Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
27s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 07:10
Static task
static1
Behavioral task
behavioral1
Sample
a4823e7373d249fa9e1863519811f150N.dll
Resource
win7-20240704-en
General
-
Target
a4823e7373d249fa9e1863519811f150N.dll
-
Size
120KB
-
MD5
a4823e7373d249fa9e1863519811f150
-
SHA1
2a9642310f6e005d01bf7f8ca292df39d780f8ea
-
SHA256
1a30cddaee9769a65035e903875cd3a027bb51fbc5966d84caa58ad34cc74847
-
SHA512
7fc345ee0db83deb244d5b824f6c6705ed190d9ca3dc7722175e9aa05264b34bef446e38f1ecc712432b7570eb36fc0cc14b858103af1970fb88a575e1ef84c1
-
SSDEEP
3072:VkhWKfycRn3i0+x70hWCuVl/+ckztD7cosp:xKfjRnSp70wmRztD7s
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f7723b6.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f7723b6.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f7721a4.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f7721a4.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f7721a4.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f7723b6.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7721a4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7723b6.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f7721a4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f7721a4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f7721a4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f7723b6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f7723b6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f7721a4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f7721a4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f7721a4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f7723b6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f7723b6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f7723b6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f7723b6.exe -
Executes dropped EXE 3 IoCs
pid Process 3036 f7721a4.exe 2764 f7723b6.exe 2544 f773c84.exe -
Loads dropped DLL 6 IoCs
pid Process 2964 rundll32.exe 2964 rundll32.exe 2964 rundll32.exe 2964 rundll32.exe 2964 rundll32.exe 2964 rundll32.exe -
resource yara_rule behavioral1/memory/3036-12-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/3036-40-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/3036-18-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/3036-15-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/3036-39-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/3036-38-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/3036-19-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/3036-17-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/3036-16-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/3036-14-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/3036-41-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/3036-62-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/3036-63-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/3036-64-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/3036-66-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/3036-65-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/3036-68-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/3036-82-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/3036-84-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/3036-86-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/3036-87-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/3036-151-0x0000000000650000-0x000000000170A000-memory.dmp upx behavioral1/memory/2764-166-0x0000000000920000-0x00000000019DA000-memory.dmp upx behavioral1/memory/2764-171-0x0000000000920000-0x00000000019DA000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f7723b6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f7723b6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f7723b6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f7723b6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f7721a4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f7723b6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f7721a4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f7721a4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f7721a4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f7721a4.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f7721a4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f7723b6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f7723b6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f7721a4.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7723b6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7721a4.exe -
