Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 05:57
Static task
static1
Behavioral task
behavioral1
Sample
43fae6a60dffcc47045c6f132d41ec77db2134dc825c35d1bf3abeb7210226cd.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
43fae6a60dffcc47045c6f132d41ec77db2134dc825c35d1bf3abeb7210226cd.exe
Resource
win10v2004-20240802-en
General
-
Target
43fae6a60dffcc47045c6f132d41ec77db2134dc825c35d1bf3abeb7210226cd.exe
-
Size
5.0MB
-
MD5
6d7b8f5bfd03d8fdacebd97ea437b559
-
SHA1
d7b3a1bcd0b1cda98805165e726cc8716d86c1f4
-
SHA256
43fae6a60dffcc47045c6f132d41ec77db2134dc825c35d1bf3abeb7210226cd
-
SHA512
12b15265295f1e7fbb4a1e75a43ac2fa9e988526724032fd20d2053ab47832488759b0be8e562be391ddecc2eab4d3ec98279e825e6cfcc73b356093a6a53ca6
-
SSDEEP
98304:NcFiJETrDllPOOCrbAyNa0hdvV8Y288tjxGjQ/cshPyBe+Rr0NuTBpVY:jJSDbPOEodvO88tjxGjQEsae+5ntY
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 2920 regsvr32.exe 1916 regsvr32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\MiddleWareX.ocx cmd.exe File opened for modification C:\Windows\SysWOW64\MiddleWareX.ocx cmd.exe -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
pid Process 3000 mshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 43fae6a60dffcc47045c6f132d41ec77db2134dc825c35d1bf3abeb7210226cd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1C1A40F6-7177-494A-BAFC-A3DE6A80E15A}\1.0\HELPDIR regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{77A84000-D1CC-4307-8D74-E70581B4E0FE}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8DBBDB25-9761-4EA8-B14D-1A3300ACC113}\TypeLib\ = "{1C1A40F6-7177-494A-BAFC-A3DE6A80E15A}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FCCF290D-08EB-43AC-9282-D668D9715E0C}\InprocServer32\ = "C:\\Windows\\SysWOW64\\MiddleWareX.ocx" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1C1A40F6-7177-494A-BAFC-A3DE6A80E15A} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{77A84000-D1CC-4307-8D74-E70581B4E0FE}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8DBBDB25-9761-4EA8-B14D-1A3300ACC113}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{869C5BAF-BE33-4A20-8796-D9E0DB5B669C}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8DBBDB25-9761-4EA8-B14D-1A3300ACC113} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8DBBDB25-9761-4EA8-B14D-1A3300ACC113}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{869C5BAF-BE33-4A20-8796-D9E0DB5B669C}\MiscStatus regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{869C5BAF-BE33-4A20-8796-D9E0DB5B669C}\Version\ = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1C1A40F6-7177-494A-BAFC-A3DE6A80E15A}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1C1A40F6-7177-494A-BAFC-A3DE6A80E15A}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8DBBDB25-9761-4EA8-B14D-1A3300ACC113}\ = "_DMiddleWareXEvents" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8DBBDB25-9761-4EA8-B14D-1A3300ACC113}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FCCF290D-08EB-43AC-9282-D668D9715E0C} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{869C5BAF-BE33-4A20-8796-D9E0DB5B669C}\Control regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1C1A40F6-7177-494A-BAFC-A3DE6A80E15A}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{77A84000-D1CC-4307-8D74-E70581B4E0FE}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{77A84000-D1CC-4307-8D74-E70581B4E0FE} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{869C5BAF-BE33-4A20-8796-D9E0DB5B669C}\ToolboxBitmap32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{869C5BAF-BE33-4A20-8796-D9E0DB5B669C}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{77A84000-D1CC-4307-8D74-E70581B4E0FE}\ = "_DMiddleWareX" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{77A84000-D1CC-4307-8D74-E70581B4E0FE}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{77A84000-D1CC-4307-8D74-E70581B4E0FE}\TypeLib\ = "{1C1A40F6-7177-494A-BAFC-A3DE6A80E15A}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8DBBDB25-9761-4EA8-B14D-1A3300ACC113}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FCCF290D-08EB-43AC-9282-D668D9715E0C}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{869C5BAF-BE33-4A20-8796-D9E0DB5B669C} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIDDLEWAREX.MiddleWareXCtrl.