Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    111s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    27/07/2024, 10:42

General

  • Target

    b86806f049f767e729081754e9c66f40N.exe

  • Size

    91KB

  • MD5

    b86806f049f767e729081754e9c66f40

  • SHA1

    74ccd2b455ec4ab92ec4779e3de7ee34308b35ed

  • SHA256

    81c0eba8044668a9ec0bfd99c5085f9244dbf323475cf532a97dd10a7d6e2326

  • SHA512

    0dbb813399cbf74453374cbef4b2501fb410958d8bcb6937d6818ce6e56033502c161a4696b182096d17b83f8af0816153eef13f062f1fcbe93aebee522d5195

  • SSDEEP

    1536:FAwEmBGz1lNNqDaG0PoxhlzmOAwEmBGz1lNNqDaG0Poxhlzm/:FGmUXNQDaG0A8OGmUXNQDaG0A8/

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 11 IoCs
  • Loads dropped DLL 18 IoCs
  • Modifies system executable filetype association 2 TTPs 13 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops desktop.ini file(s) 4 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 20 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b86806f049f767e729081754e9c66f40N.exe
    "C:\Users\Admin\AppData\Local\Temp\b86806f049f767e729081754e9c66f40N.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops desktop.ini file(s)
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1720
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1160
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2352
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2892
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1860
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2220
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2036
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2500
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1036
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:532
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:1344
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:540
  • C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\OUTLOOK.EXE" -Embedding
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    PID:2312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

    Filesize

    91KB

    MD5

    d44849c57382256ba2dfc5479180d9a1

    SHA1

    15a1e52ae0fd56df4ec81cd16c74b0c42f585668

    SHA256

    f6dfdca6c9f117d428e076277fc9d1b168a36a11fbb5dc6b7660820892bd3a87

    SHA512

    e589c7e312bcf87e9666e0c91095a386297a49feeffa2be80ff551a6014116b15847cd1d28ced5b517ff4572fe263b60c67365c4d9ba21dcdc95219fc61df7a8

  • C:\Users\Admin\AppData\Local\winlogon.exe

    Filesize

    91KB

    MD5

    b86806f049f767e729081754e9c66f40

    SHA1

    74ccd2b455ec4ab92ec4779e3de7ee34308b35ed

    SHA256

    81c0eba8044668a9ec0bfd99c5085f9244dbf323475cf532a97dd10a7d6e2326

    SHA512

    0dbb813399cbf74453374cbef4b2501fb410958d8bcb6937d6818ce6e56033502c161a4696b182096d17b83f8af0816153eef13f062f1fcbe93aebee522d5195

  • C:\Windows\xk.exe

    Filesize

    91KB

    MD5

    b54da3f14c7d80cb720984ecc6b3a576

    SHA1

    bc795680754d9621ec300107320a029150c69ab0

    SHA256

    216f55095d1cc1270c4b566a9215670946bbca1deee5b43381e76a9d0d34e4ad

    SHA512

    99b9620c0fb7a215893a7bc000d52379fc2691253583eb52b9493de26ca9b2ee1586c0fca6cb9a278ab1620e1df205b8b24a975b59cf392fcc274065880d4c53

  • C:\Windows\xk.exe

    Filesize

    91KB

    MD5

    b3ad5619bd7cf31c21e9d9a34c4385fc

    SHA1

    44675b43012ea6b668a50a82bcc894fc75cae7e2

    SHA256

    b4402ab20888c5f4bde969fa8b8894d1663eef7ff1f5749aac694b5495ca12b6

    SHA512

    483c065f48a3dd92f37da87e1b23e5a15e5774bb2b5c1a4328e7363d0839bb03a13777359b5221d93687d0c70f4245ce8a00fe2418b8b17de363d59229fce952

  • \Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

    Filesize

    91KB

    MD5

    65e70c44820da3f89721f0910405c001

    SHA1

    57a1764950daba41e4d888440f9262850de3a9df

    SHA256

    5c0cf4e2e8c7ef60e5709960c209eee8d7def4751f365974f539f80c012c2259

    SHA512

    a9c51e8df956b9bf9b44493ee43fdd22ad92d130da0fc89e6ebb608c29376dbd15dd4b0fcde12581834ed65ddc9c947faccd7ffadc09a22cf72d34dd26b20274

  • \Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

    Filesize

    91KB

    MD5

    98ce5a96a9edc23ded2b84a82666524e

    SHA1

    a35505090de7bbb1a667504fe98ddf898a6e2239

    SHA256

    a7d48b19fa3d2402e39b0d7ec2016d09a19e4d4e6fba55e1ffb734e5e5602288

    SHA512

    f1fc210847187998024ea23f079418cd71150db292fad4b364c2da8ac7d3269efab0d7fe37b070377bc15ed94a57fdd05e23fcabaf07160ca6006cdd5bf7bd51

