Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 02:38
Static task
static1
Behavioral task
behavioral1
Sample
SEBarClt.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
SEBarClt.exe
Resource
win10v2004-20240426-en
General
-
Target
SEBarClt.exe
-
Size
795KB
-
MD5
5dfbaf5dbeb8f33c936de5493dd6a7b9
-
SHA1
aae268ee625544c42e5834a822ba82683dcbabeb
-
SHA256
5487495896ff389b9c0d950e1d158678cd028fb231517a02c1db918a7e172c1d
-
SHA512
2876a24573b452ba6fca8dd2c1782759f3e80d5182185ca8fa6d392cb90eb1f56d97116aec8a12a21490952cc71f5a7373105996426d234c1c16959e760ccbc6
-
SSDEEP
24576:w3qnzFNKEgNumi2S/JOc/cwKy1gmk4QqCs:w3fchUucwKyu/hs
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2228 Explorer.exe -
Loads dropped DLL 2 IoCs
pid Process 2896 SEBarClt.exe 2896 SEBarClt.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: Explorer.exe File opened (read-only) \??\S: Explorer.exe File opened (read-only) \??\U: Explorer.exe File opened (read-only) \??\R: Explorer.exe File opened (read-only) \??\A: Explorer.exe File opened (read-only) \??\E: Explorer.exe File opened (read-only) \??\H: Explorer.exe File opened (read-only) \??\J: Explorer.exe File opened (read-only) \??\K: Explorer.exe File opened (read-only) \??\O: Explorer.exe File opened (read-only) \??\Q: Explorer.exe File opened (read-only) \??\W: Explorer.exe File opened (read-only) \??\Y: Explorer.exe File opened (read-only) \??\B: Explorer.exe File opened (read-only) \??\G: Explorer.exe File opened (read-only) \??\I: Explorer.exe File opened (read-only) \??\M: Explorer.exe File opened (read-only) \??\P: Explorer.exe File opened (read-only) \??\X: Explorer.exe File opened (read-only) \??\Z: Explorer.exe File opened (read-only) \??\L: Explorer.exe File opened (read-only) \??\T: Explorer.exe File opened (read-only) \??\V: Explorer.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\BootSys.log Explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor Explorer.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor Explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2228 Explorer.exe Token: SeIncBasePriorityPrivilege 2228 Explorer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2228 Explorer.exe 2228 Explorer.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2228 Explorer.exe 2228 Explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2228 Explorer.exe 2228 Explorer.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2896 wrote to memory of 2228 2896 SEBarClt.exe 28 PID 2896 wrote to memory of 2228 2896 SEBarClt.exe 28 PID 2896 wrote to memory of 2228 2896 SEBarClt.exe 28 PID 2896 wrote to memory of 2228 2896 SEBarClt.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\SEBarClt.exe"C:\Users\Admin\AppData\Local\Temp\SEBarClt.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\Explorer.exe"C:\Users\Admin\AppData\Local\Temp\Explorer.exe" "C:\Users\Admin\AppData\Local\Temp\SEBarClt.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Windows directory
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
795KB
MD55dfbaf5dbeb8f33c936de5493dd6a7b9
SHA1aae268ee625544c42e5834a822ba82683dcbabeb
SHA2565487495896ff389b9c0d950e1d158678cd028fb231517a02c1db918a7e172c1d
SHA5122876a24573b452ba6fca8dd2c1782759f3e80d5182185ca8fa6d392cb90eb1f56d97116aec8a12a21490952cc71f5a7373105996426d234c1c16959e760ccbc6