Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 11:09
Behavioral task
behavioral1
Sample
2d64b37beb5063a030c2e083b4d6baa0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2d64b37beb5063a030c2e083b4d6baa0N.exe
Resource
win10v2004-20240802-en
General
-
Target
2d64b37beb5063a030c2e083b4d6baa0N.exe
-
Size
892KB
-
MD5
2d64b37beb5063a030c2e083b4d6baa0
-
SHA1
bf0583bcecb115f20c5c6f800b46321734b8a781
-
SHA256
270f8e7c30ebdbf8c1e642e4c7dd5eb0950efa2dca1dfa8290103f352f8df8b5
-
SHA512
77a24cb1d905049ff129084a9ef7d9bd48fcace78c5dcca1b4e7e84cdc4ce707cf584c136273717b66480ebc513ed857c0a06bb7918697cc18aa0917c7558fd0
-
SSDEEP
24576:v6Zv2ivhBVnFys7xP86LkRCwPYfuukvDtiflQM:vE2ivhQs7dLkRumsR
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8F9C878E-8B9A-11D5-EBA1-F78EEEEEE983}\StubPath = "msldj32.exe" 2d64b37beb5063a030c2e083b4d6baa0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8F9C878E-8B9A-11D5-EBA1-F78EEEEEE983} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8F9C878E-8B9A-11D5-EBA1-F78EEEEEE983}\StubPath = "msldj32.exe" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8F9C878E-8B9A-11D5-EBA1-F78EEEEEE983} 2d64b37beb5063a030c2e083b4d6baa0N.exe -
Executes dropped EXE 1 IoCs
pid Process 2720 svchost.exe -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" 2d64b37beb5063a030c2e083b4d6baa0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" svchost.exe -
resource yara_rule behavioral1/memory/2820-0-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/files/0x000900000001631e-5.dat upx behavioral1/memory/2820-14-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/files/0x0033000000015f8b-15.dat upx behavioral1/memory/2720-16-0x0000000000400000-0x0000000000439000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" 2d64b37beb5063a030c2e083b4d6baa0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3502430532-24693940-2469786940-1000\Software\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" 2d64b37beb5063a030c2e083b4d6baa0N.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\vcl32.exe 2d64b37beb5063a030c2e083b4d6baa0N.exe File opened for modification C:\Windows\SysWOW64\vcl32.exe 2d64b37beb5063a030c2e083b4d6baa0N.exe File created C:\Windows\SysWOW64\msldj32.exe 2d64b37beb5063a030c2e083b4d6baa0N.exe File opened for modification C:\Windows\SysWOW64\msldj32.exe 2d64b37beb5063a030c2e083b4d6baa0N.exe File created C:\Windows\SysWOW64\concp32.exe 2d64b37beb5063a030c2e083b4d6baa0N.exe File opened for modification C:\Windows\SysWOW64\concp32.exe 2d64b37beb5063a030c2e083b4d6baa0N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svchost.exe 2d64b37beb5063a030c2e083b4d6baa0N.exe File opened for modification C:\Windows\svchost.exe 2d64b37beb5063a030c2e083b4d6baa0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d64b37beb5063a030c2e083b4d6baa0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Modifies registry class 12 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8F9C878E-8B9A-11D5-EBA1-F78EEEEEE983}\u1 = 551d2e0658054ba756fd3798fea5ffca42865cb762a31639dabd7f2cca44e226 svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8F9C878E-8B9A-11D5-EBA1-F78EEEEEE983}\u2 = a54a6b702f92fdf2acd57599e2ae1608015dff41aa020117fc9bd8e2dcf4340f3fa61eb55d6f28597df90602703809d4 svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8F9C878E-8B9A-11D5-EBA1-F78EEEEEE983} 2d64b37beb5063a030c2e083b4d6baa0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8F9C878E-8B9A-11D5-EBA1-F78EEEEEE983}\InprocServer32 2d64b37beb5063a030c2e083b4d6baa0N.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8F9C878E-8B9A-11D5-EBA1-F78EEEEEE983}\sm = ebb5525fa3bcf9422c8ff945977d6af9 2d64b37beb5063a030c2e083b4d6baa0N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8F9C878E-8B9A-11D5-EBA1-F78EEEEEE983} svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8F9C878E-8B9A-11D5-EBA1-F78EEEEEE983}\InprocServer32 svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8F9C878E-8B9A-11D5-EBA1-F78EEEEEE983}\u0 = 658663d26f8bad325217a06063847056939f558d910ed252e05dd0113550f7fc0f4da82ff73a0681ba604c2d4f23269f svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8F9C878E-8B9A-11D5-EBA1-F78EEEEEE983}\v = "165" svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{8F9C878E-8B9A-11D5-EBA1-F78EEEEEE983}\ax = 135fd517eca348496621aa0706be3064 2d64b37beb5063a030c2e083b4d6baa0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" 2d64b37beb5063a030c2e083b4d6baa0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2820 2d64b37beb5063a030c2e083b4d6baa0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2720 2820 2d64b37beb5063a030c2e083b4d6baa0N.exe 30 PID 2820 wrote to memory of 2720 2820 2d64b37beb5063a030c2e083b4d6baa0N.exe 30 PID 2820 wrote to memory of 2720 2820 2d64b37beb5063a030c2e083b4d6baa0N.exe 30 PID 2820 wrote to memory of 2720 2820 2d64b37beb5063a030c2e083b4d6baa0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d64b37beb5063a030c2e083b4d6baa0N.exe"C:\Users\Admin\AppData\Local\Temp\2d64b37beb5063a030c2e083b4d6baa0N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\svchost.exeC:\Windows\svchost.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
894KB
MD52afc0cdaf8a95280d05bdc9442bb5114
SHA1225c9c12a122ebb3a6f11566b22a570ea62e382c
SHA25628a1d77bc151d6119d825fabf694eb887066036c338a6a759f341dc22074f49d
SHA512cfb78b4a365cd4113f8e33cec944d9cfd0b69807ae5ae11dc41a7de408e81f8763cc13186064e8c01ccc58c26eb3245805e5317c333bcd08e5a014a32381a299
-
Filesize
896KB
MD5cee6452eb7f29a0c6592b1a670a28097
SHA1d4cb9def51d335941ac92a267b1f85115bc2d11a
SHA25672b5f27e9b943a8b0f2d9d03f8324a15120069d97c98da8648576fdf880a50b6
SHA5128312e0b0724e692e8467e8cd1f033dd343077293b51cedf2af8792bf426aaf9f113076a8dbab3975676daf303894b3f43b4908ef4da7d1c603fb0b1d0fda99fa