Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 00:52
Static task
static1
Behavioral task
behavioral1
Sample
99318921262d6b3856b953ee7f645045d1cea4003ac4f6668253b51c79d50e36.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
99318921262d6b3856b953ee7f645045d1cea4003ac4f6668253b51c79d50e36.exe
Resource
win10v2004-20240508-en
General
-
Target
99318921262d6b3856b953ee7f645045d1cea4003ac4f6668253b51c79d50e36.exe
-
Size
92KB
-
MD5
aa0309f312fabff45c637ea7b15a6746
-
SHA1
49dceca4afbc66a45168859737c6cef2b7712fa9
-
SHA256
99318921262d6b3856b953ee7f645045d1cea4003ac4f6668253b51c79d50e36
-
SHA512
5a881f85eca17d82345281069a20c52df4493da5ce7c7a6642c3332c173054dbacbc58533dc96053e01aa47316685d7fd17dc3f75691cf842893db2ea04b1283
-
SSDEEP
1536:R7PvnKhWQtC3Izj6TrlDa2z6Ewd0zvPTQw9LBZRQ8V3zhb:hPvKztiIzj6xtDLBZRQ8Vj5
Malware Config
Signatures
-
Detects executables packed with eXPressor 2 IoCs
resource yara_rule behavioral1/files/0x0034000000016122-2.dat INDICATOR_EXE_Packed_eXPressor behavioral1/memory/2044-12-0x0000000013150000-0x0000000013167000-memory.dmp INDICATOR_EXE_Packed_eXPressor -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CFF8FD86-05DB-4990-92A9-0EE5FDFB7BFE}\stubpath = "C:\\Windows\\system32\\WinHelp85.exe" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{CFF8FD86-05DB-4990-92A9-0EE5FDFB7BFE} regedit.exe -
Deletes itself 1 IoCs
pid Process 2724 WinHelp85.exe -
Executes dropped EXE 1 IoCs
pid Process 2724 WinHelp85.exe -
Loads dropped DLL 2 IoCs
pid Process 3040 99318921262d6b3856b953ee7f645045d1cea4003ac4f6668253b51c79d50e36.exe 3040 99318921262d6b3856b953ee7f645045d1cea4003ac4f6668253b51c79d50e36.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\WinHelp85.exe 99318921262d6b3856b953ee7f645045d1cea4003ac4f6668253b51c79d50e36.exe -
Runs .reg file with regedit 1 IoCs
pid Process 2872 regedit.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 2724 WinHelp85.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2872 3040 99318921262d6b3856b953ee7f645045d1cea4003ac4f6668253b51c79d50e36.exe 28 PID 3040 wrote to memory of 2872 3040 99318921262d6b3856b953ee7f645045d1cea4003ac4f6668253b51c79d50e36.exe 28 PID 3040 wrote to memory of 2872 3040 99318921262d6b3856b953ee7f645045d1cea4003ac4f6668253b51c79d50e36.exe 28 PID 3040 wrote to memory of 2872 3040 99318921262d6b3856b953ee7f645045d1cea4003ac4f6668253b51c79d50e36.exe 28 PID 3040 wrote to memory of 2724 3040 99318921262d6b3856b953ee7f645045d1cea4003ac4f6668253b51c79d50e36.exe 29 PID 3040 wrote to memory of 2724 3040 99318921262d6b3856b953ee7f645045d1cea4003ac4f6668253b51c79d50e36.exe 29 PID 3040 wrote to memory of 2724 3040 99318921262d6b3856b953ee7f645045d1cea4003ac4f6668253b51c79d50e36.exe 29 PID 3040 wrote to memory of 2724 3040 99318921262d6b3856b953ee7f645045d1cea4003ac4f6668253b51c79d50e36.exe 29 PID 2724 wrote to memory of 2044 2724 WinHelp85.exe 30 PID 2724 wrote to memory of 2044 2724 WinHelp85.exe 30 PID 2724 wrote to memory of 2044 2724 WinHelp85.exe 30 PID 2724 wrote to memory of 2044 2724 WinHelp85.exe 30 PID 2724 wrote to memory of 2044 2724 WinHelp85.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\99318921262d6b3856b953ee7f645045d1cea4003ac4f6668253b51c79d50e36.exe"C:\Users\Admin\AppData\Local\Temp\99318921262d6b3856b953ee7f645045d1cea4003ac4f6668253b51c79d50e36.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\regedit.exeregedit.exe /s C:\Users\Admin\AppData\Local\Temp\259399585.reg2⤵
- Boot or Logon Autostart Execution: Active Setup
- Runs .reg file with regedit
PID:2872
-
-
C:\Windows\SysWOW64\WinHelp85.exeC:\Windows\system32\WinHelp85.exe kowdgjttgC:\Users\Admin\AppData\Local\Temp\99318921262d6b3856b953ee7f645045d1cea4003ac4f6668253b51c79d50e36.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2044
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384B
MD5ab40dcd38d384995cac67aaa7d988438
SHA19a79887df54e359e6b8ed6de3dae122f0e88ee12
SHA25699d34009a80e74b612ce8e09a910394e905aead8b622365e50c83d690e1439f0
SHA512c68526a36b959df6cb4a3b4f49cd642b7786c202cb063cafff7c9dec0751abd44e00f717d33ec0fdcdc6dc465f657ca66b8546027597557dc1b36e7d9b4cdc5e
-
Filesize
92KB
MD5e4e8c41a704ce64f6cfafd95e46a0131
SHA1ef2524da1f6249e19ffb6a85cf3e87aed360d664
SHA25644f6b54bda1b95b04aefaaaf5b0106e85bc6bfdceed3fc2bf1e4cd3bbc46865f
SHA5125c7f1f48f3dccb7271c63439a6f9195a4d437894eefee4991a3379ef2165cda494e1659de39a7d5fc7c7bed8cac37d807d368445bdd9019623f4fe0750c8d8b9