Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 23:16
Static task
static1
Behavioral task
behavioral1
Sample
eac85f06241ae46aa55469c12f521c10N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
eac85f06241ae46aa55469c12f521c10N.exe
Resource
win10v2004-20240802-en
General
-
Target
eac85f06241ae46aa55469c12f521c10N.exe
-
Size
430KB
-
MD5
eac85f06241ae46aa55469c12f521c10
-
SHA1
3ca1a9ab3a572ebd9d2ab70c45ea40c45daf632d
-
SHA256
ca94f502026c5ac760c1a502cdc211a112581de334e8ad0363d0108499666b60
-
SHA512
a5c47d54d321553f1bc60678d5ff6558666b80fa9673c8ddc34609a96788fbf0371c75bf9adf669c25752378edf0ec65b75f7289cf3ab8807c7e64bfaf894407
-
SSDEEP
12288:ntKe6Zv23YeVOsiFKClC1NJhkbOOpPFrVQE61N4:76Zv2lZiFTqD2OOprQNN4
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{34961E84-8B9A-11D5-EBA1-F78EEEEEE983} eac85f06241ae46aa55469c12f521c10N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{34961E84-8B9A-11D5-EBA1-F78EEEEEE983}\StubPath = "msane32.exe" eac85f06241ae46aa55469c12f521c10N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{34961E84-8B9A-11D5-EBA1-F78EEEEEE983} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{34961E84-8B9A-11D5-EBA1-F78EEEEEE983}\StubPath = "msane32.exe" svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2400 svchost.exe -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" eac85f06241ae46aa55469c12f521c10N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" eac85f06241ae46aa55469c12f521c10N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" eac85f06241ae46aa55469c12f521c10N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000\Software\Microsoft\Windows\CurrentVersion\Run\VCL = "vcl32.exe" svchost.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\msane32.exe eac85f06241ae46aa55469c12f521c10N.exe File opened for modification C:\Windows\SysWOW64\msane32.exe eac85f06241ae46aa55469c12f521c10N.exe File created C:\Windows\SysWOW64\concp32.exe eac85f06241ae46aa55469c12f521c10N.exe File opened for modification C:\Windows\SysWOW64\concp32.exe eac85f06241ae46aa55469c12f521c10N.exe File created C:\Windows\SysWOW64\vcl32.exe eac85f06241ae46aa55469c12f521c10N.exe File opened for modification C:\Windows\SysWOW64\vcl32.exe eac85f06241ae46aa55469c12f521c10N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svchost.exe eac85f06241ae46aa55469c12f521c10N.exe File opened for modification C:\Windows\svchost.exe eac85f06241ae46aa55469c12f521c10N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eac85f06241ae46aa55469c12f521c10N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{34961E84-8B9A-11D5-EBA1-F78EEEEEE983} eac85f06241ae46aa55469c12f521c10N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" eac85f06241ae46aa55469c12f521c10N.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{34961E84-8B9A-11D5-EBA1-F78EEEEEE983}\u1 = 551d2e0658054ba756fd3798fea5ffca42865cb762a31639dabd7f2cca44e226 svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{34961E84-8B9A-11D5-EBA1-F78EEEEEE983}\v = "165" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{34961E84-8B9A-11D5-EBA1-F78EEEEEE983}\InprocServer32 eac85f06241ae46aa55469c12f521c10N.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{34961E84-8B9A-11D5-EBA1-F78EEEEEE983}\sm = ebb5525fa3bcf9422c8ff945977d6af9 eac85f06241ae46aa55469c12f521c10N.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{34961E84-8B9A-11D5-EBA1-F78EEEEEE983}\ax = a4c8a39c309f59df2f579b67dbef1589 eac85f06241ae46aa55469c12f521c10N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{34961E84-8B9A-11D5-EBA1-F78EEEEEE983} svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{34961E84-8B9A-11D5-EBA1-F78EEEEEE983}\InprocServer32 svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{34961E84-8B9A-11D5-EBA1-F78EEEEEE983}\u0 = 658663d26f8bad325217a06063847056939f558d910ed252e05dd0113550f7fc0f4da82ff73a0681ba604c2d4f23269f svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{34961E84-8B9A-11D5-EBA1-F78EEEEEE983}\u2 = a54a6b702f92fdf2acd57599e2ae1608015dff41aa020117fc9bd8e2dcf4340f3fa61eb55d6f28597df90602703809d4 svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\SysWow64\\concp32.exe \"%1\" %*" svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1460 eac85f06241ae46aa55469c12f521c10N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1460 wrote to memory of 2400 1460 eac85f06241ae46aa55469c12f521c10N.exe 30 PID 1460 wrote to memory of 2400 1460 eac85f06241ae46aa55469c12f521c10N.exe 30 PID 1460 wrote to memory of 2400 1460 eac85f06241ae46aa55469c12f521c10N.exe 30 PID 1460 wrote to memory of 2400 1460 eac85f06241ae46aa55469c12f521c10N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\eac85f06241ae46aa55469c12f521c10N.exe"C:\Users\Admin\AppData\Local\Temp\eac85f06241ae46aa55469c12f521c10N.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\svchost.exeC:\Windows\svchost.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Modifies system executable filetype association
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2400
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
435KB
MD5af8be72dcf344de19667b6a43c68aa85
SHA1542599da9f109e127780acccb807f0d9026a4ac5
SHA2560076ce24646492c54f612a3965055df815c448409104b2e7f3c1ebb124f85628
SHA51245ce28e998bec04eae09c8c363bb1312e77f8fd1b8d6bd9880d81ede77d9c7316b693a9599bf011d145dfa32779259df1cefb19ab5c995b5a88cc5d415164424
-
Filesize
435KB
MD5f386be992688a1ec6e96075cbb2e826b
SHA1f2f78fcbc0d350c2e54e15860f19e02272f94325
SHA256f838365e3cbb4859be72a700512ab6ad612e6424b8ed6c5488ad13e8131ee5f2
SHA512e39465a063e1b7ec097226191bdd27f6313d034133a35b9e5f5535fdc5d47dad0400074799ef57a15f9a425b94ac83fb4e49239bec905af49fc9be268b23da7c