  • \Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

    Filesize

    91KB

    MD5

    eb6ddd77b7747fff82ee3ebeaff31477

    SHA1

    072cdd514d1024076816de6566520eb000509947

    SHA256

    cfa63c1dbd0d38a835601164812e9aeb96672f1a042883ad0d63bc50443eee76

    SHA512

    1209915ed2087adeabe0dcf23afe8159b0a91191c755954ed18be669cc3bd119ee4578bc4b5b9cd600011cdc69589f6d0534970447ad1ea532cfe3cc39c8788c

  • \Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

    Filesize

    91KB

    MD5

    f0662a8237e41d6f99d39be488c0ee4f

    SHA1

    1169756a11625837fb46b073b06a533912127954

    SHA256

    f9c2c243caf2228640b657221067483e3e06220d921ab4af719f18f5c12f30a1

    SHA512

    19e4097c9a003bd75fdee70cc0e78039725d6e31fedbda71ed24ad36cb49b06b9697c09807a038f72440071dbf2a0eb4d49fa4c34c5d27a1edb024476662c37a

  • \Users\Admin\AppData\Local\WINDOWS\SMSS.EXE

    Filesize

    91KB

    MD5

    f2a68df914c6b78d249bf6eaf357ea8e

    SHA1

    7366a921e33e4a5ecc137acd396f67fb67d1322c

    SHA256

    56765193e73f613b11d96c6c96eb044a8d57d3f4e558e308fef44179281d7f59

    SHA512

    6344c30e60fbb86476463f952d221a43b55f165700f29d20f55f17bd439d6216df0f743a36250e1c606bca7319171e8e9089c03709f04565f444e50edb6d576d

  • \Windows\SysWOW64\IExplorer.exe

    Filesize

    91KB

    MD5

    d103348daaf10bee3c65746c55b2d73b

    SHA1

    3c8a5a7cda8d1cef2b8a29b2a84eb8e7165c2924

    SHA256

    edf5eb786791fe2fff20dfb13b10bd4a59282f9fded8e890844d43b9fca7d7fc

    SHA512

    b5c9bd6adeac349928f4818ac162b2c150cd6dea273730d0c93e0d33b8616f07e940aa5c56f6fd30eff17a9782015d91766bfdcc3fd640646c13ea2eba74a7dc

  • \Windows\SysWOW64\IExplorer.exe

    Filesize

    91KB

    MD5

    95e6bee1087b8d8772e2ef8873abeadb

    SHA1

    08fe6e23bf5bf2bcfb99af74818271bf7e43c92a

    SHA256

    7febd21f30a0883272186ba25a3a2aea2e24ffae3ad482e7ead82ba74beed822

    SHA512

    7abb525d035fd879677cd8c12cb981914399f47426f0dff5e1062f9a2a10b67d15a95f2639cef8bdc575d5bd7304f9ff36fe87b367872e01ca63a9af3f2d55be

  • memory/532-259-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/540-282-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1036-245-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1160-117-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1160-112-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1344-277-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1720-124-0x00000000003D0000-0x00000000003FE000-memory.dmp

    Filesize

    184KB

  • memory/1720-432-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1720-213-0x00000000003D0000-0x00000000003FE000-memory.dmp

    Filesize

    184KB

  • memory/1720-0-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1720-219-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1720-208-0x00000000003D0000-0x00000000003FE000-memory.dmp

    Filesize

    184KB

  • memory/1720-278-0x00000000003D0000-0x00000000003FE000-memory.dmp

    Filesize

    184KB

  • memory/1720-111-0x00000000003D0000-0x00000000003FE000-memory.dmp

    Filesize

    184KB

  • memory/1720-135-0x00000000003D0000-0x00000000003FE000-memory.dmp

    Filesize

    184KB

  • memory/1720-244-0x00000000003D0000-0x00000000003FE000-memory.dmp

    Filesize

    184KB

  • memory/1720-207-0x00000000003D0000-0x00000000003FE000-memory.dmp

    Filesize

    184KB

  • memory/1720-434-0x00000000003D0000-0x00000000003FE000-memory.dmp

    Filesize

    184KB

  • memory/1720-267-0x00000000003D0000-0x00000000003FE000-memory.dmp

    Filesize

    184KB

  • memory/1720-256-0x00000000003D0000-0x00000000003FE000-memory.dmp

    Filesize

    184KB

  • memory/1720-110-0x00000000003D0000-0x00000000003FE000-memory.dmp

    Filesize

    184KB

  • memory/1860-174-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2036-221-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2036-232-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2220-218-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2312-307-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2352-127-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2500-243-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2892-142-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2892-138-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB