ca9cc497e3a57aab580633a038e4b74
-
SSDEEP
1572864:aj6L5PLk/mBCSyKOYl39GFoFEujFMm+B997DaNHN1oS72fnD9hRzZ01tO0DpvrvI:i6cSzV9GCFEujFMm+B997DaNHN1oS72X
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "0" WinXP.Horror.Destructive.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" WinXP.Horror.Destructive.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" WinXP.Horror.Destructive.exe -
Disables Task Manager via registry modification
-
description ioc Process Delete value \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WinXP.Horror.Destructive.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" WinXP.Horror.Destructive.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 WinXP.Horror.Destructive.exe -
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Control Panel\Mouse WinXP.Horror.Destructive.exe Set value (str) \REGISTRY\USER\S-1-5-21-2248906074-2862704502-246302768-1000\Control Panel\Mouse\SwapMouseButtons = "1" WinXP.Horror.Destructive.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe 2108 WinXP.Horror.Destructive.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2108 WinXP.Horror.Destructive.exe -
System policy modification 1 TTPs 5 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\HideFastUserSwitching = "1" WinXP.Horror.Destructive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System WinXP.Horror.Destructive.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" WinXP.Horror.Destructive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer WinXP.Horror.Destructive.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoDesktop = "1" WinXP.Horror.Destructive.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\WinXP.Horror.Destructive.exe"C:\Users\Admin\AppData\Local\Temp\WinXP.Horror.Destructive.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Disables RegEdit via registry modification
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2108
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:1800
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1