Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
15s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 01:02
Static task
static1
Behavioral task
behavioral1
Sample
01accf1b08e5349309a6d2ca074ca376d55be3a79e573feb051243f7332640e0.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
01accf1b08e5349309a6d2ca074ca376d55be3a79e573feb051243f7332640e0.exe
Resource
win10v2004-20240802-en
General
-
Target
01accf1b08e5349309a6d2ca074ca376d55be3a79e573feb051243f7332640e0.exe
-
Size
5.7MB
-
MD5
fbc16cedeb1c77234171be5290ed06b0
-
SHA1
51ca56aa40e042439d121c932cbb2ab20eeeeac2
-
SHA256
01accf1b08e5349309a6d2ca074ca376d55be3a79e573feb051243f7332640e0
-
SHA512
44639242315d5b242bfe23ced27efca7d1439a6d011d0ddac55f7e10d949c3595447d51146477acd82d459c2694ac73d728206f0d734a95e553911754dab05f5
-
SSDEEP
98304:IdkyIAYt3VXweTkquPhO881Vv2LDdLAGa8okC0HvIz1inN1aK+fno1TGDjZ:skVLXwcucUAG+Dz1iNQKio1El
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2716 2228 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01accf1b08e5349309a6d2ca074ca376d55be3a79e573feb051243f7332640e0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies registry class 28 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 7400310000000000e558ce691100557365727300600008000400efbeee3a851ae558ce692a000000e601000000000100000000000000000036000000000055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\NodeSlot = "1" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4c0031000000000013594d08100041646d696e00380008000400efbee558ce6913594d082a00000033000000000003000000000000000000000000000000410064006d0069006e00000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 4a0031000000000013594d081200333338390000360008000400efbe13594d0813594d082a000000d74e00000000050000000000000000000000000000003300330038003900000014000000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2228 wrote to memory of 692 2228 01accf1b08e5349309a6d2ca074ca376d55be3a79e573feb051243f7332640e0.exe 29 PID 2228 wrote to memory of 692 2228 01accf1b08e5349309a6d2ca074ca376d55be3a79e573feb051243f7332640e0.exe 29 PID 2228 wrote to memory of 692 2228 01accf1b08e5349309a6d2ca074ca376d55be3a79e573feb051243f7332640e0.exe 29 PID 2228 wrote to memory of 692 2228 01accf1b08e5349309a6d2ca074ca376d55be3a79e573feb051243f7332640e0.exe 29 PID 2228 wrote to memory of 2716 2228 01accf1b08e5349309a6d2ca074ca376d55be3a79e573feb051243f7332640e0.exe 31 PID 2228 wrote to memory of 2716 2228 01accf1b08e5349309a6d2ca074ca376d55be3a79e573feb051243f7332640e0.exe 31 PID 2228 wrote to memory of 2716 2228 01accf1b08e5349309a6d2ca074ca376d55be3a79e573feb051243f7332640e0.exe 31 PID 2228 wrote to memory of 2716 2228 01accf1b08e5349309a6d2ca074ca376d55be3a79e573feb051243f7332640e0.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\01accf1b08e5349309a6d2ca074ca376d55be3a79e573feb051243f7332640e0.exe"C:\Users\Admin\AppData\Local\Temp\01accf1b08e5349309a6d2ca074ca376d55be3a79e573feb051243f7332640e0.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe C:\Users\Admin\3389\2⤵
- System Location Discovery: System Language Discovery
PID:692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 3242⤵
- Program crash
PID:2716
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:2052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57baf62423146bc11132fbfc178835889
SHA17beada9e72cea47d134a7f7e649a204fe861771a
SHA256e6f4c233dc0d83e1ce2c4e133076d94c8b771840ff1fbd450bd7fc888165d182
SHA512f22783bd16de05563806662857cf6445d7c0092ca76d78cfe9782c9e3a0ff2ac8a0adb3a27eb20c209a2e997558525ee0444f70d8abdb9ea075095bb9c8d9997