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{869C5BAF-BE33-4A20-8796-D9E0DB5B669C}\ = "MiddleWareX Control" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{869C5BAF-BE33-4A20-8796-D9E0DB5B669C}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{869C5BAF-BE33-4A20-8796-D9E0DB5B669C}\ToolboxBitmap32\ = "C:\\Windows\\SysWOW64\\MiddleWareX.ocx, 1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{869C5BAF-BE33-4A20-8796-D9E0DB5B669C}\MiscStatus\1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{869C5BAF-BE33-4A20-8796-D9E0DB5B669C}\TypeLib\ = "{1C1A40F6-7177-494A-BAFC-A3DE6A80E15A}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1C1A40F6-7177-494A-BAFC-A3DE6A80E15A}\1.0\ = "MiddleWareXLib" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{77A84000-D1CC-4307-8D74-E70581B4E0FE}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8DBBDB25-9761-4EA8-B14D-1A3300ACC113}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{869C5BAF-BE33-4A20-8796-D9E0DB5B669C}\MiscStatus\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1C1A40F6-7177-494A-BAFC-A3DE6A80E15A}\1.0\HELPDIR\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{77A84000-D1CC-4307-8D74-E70581B4E0FE}\TypeLib\ = "{1C1A40F6-7177-494A-BAFC-A3DE6A80E15A}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{8DBBDB25-9761-4EA8-B14D-1A3300ACC113}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8DBBDB25-9761-4EA8-B14D-1A3300ACC113}\ = "_DMiddleWareXEvents" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1C1A40F6-7177-494A-BAFC-A3DE6A80E15A}\1.0\0\win32\ = "C:\\Windows\\SysWOW64\\MiddleWareX.ocx" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8DBBDB25-9761-4EA8-B14D-1A3300ACC113}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{77A84000-D1CC-4307-8D74-E70581B4E0FE} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{869C5BAF-BE33-4A20-8796-D9E0DB5B669C}\ProgID\ = "MIDDLEWAREX.MiddleWareXCtrl.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{869C5BAF-BE33-4A20-8796-D9E0DB5B669C}\Control\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8DBBDB25-9761-4EA8-B14D-1A3300ACC113}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{77A84000-D1CC-4307-8D74-E70581B4E0FE}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{869C5BAF-BE33-4A20-8796-D9E0DB5B669C}\InprocServer32\ = "C:\\Windows\\SysWOW64\\MiddleWareX.ocx" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{869C5BAF-BE33-4A20-8796-D9E0DB5B669C}\Version regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{869C5BAF-BE33-4A20-8796-D9E0DB5B669C}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1C1A40F6-7177-494A-BAFC-A3DE6A80E15A}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1C1A40F6-7177-494A-BAFC-A3DE6A80E15A}\1.0\FLAGS\ = "2" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIDDLEWAREX.MiddleWareXCtrl.1\ = "MiddleWareX Control" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8DBBDB25-9761-4EA8-B14D-1A3300ACC113} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8DBBDB25-9761-4EA8-B14D-1A3300ACC113}\TypeLib\ = "{1C1A40F6-7177-494A-BAFC-A3DE6A80E15A}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{FCCF290D-08EB-43AC-9282-D668D9715E0C}\ = "MiddleWareX Property Page" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIDDLEWAREX.MiddleWareXCtrl.