Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06/08/2024, 14:07
Static task
static1
Behavioral task
behavioral1
Sample
b76461cc2cd642f4dc9be8dd78eee130N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b76461cc2cd642f4dc9be8dd78eee130N.exe
Resource
win10v2004-20240802-en
General
-
Target
b76461cc2cd642f4dc9be8dd78eee130N.exe
-
Size
704KB
-
MD5
b76461cc2cd642f4dc9be8dd78eee130
-
SHA1
3fd71ad4dfdc16daca1749fe7ab5e677cf3824ea
-
SHA256
0fbe8246924efb4a2214b064cfda8cb98069aaee7af1e68311f941bc21c17190
-
SHA512
d0556a4cfec0270a17537182a56b2744c5eed177ce66d91d3b85a4aedbc907ae29edc7c1818602060535164fdf4623d1ba4f3866d1981f625b8a2aa4b36cf1af
-
SSDEEP
12288:3QwY/2067WhaCjx1wp70f1k6muIut8iqWrrckBsMtinswNvA3wpVU0gr:a6rc1wuf1kBuIuGiqyFtifFu
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
pid Process 2228 b76461cc2cd642f4dc9be8dd78eee130N.exe -
Executes dropped EXE 1 IoCs
pid Process 2228 b76461cc2cd642f4dc9be8dd78eee130N.exe -
Loads dropped DLL 1 IoCs
pid Process 2284 b76461cc2cd642f4dc9be8dd78eee130N.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\trkcore = "C:\\ProgramData\\Microsoft\\Roaming\\svchost.exe" b76461cc2cd642f4dc9be8dd78eee130N.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 11 pastebin.com 13 pastebin.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2228 b76461cc2cd642f4dc9be8dd78eee130N.exe 2228 b76461cc2cd642f4dc9be8dd78eee130N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b76461cc2cd642f4dc9be8dd78eee130N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b76461cc2cd642f4dc9be8dd78eee130N.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2228 b76461cc2cd642f4dc9be8dd78eee130N.exe 2228 b76461cc2cd642f4dc9be8dd78eee130N.exe 2228 b76461cc2cd642f4dc9be8dd78eee130N.exe 2228 b76461cc2cd642f4dc9be8dd78eee130N.exe 2228 b76461cc2cd642f4dc9be8dd78eee130N.exe 2228 b76461cc2cd642f4dc9be8dd78eee130N.exe 2228 b76461cc2cd642f4dc9be8dd78eee130N.exe 2228 b76461cc2cd642f4dc9be8dd78eee130N.exe 2228 b76461cc2cd642f4dc9be8dd78eee130N.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2552 explorer.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2284 b76461cc2cd642f4dc9be8dd78eee130N.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2552 explorer.exe Token: SeShutdownPrivilege 2552 explorer.exe Token: SeShutdownPrivilege 2552 explorer.exe Token: SeShutdownPrivilege 2552 explorer.exe Token: SeShutdownPrivilege 2552 explorer.exe Token: SeShutdownPrivilege 2552 explorer.exe Token: SeShutdownPrivilege 2552 explorer.exe Token: SeShutdownPrivilege 2552 explorer.exe Token: SeShutdownPrivilege 2552 explorer.exe Token: SeShutdownPrivilege 2552 explorer.exe Token: SeShutdownPrivilege 2552 explorer.exe Token: SeShutdownPrivilege 2552 explorer.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe -
Suspicious use of SendNotifyMessage 23 IoCs
pid Process 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe 2552 explorer.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2228 b76461cc2cd642f4dc9be8dd78eee130N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2284 wrote to memory of 2228 2284 b76461cc2cd642f4dc9be8dd78eee130N.exe 31 PID 2284 wrote to memory of 2228 2284 b76461cc2cd642f4dc9be8dd78eee130N.exe 31 PID 2284 wrote to memory of 2228 2284 b76461cc2cd642f4dc9be8dd78eee130N.exe 31 PID 2284 wrote to memory of 2228 2284 b76461cc2cd642f4dc9be8dd78eee130N.exe 31 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System b76461cc2cd642f4dc9be8dd78eee130N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" b76461cc2cd642f4dc9be8dd78eee130N.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b76461cc2cd642f4dc9be8dd78eee130N.exe"C:\Users\Admin\AppData\Local\Temp\b76461cc2cd642f4dc9be8dd78eee130N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\b76461cc2cd642f4dc9be8dd78eee130N.exeC:\Users\Admin\AppData\Local\Temp\b76461cc2cd642f4dc9be8dd78eee130N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- System policy modification
PID:2228
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:2860
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2552
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
704KB
MD5c764780b58f91613f4970687844e20d0
SHA1d90e5d54b0820c2040df49513877b86307cb4f65
SHA2561ca3ff42f4be428f4a2237f7d2552f3cb246c5a5d8947f7029da9c3e377a76f0
SHA5129c19262315019ed0799adcd9aef4bc3cd0c5547934143919475d1b14b2095836e3ace1fbae8fb9e0dba31c010390ef2b140207ab8056aba2a5c4aa8f2385fa41