Enumerates connected drives 3 TTPs 14 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: f7721a4.exe File opened (read-only) \??\H: f7721a4.exe File opened (read-only) \??\Q: f7721a4.exe File opened (read-only) \??\G: f7721a4.exe File opened (read-only) \??\L: f7721a4.exe File opened (read-only) \??\P: f7721a4.exe File opened (read-only) \??\S: f7721a4.exe File opened (read-only) \??\J: f7721a4.exe File opened (read-only) \??\K: f7721a4.exe File opened (read-only) \??\M: f7721a4.exe File opened (read-only) \??\N: f7721a4.exe File opened (read-only) \??\R: f7721a4.exe File opened (read-only) \??\I: f7721a4.exe File opened (read-only) \??\O: f7721a4.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\f77226f f7721a4.exe File opened for modification C:\Windows\SYSTEM.INI f7721a4.exe File created C:\Windows\f777291 f7723b6.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3036 f7721a4.exe 3036 f7721a4.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 3036 f7721a4.exe Token: SeDebugPrivilege 3036 f7721a4.exe Token: SeDebugPrivilege 3036 f7721a4.exe Token: SeDebugPrivilege 3036 f7721a4.exe Token: SeDebugPrivilege 3036 f7721a4.exe Token: SeDebugPrivilege 3036 f7721a4.exe Token: SeDebugPrivilege 3036 f7721a4.exe Token: SeDebugPrivilege 3036 f7721a4.exe Token: SeDebugPrivilege 3036 f7721a4.exe Token: SeDebugPrivilege 3036 f7721a4.exe Token: SeDebugPrivilege 3036 f7721a4.exe Token: SeDebugPrivilege 3036 f7721a4.exe Token: SeDebugPrivilege 3036 f7721a4.exe Token: SeDebugPrivilege 3036 f7721a4.exe Token: SeDebugPrivilege 3036 f7721a4.exe Token: SeDebugPrivilege 3036 f7721a4.exe Token: SeDebugPrivilege 3036 f7721a4.exe Token: SeDebugPrivilege 3036 f7721a4.exe Token: SeDebugPrivilege 3036 f7721a4.exe Token: SeDebugPrivilege 3036 f7721a4.exe Token: SeDebugPrivilege 3036 f7721a4.exe Token: SeDebugPrivilege 3036 f7721a4.exe Token: SeDebugPrivilege 3036 f7721a4.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2964 2256 rundll32.exe 30 PID 2256 wrote to memory of 2964 2256 rundll32.exe 30 PID 2256 wrote to memory of 2964 2256 rundll32.exe 30 PID 2256 wrote to memory of 2964 2256 rundll32.exe 30 PID 2256 wrote to memory of 2964 2256 rundll32.exe 30 PID 2256 wrote to memory of 2964 2256 rundll32.exe 30 PID 2256 wrote to memory of 2964 2256 rundll32.exe 30 PID 2964 wrote to memory of 3036 2964 rundll32.exe 31 PID 2964 wrote to memory of 3036 2964 rundll32.exe 31 PID 2964 wrote to memory of 3036 2964 rundll32.exe 31 PID 2964 wrote to memory of 3036 2964 rundll32.exe 31 PID 3036 wrote to memory of 1096 3036 f7721a4.exe 19 PID 3036 wrote to memory of 1160 3036 f7721a4.exe 20 PID 3036 wrote to memory of 1196 3036 f7721a4.exe 21 PID 3036 wrote to memory of 1268 3036 f7721a4.exe 23 PID 3036 wrote to memory of 2256 3036 f7721a4.exe 29 PID 3036 wrote to memory of 2964 3036 f7721a4.exe 30 PID 3036 wrote to memory of 2964 3036 f7721a4.exe 30 PID 2964 wrote to memory of 2764 2964 rundll32.exe 32 PID 2964 wrote to memory of 2764 2964 rundll32.exe 32 PID 2964 wrote to memory of 2764 2964 rundll32.exe 32 PID 2964 wrote to memory of 2764 2964 rundll32.exe 32 PID 2964 wrote to memory of 2544 2964 rundll32.exe 33 PID 2964 wrote to memory of 2544 2964 rundll32.exe 33 PID 2964 wrote to memory of 2544 2964 rundll32.exe 33 PID 2964 wrote to memory of 2544 2964 rundll32.exe 33 PID 3036 wrote to memory of 1096 3036 f7721a4.exe 19 PID 3036 wrote to memory of 1160 3036 f7721a4.exe 20 PID 3036 wrote to memory of 1196 3036 f7721a4.exe 21 PID 3036 wrote to memory of 1268 3036 f7721a4.exe 23 PID 3036 wrote to memory of 2764 3036 f7721a4.exe 32 PID 3036 wrote to memory of 2764 3036 f7721a4.exe 32 PID 3036 wrote to memory of 2544 3036 f7721a4.exe 33 PID 3036 wrote to memory of 2544 3036 f7721a4.exe 33 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7721a4.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f7723b6.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1096
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1160
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a4823e7373d249fa9e1863519811f150N.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a4823e7373d249fa9e1863519811f150N.dll,#13⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\f7721a4.exeC:\Users\Admin\AppData\Local\Temp\f7721a4.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3036
-
-
C:\Users\Admin\AppData\Local\Temp\f7723b6.exeC:\Users\Admin\AppData\Local\Temp\f7723b6.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System policy modification
PID:2764
-
-
C:\Users\Admin\AppData\Local\Temp\f773c84.exeC:\Users\Admin\AppData\Local\Temp\f773c84.exe4⤵
- Executes dropped EXE
PID:2544
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1268
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257B
MD59c258f21cffc250f6e3f70f28b13a483
SHA1e63b95d8a578dc3da66d06226c97b91b0b645392
SHA25662630ef7f3dd39491da99d9cf249f88a1397aafaa521e8202e6464500acd802e
SHA512a500c1e56cb08ce0974758862094cc3285a64d1ff31aa7e80509f756478d189fc883a1cd82ff3dce494675bd7b8eb13b54afb8b37d53904c24b9e1fb09d9a586
-
Filesize
97KB
MD57b1f7f5b5757aa303f7b4696e78f799f
SHA1d4e83829c4773aaf3b442fcb70179dfc87bad040
SHA25668a8081558b51cecfd7f6166f454ad4c071956c1ba1a83b1bea17bbbe58a6cee
SHA512a8b3c58fb49a506b36a72b39c9cd548d62ac777d701494a69f9c0fd0b3ba9758fbcf20a3dc8b531f3ca0bd6976ca62c1bf4f480d5740dcf0eb8935ebf243a362