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{869C5BAF-BE33-4A20-8796-D9E0DB5B669C}\MiscStatus\1\ = "131473" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{77A84000-D1CC-4307-8D74-E70581B4E0FE}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{77A84000-D1CC-4307-8D74-E70581B4E0FE}\ = "_DMiddleWareX" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{77A84000-D1CC-4307-8D74-E70581B4E0FE}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" regsvr32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1964 43fae6a60dffcc47045c6f132d41ec77db2134dc825c35d1bf3abeb7210226cd.exe 1964 43fae6a60dffcc47045c6f132d41ec77db2134dc825c35d1bf3abeb7210226cd.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2436 1964 43fae6a60dffcc47045c6f132d41ec77db2134dc825c35d1bf3abeb7210226cd.exe 31 PID 1964 wrote to memory of 2436 1964 43fae6a60dffcc47045c6f132d41ec77db2134dc825c35d1bf3abeb7210226cd.exe 31 PID 1964 wrote to memory of 2436 1964 43fae6a60dffcc47045c6f132d41ec77db2134dc825c35d1bf3abeb7210226cd.exe 31 PID 1964 wrote to memory of 2436 1964 43fae6a60dffcc47045c6f132d41ec77db2134dc825c35d1bf3abeb7210226cd.exe 31 PID 2436 wrote to memory of 3000 2436 cmd.exe 33 PID 2436 wrote to memory of 3000 2436 cmd.exe 33 PID 2436 wrote to memory of 3000 2436 cmd.exe 33 PID 2436 wrote to memory of 3000 2436 cmd.exe 33 PID 3000 wrote to memory of 1976 3000 mshta.exe 34 PID 3000 wrote to memory of 1976 3000 mshta.exe 34 PID 3000 wrote to memory of 1976 3000 mshta.exe 34 PID 3000 wrote to memory of 1976 3000 mshta.exe 34 PID 1976 wrote to memory of 2920 1976 cmd.exe 36 PID 1976 wrote to memory of 2920 1976 cmd.exe 36 PID 1976 wrote to memory of 2920 1976 cmd.exe 36 PID 1976 wrote to memory of 2920 1976 cmd.exe 36 PID 1976 wrote to memory of 2920 1976 cmd.exe 36 PID 1976 wrote to memory of 2920 1976 cmd.exe 36 PID 1976 wrote to memory of 2920 1976 cmd.exe 36 PID 1976 wrote to memory of 1916 1976 cmd.exe 37 PID 1976 wrote to memory of 1916 1976 cmd.exe 37 PID 1976 wrote to memory of 1916 1976 cmd.exe 37 PID 1976 wrote to memory of 1916 1976 cmd.exe 37 PID 1976 wrote to memory of 1916 1976 cmd.exe 37 PID 1976 wrote to memory of 1916 1976 cmd.exe 37 PID 1976 wrote to memory of 1916 1976 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\43fae6a60dffcc47045c6f132d41ec77db2134dc825c35d1bf3abeb7210226cd.exe"C:\Users\Admin\AppData\Local\Temp\43fae6a60dffcc47045c6f132d41ec77db2134dc825c35d1bf3abeb7210226cd.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\MiddleWareX.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\mshta.exemshta vbscript:CreateObject("Shell.Application").ShellExecute("cmd.exe","/c C:\Users\Admin\AppData\Local\Temp\MIDDLE~1.BAT ::","","runas",1)(window.close)3⤵
- Access Token Manipulation: Create Process with Token
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\MIDDLE~1.BAT ::4⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /u /s C:\Windows\SysWOW64\MiddleWareX.ocx5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2920
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s C:\Windows\SysWOW64\MiddleWareX.ocx5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1916
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
289B
MD52c4b4ba717acec4f8629f295b202f49c
SHA193837ef6098e8de8cc50c20d2a5dada3f7a48892
SHA2568c1179c8249eb42966164221056570f651d1f24cea66122130cd933e43e24c7f
SHA512184ab3940e7240e30872fd3223d51c11871bdd874b8d8d6062baff9907e95f29cae322f8113f046f7e1fad54d9fef9b692c8854df2536804e06723d02abbf99d
-
Filesize
2.1MB
MD5dc4a6a41db0678422c5fbbb1068b1752
SHA1a6b80709cc11ebee962873a777a6ca08b85608cd
SHA25603965be1329c5f2e2983de87740c03d122df7088a31a50e3fbbbb970e29edd75
SHA512d7ca0a267d385bb647042004af3c88b13154d3ac7f2d77a33ba9d434ed035e59cb32a57fea248587a8f69e5c254e042301cf9b46121615f57fe10032bba7a1b3
-
Filesize
331B
MD59d33a096a43d984a4c4bf48bed970521
SHA11c8cfb8d92ee026230cba64ee4588a9dd9d96796
SHA2564e82a4fa33970fbd94b1d0eab1be5d2d5aa0d4456d36343214b750d735ba392a
SHA512ab9b895acb5ce22f18ee1416b0647103ebe71cddecd60fec36d3cbefcd9a68aa7f884be8c65cf0700b8b44d67a276115026d71c43281acd20c975ff49c91153e