Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01/06/2024, 01:25
Static task
static1
Behavioral task
behavioral1
Sample
5178fc4896049fc29c0c1d6cca080705263debcaf47077829f0d8c882959de83.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
5178fc4896049fc29c0c1d6cca080705263debcaf47077829f0d8c882959de83.exe
Resource
win10v2004-20240508-en
General
-
Target
5178fc4896049fc29c0c1d6cca080705263debcaf47077829f0d8c882959de83.exe
-
Size
54.0MB
-
MD5
8583a7539b74e8223d479f70c6b2de51
-
SHA1
b0c2427c0899c20b725b85dff1126a696c372857
-
SHA256
5178fc4896049fc29c0c1d6cca080705263debcaf47077829f0d8c882959de83
-
SHA512
2434db81b7356e1ded0b86d80b29fd87449225283f5d59313bb875107548b46d1c2513a92a0392cae0ec5aef01a135fd9c91fe7863df0634b0858bf85f7100dc
-
SSDEEP
98304:xDr5t+zSg6zFhQdQBFgtD75qFb0I+0PqkW:xvzTvQdQsD7sbS
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2432 TASLogin.exe 268 TASLogin.exe -
Loads dropped DLL 1 IoCs
pid Process 2432 TASLogin.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\IFfmsjhgsda = "C:\\Users\\Public\\Documents\\M2M2L5\\TASLogin.exe" TASLogin.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2432 set thread context of 268 2432 TASLogin.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies registry class 39 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 5000310000000000c1582d0b100052425242524100003a0008000400efbec1582d0bc1582d0b2a0000003b920100000005000000000000000000000000000000520042005200420052004100000016000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\hwp_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\hwp_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\.hwp rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 7400310000000000c1582d0b11004d7573696300600008000400efbeee3a851ac1582d0b2a000000820200000000010000000000000000003600000000004d007500730069006300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380030003300000014000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\hwp_auto_file\shell\Read rundll32.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Music" explorer.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\hwp_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 7400310000000000a858f0711100557365727300600008000400efbeee3a851aa858f0712a000000e601000000000100000000000000000036000000000055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 7800310000000000c1582d0b11005075626c69630000620008000400efbeee3a851ac1582d0b2a0000007c0200000000010000000000000000003800000000005000750062006c0069006300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003600000016000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\hwp_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\.hwp\ = "hwp_auto_file" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\hwp_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (int) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\NodeSlot = "1" explorer.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2980 5178fc4896049fc29c0c1d6cca080705263debcaf47077829f0d8c882959de83.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 820 AcroRd32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 268 TASLogin.exe Token: SeShutdownPrivilege 268 TASLogin.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2980 5178fc4896049fc29c0c1d6cca080705263debcaf47077829f0d8c882959de83.exe 2980 5178fc4896049fc29c0c1d6cca080705263debcaf47077829f0d8c882959de83.exe 820 AcroRd32.exe 820 AcroRd32.