Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
178s -
max time network
180s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
09/05/2024, 14:56
Static task
static1
Behavioral task
behavioral1
Sample
Client.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Client.exe
Resource
win10v2004-20240508-en
Errors
General
-
Target
Client.exe
-
Size
810KB
-
MD5
7416c42376748e343b61dbc60060cb16
-
SHA1
9201b783cfb62f0cd0339dac282ad20d8ab80abb
-
SHA256
00950af31769cedb6810c25600d5dd9f63aada87f865c639bf8dd3e4e44c36e0
-
SHA512
7c5f0ecb6839519de481e9614dfa59e2b2bc625947697f3dca17be670d428419d6f64ff15db2a36d1663c092e01a5a2950a24fc3761622b713486c3e0bb11592
-
SSDEEP
12288:kRZses+4ck4ppR4LrG3O4rx67/GkTS8O6:UNp4cZKrGtkT
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\System32\\userinit.exe,C:\\Windows\\Sub\\Client.exe" Client.exe -
Disables Task Manager via registry modification
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 1 pastebin.com 2 pastebin.com 3 2.tcp.eu.ngrok.io 21 2.tcp.eu.ngrok.io 26 2.tcp.eu.ngrok.io -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 icanhazip.com -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Sub\Client.exe Client.exe File opened for modification C:\Windows\Sub\Client.exe Client.exe File opened for modification C:\Windows\Sub Client.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe 1416 Client.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1416 Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2968 LogonUI.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1416
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:4680
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x0 /state0:0xa3aec055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2968
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
546B
MD59836c433b0157a880e33ac5f2d4dabcd
SHA13ef9605bd8e7c0720b0a66a60ddb2adc4fb3d1cc
SHA2563603c03d655c6f25f971e01c04869c52eb2502dbc654e247aae97eb1ac47181c
SHA51259d8423a9ec6cd49aa8ae505712839bce17a5fe4ab02ee995cc036e4e58436aa98eb86b3b0125671154b3a56a18bacff8cb5218b63ff0d03843afb430a595f12