Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 08:40
Behavioral task
behavioral1
Sample
90dc3432e1fb36a086533848abc9ce80N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
90dc3432e1fb36a086533848abc9ce80N.exe
Resource
win10v2004-20240709-en
General
-
Target
90dc3432e1fb36a086533848abc9ce80N.exe
-
Size
777KB
-
MD5
90dc3432e1fb36a086533848abc9ce80
-
SHA1
0a8232349b17b241d06793140fbcfa85eff3d7d7
-
SHA256
b307fa39c5f1c15edbd64bf3f6b2c6f7022aca1f571f32592bed8adbe80d8ffa
-
SHA512
696c0b6f9961f488480e0516a49ee0a531f3df623a118316041716fb6872b5b67d4d80b433a734cc0f6806a0a5ba477641c0cd403c4684b169526cef825dd661
-
SSDEEP
12288:7tKe6Zv23YLVFhBsC8iFHSs7xPY1f6HriPwU8yMKhEQVYs6wqdkY:v6Zv2ivhBVnFys7xP86LkJMlQVYQun
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{39230E7-8B9A-11D5-EBA1-F78EEEEEE983} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{39230E7-8B9A-11D5-EBA1-F78EEEEEE983}\StubPath = "msiuc32.exe" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{39230E7-8B9A-11D5-EBA1-F78EEEEEE983} 90dc3432e1fb36a086533848abc9ce80N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{39230E7-8B9A-11D5-EBA1-F78EEEEEE983}\StubPath = "msiuc32.exe" 90dc3432e1fb36a086533848abc9ce80N.exe -
Executes dropped EXE 1 IoCs
pid Process 1032 svchost.exe -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" 90dc3432e1fb36a086533848abc9ce80N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" svchost.exe -
resource yara_rule behavioral1/memory/2064-0-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/files/0x0008000000015e87-5.dat upx behavioral1/memory/2064-14-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/memory/1032-15-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/files/0x0008000000015dab-13.dat upx behavioral1/memory/1032-16-0x0000000000400000-0x0000000000439000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" 90dc3432e1fb36a086533848abc9ce80N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" 90dc3432e1fb36a086533848abc9ce80N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" svchost.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\msiuc32.exe 90dc3432e1fb36a086533848abc9ce80N.exe File opened for modification C:\Windows\SysWOW64\msiuc32.exe 90dc3432e1fb36a086533848abc9ce80N.exe File created C:\Windows\SysWOW64\concp32.exe 90dc3432e1fb36a086533848abc9ce80N.exe File opened for modification C:\Windows\SysWOW64\concp32.exe 90dc3432e1fb36a086533848abc9ce80N.exe File created C:\Windows\SysWOW64\vcl32.exe 90dc3432e1fb36a086533848abc9ce80N.exe File opened for modification C:\Windows\SysWOW64\vcl32.exe 90dc3432e1fb36a086533848abc9ce80N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svchost.exe 90dc3432e1fb36a086533848abc9ce80N.exe File opened for modification C:\Windows\svchost.exe 90dc3432e1fb36a086533848abc9ce80N.exe -
Modifies registry class 12 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{39230E7-8B9A-11D5-EBA1-F78EEEEEE983}\sm = ebb5525fa3bcf9422c8ff945977d6af9 90dc3432e1fb36a086533848abc9ce80N.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{39230E7-8B9A-11D5-EBA1-F78EEEEEE983}\ax = b75b434c589dc54e8119839bacbca73c 90dc3432e1fb36a086533848abc9ce80N.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{39230E7-8B9A-11D5-EBA1-F78EEEEEE983}\u1 = 551d2e0658054ba756fd3798fea5ffca42865cb762a31639dabd7f2cca44e226 svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{39230E7-8B9A-11D5-EBA1-F78EEEEEE983}\v = "165" svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{39230E7-8B9A-11D5-EBA1-F78EEEEEE983}\u0 = 658663d26f8bad325217a06063847056939f558d910ed252e05dd0113550f7fc0f4da82ff73a0681ba604c2d4f23269f svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{39230E7-8B9A-11D5-EBA1-F78EEEEEE983}\u2 = a54a6b702f92fdf2acd57599e2ae1608015dff41aa020117fc9bd8e2dcf4340f3fa61eb55d6f28597df90602703809d4 svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{39230E7-8B9A-11D5-EBA1-F78EEEEEE983} 90dc3432e1fb36a086533848abc9ce80N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{39230E7-8B9A-11D5-EBA1-F78EEEEEE983}\InprocServer32 90dc3432e1fb36a086533848abc9ce80N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" 90dc3432e1fb36a086533848abc9ce80N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{39230E7-8B9A-11D5-EBA1-F78EEEEEE983} svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{39230E7-8B9A-11D5-EBA1-F78EEEEEE983}\InprocServer32 svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2064 90dc3432e1fb36a086533848abc9ce80N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2064 wrote to memory of 1032 2064 90dc3432e1fb36a086533848abc9ce80N.exe 30 PID 2064 wrote to memory of 1032 2064 90dc3432e1fb36a086533848abc9ce80N.exe 30 PID 2064 wrote to memory of 1032 2064 90dc3432e1fb36a086533848abc9ce80N.exe 30 PID 2064 wrote to memory of 1032 2064 90dc3432e1fb36a086533848abc9ce80N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\90dc3432e1fb36a086533848abc9ce80N.exe"C:\Users\Admin\AppData\Local\Temp\90dc3432e1fb36a086533848abc9ce80N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\svchost.exeC:\Windows\svchost.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- Modifies registry class
PID:1032
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
782KB
MD5a0a5f9815c3d68ede988fbcbbe59f737
SHA17cd2d71a42d432904f796315666599c95ddfae34
SHA256937d19d1ee6b2df0c8f1cf0ec4f539b406a9b7c48e021ca83a0cd8e3e7f6b131
SHA5121a01a80c739ea05ef64f017d82bf6f83e9b8edbf8945d7cbfb72b56941b9be12670cad281411079f2050fb2f6ddfa5cd8d98363af209a70de8112a779fbec50b
-
Filesize
782KB
MD54e9610e2ecc3ca2577bbad1e0ba6dd0e
SHA14c91176dc1466b42020ff51f855e05daf83bc3c8
SHA256478de3be1e0fd250deaf872d67afcfaddbb5ed8880a7d2a9fd48b657b04af84c
SHA512aa84fe5dffb8c5ba64b4d72e3f1d8a51d3a7f3a02fa933bfeef0254c85d1525c42293ccd96187f4afac342ee44c6d092b5acdc1f2ea213d6f90490fb36f1521e