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2980 wrote to memory of 1208 2980 5178fc4896049fc29c0c1d6cca080705263debcaf47077829f0d8c882959de83.exe 28 PID 2980 wrote to memory of 1208 2980 5178fc4896049fc29c0c1d6cca080705263debcaf47077829f0d8c882959de83.exe 28 PID 2980 wrote to memory of 1208 2980 5178fc4896049fc29c0c1d6cca080705263debcaf47077829f0d8c882959de83.exe 28 PID 2980 wrote to memory of 1208 2980 5178fc4896049fc29c0c1d6cca080705263debcaf47077829f0d8c882959de83.exe 28 PID 2172 wrote to memory of 2208 2172 explorer.exe 32 PID 2172 wrote to memory of 2208 2172 explorer.exe 32 PID 2172 wrote to memory of 2208 2172 explorer.exe 32 PID 2208 wrote to memory of 820 2208 rundll32.exe 33 PID 2208 wrote to memory of 820 2208 rundll32.exe 33 PID 2208 wrote to memory of 820 2208 rundll32.exe 33 PID 2208 wrote to memory of 820 2208 rundll32.exe 33 PID 2172 wrote to memory of 2432 2172 explorer.exe 34 PID 2172 wrote to memory of 2432 2172 explorer.exe 34 PID 2172 wrote to memory of 2432 2172 explorer.exe 34 PID 2172 wrote to memory of 2432 2172 explorer.exe 34 PID 2432 wrote to memory of 268 2432 TASLogin.exe 35 PID 2432 wrote to memory of 268 2432 TASLogin.exe 35 PID 2432 wrote to memory of 268 2432 TASLogin.exe 35 PID 2432 wrote to memory of 268 2432 TASLogin.exe 35 PID 2432 wrote to memory of 268 2432 TASLogin.exe 35 PID 2432 wrote to memory of 268 2432 TASLogin.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\5178fc4896049fc29c0c1d6cca080705263debcaf47077829f0d8c882959de83.exe"C:\Users\Admin\AppData\Local\Temp\5178fc4896049fc29c0c1d6cca080705263debcaf47077829f0d8c882959de83.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\explorer.exeC:\Windows\explorer.exe C:\Users\Public\Music\RBRBRA2⤵PID:1208
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Public\Documents\M2M2L5\lee_yeon_woo.hwp2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Public\Documents\M2M2L5\lee_yeon_woo.hwp"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:820
-
-
-
C:\Users\Public\Documents\M2M2L5\TASLogin.exe"C:\Users\Public\Documents\M2M2L5\TASLogin.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Public\Documents\M2M2L5\TASLogin.exeC:\Users\Public\Documents\M2M2L5\TASLogin.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:268
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5f3ed3b68070c5211b794e743c946c8e9
SHA1b11697ae040ace0081f8666a5c97317c0ec04b80
SHA25693b304ba1a4228a8a5fa43f551f6cd53cfea85bb2cd4d8d7261f918539a21304
SHA51244fdc80e238c5e1dd614cc5c7a99e5ee59cae94328eaba7cc70091b24792cfb8f9d927f0e98ea8ca6cb91b821117ccc2d95039a62980689deff2524a3f646bf0
-
Filesize
567KB
MD5e6a3caccbd9ca82f38a14bd0d4428240
SHA163937051b04582255505261d512a80ab40513b5f
SHA256ca1f26619b4483f4bda6b4d352b58a9c4f30c2e985e62e761b7d6f3440922264
SHA51221fbc87528dbc6b0f4aee165d9b812595ad1d30af434c401f4bc86d8bd6a209da950523cf00e7ae5fb1676350cd299d96e0e7a0255e6ebf53aeb7e51dd5d133e
-
Filesize
317KB
MD5dba8607e46cceda5dd57916a6bd8c7c7
SHA1c99c80cb5d46035b05a7dedb6e7d22946ce2dd94
SHA2568b44645c0bec9179cbb8ffd027395127d81ecc3b3ac5271b29e5221bc88ce10f
SHA51276dedd75107e24dabf30893a720af642e49c513a5a1ec80d5c9cb1baed8c7f29023455cf3aa75a5f7de90b542dec6d13490a03d482755a8d301402e5914dd9af
-
Filesize
130KB
MD5ebe2802b6afa5a08bcd83f8d5202fbc6
SHA17018f7332d98781236c3abc10097dae7dd53bb1f
SHA256c074b60774ca11085dcd7f34772f2979769dd9ae38b0766fa7b829bb68d02a4a
SHA512fb6d29a5889d2335ad348dfb772f2aa0d34caef4d0955c2924ad1bb1207ed24a06555341ad206ff10a035600a4299c0429952d6fc1305aebf2c82054628d6ed3
-
Filesize
131B
MD51723ff9bbf9edecc53680d36b708452d
SHA17c0610ee41074447cb53f610afdf08e9acd794cc
SHA256b77580838ea8e5fe7f81cce3bdef9638fa373e33e76545c6f0bdf73b47db1b12
SHA512c79d588660a08464f1ae43e268e5ad5783326d7f9687640542cee376d057939d01770bf29645e6ce889549a170ba83b5e2a5d47e4000d6fe832c99d9b69fd2f5
-
Filesize
135B
MD5b90ae5927771b170a911f043e4a2f6db
SHA1284a12348b2a37c6e645e12c2528ee4134f1cb70
SHA256f7bad0a6bdb97fbf2d1446475012db818bb65e0b26040628cfed5cdcfbcb571e
SHA5121681be3c030e5d42fdd2857d4121e26df5cf5a8119506849d395dbb0a117708b5518732e47dcc1478742aa247fe46f1c7ffea9f1d0aba3bd67d7600529d11d68
-
Filesize
2.0MB
MD549ca5d6fb817f9af89284dc0be61a1cf
SHA17b3d00869d8fb0266783250046ba0c11cf45ce18
SHA256072eafa9fb2840f6588abe7b6c992d89192609996da4579951de4a0f4afec6c0
SHA512ca1a3fb0f164e74d58ee190ba31a7bc6d8ef50c4ab63ed6f8ebcbd7df339a1de2aa6393eb694e288ab32b32668413331cf86d6ee0e06ecad1a838498bbf4946d