Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 01:39 UTC
Behavioral task
behavioral1
Sample
7b9d16e07d6d96e64e674b0a46c94580N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7b9d16e07d6d96e64e674b0a46c94580N.exe
Resource
win10v2004-20240709-en
General
-
Target
7b9d16e07d6d96e64e674b0a46c94580N.exe
-
Size
656KB
-
MD5
7b9d16e07d6d96e64e674b0a46c94580
-
SHA1
f0421b0c13dd924b6743944e400acd3c0044f7d5
-
SHA256
3fc99ab4ae6cd0e09ae7b63eaf34221d4464ff9eccbaa42f0eda00a3031d4bc0
-
SHA512
0a188f13c631aa9783f33e7061d89af3fd59c85618611c4a0e321861bf6e6dcf17fb9963fd1d0b1575eb880ccebe7668818ca5eefd295b8325084c4c9f5c25bb
-
SSDEEP
12288:7tKe6Zv23YLVFhBsC8iFHSs7xPY1f6HriPwU8mNCZQUEdsaj1k2CC9md:v6Zv2ivhBVnFys7xP86LkRCQsau2Y
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AE8E334C-8B9A-11D5-EBA1-F78EEEEEE983}\StubPath = "msvan32.exe" 7b9d16e07d6d96e64e674b0a46c94580N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AE8E334C-8B9A-11D5-EBA1-F78EEEEEE983} spoolsv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AE8E334C-8B9A-11D5-EBA1-F78EEEEEE983}\StubPath = "msvan32.exe" spoolsv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{AE8E334C-8B9A-11D5-EBA1-F78EEEEEE983} 7b9d16e07d6d96e64e674b0a46c94580N.exe -
Executes dropped EXE 1 IoCs
pid Process 1620 spoolsv.exe -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" spoolsv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" 7b9d16e07d6d96e64e674b0a46c94580N.exe -
resource yara_rule behavioral1/memory/1620-15-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/files/0x0004000000004ed7-13.dat upx behavioral1/memory/1888-14-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/files/0x000600000001924b-5.dat upx behavioral1/memory/1888-0-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/memory/1620-16-0x0000000000400000-0x0000000000439000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" 7b9d16e07d6d96e64e674b0a46c94580N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" 7b9d16e07d6d96e64e674b0a46c94580N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" spoolsv.exe Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" spoolsv.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\vcl32.exe 7b9d16e07d6d96e64e674b0a46c94580N.exe File opened for modification C:\Windows\SysWOW64\vcl32.exe 7b9d16e07d6d96e64e674b0a46c94580N.exe File created C:\Windows\SysWOW64\msvan32.exe 7b9d16e07d6d96e64e674b0a46c94580N.exe File opened for modification C:\Windows\SysWOW64\msvan32.exe 7b9d16e07d6d96e64e674b0a46c94580N.exe File created C:\Windows\SysWOW64\concp32.exe 7b9d16e07d6d96e64e674b0a46c94580N.exe File opened for modification C:\Windows\SysWOW64\concp32.exe 7b9d16e07d6d96e64e674b0a46c94580N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\spoolsv.exe 7b9d16e07d6d96e64e674b0a46c94580N.exe File opened for modification C:\Windows\spoolsv.exe 7b9d16e07d6d96e64e674b0a46c94580N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7b9d16e07d6d96e64e674b0a46c94580N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Modifies registry class 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" spoolsv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" 7b9d16e07d6d96e64e674b0a46c94580N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AE8E334C-8B9A-11D5-EBA1-F78EEEEEE983}\InprocServer32 spoolsv.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AE8E334C-8B9A-11D5-EBA1-F78EEEEEE983}\u0 = 658663d26f8bad325217a06063847056939f558d910ed252e05dd0113550f7fc0f4da82ff73a0681ba604c2d4f23269f spoolsv.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AE8E334C-8B9A-11D5-EBA1-F78EEEEEE983}\u1 = 551d2e0658054ba756fd3798fea5ffca42865cb762a31639dabd7f2cca44e226 spoolsv.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AE8E334C-8B9A-11D5-EBA1-F78EEEEEE983}\u2 = a54a6b702f92fdf2acd57599e2ae1608015dff41aa020117fc9bd8e2dcf4340f3fa61eb55d6f28597df90602703809d4 spoolsv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AE8E334C-8B9A-11D5-EBA1-F78EEEEEE983}\v = "165" spoolsv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AE8E334C-8B9A-11D5-EBA1-F78EEEEEE983} 7b9d16e07d6d96e64e674b0a46c94580N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AE8E334C-8B9A-11D5-EBA1-F78EEEEEE983}\InprocServer32 7b9d16e07d6d96e64e674b0a46c94580N.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AE8E334C-8B9A-11D5-EBA1-F78EEEEEE983}\sm = 01b8ec350471bd332433eee476ebe1f3 7b9d16e07d6d96e64e674b0a46c94580N.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AE8E334C-8B9A-11D5-EBA1-F78EEEEEE983}\ax = 50d981392ebe05578fd659b1c414851f 7b9d16e07d6d96e64e674b0a46c94580N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AE8E334C-8B9A-11D5-EBA1-F78EEEEEE983} spoolsv.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1888 7b9d16e07d6d96e64e674b0a46c94580N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1888 wrote to memory of 1620 1888 7b9d16e07d6d96e64e674b0a46c94580N.exe 31 PID 1888 wrote to memory of 1620 1888 7b9d16e07d6d96e64e674b0a46c94580N.exe 31 PID 1888 wrote to memory of 1620 1888 7b9d16e07d6d96e64e674b0a46c94580N.exe 31 PID 1888 wrote to memory of 1620 1888 7b9d16e07d6d96e64e674b0a46c94580N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b9d16e07d6d96e64e674b0a46c94580N.exe"C:\Users\Admin\AppData\Local\Temp\7b9d16e07d6d96e64e674b0a46c94580N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\spoolsv.exeC:\Windows\spoolsv.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1620
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
658KB
MD5b2eebf773c0473579ec141e78f5681cf
SHA1fb6664e9fc3c9c76c7c67c39673ae6b1d2643d27
SHA256157d94b2f3d0934d80c181596f5f890087a420bb0095bfee542277055764e36f
SHA512616e1ddf5ab0c47d126b1f392fe20e0fa875ae7a6a59670ae456ef1db12df46d15632f6fea0ce887cc6ca7ffb8c2c185ff06ddaa0ad6e1cd4237a8357f863bce
-
Filesize
660KB
MD5effe14e6424e7839a121eefb0e522030
SHA1b8880ba51bddba5740583968a3865c81007b6146
SHA2567e167eaccaff8b5979257461792511d40897c5a814d865eaa8caf2d5d32565db
SHA512bad6e0a5970c49edfad11fa65e18f38bac23af2377553db5ffcc556a8beaa20bb6f7fa1d3615d4b2eaa2f5e68740b49427158f87637138b90c066fd28ca51cb2