Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 03:44
Static task
static1
Behavioral task
behavioral1
Sample
05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.exe
Resource
win10v2004-20240802-en
General
-
Target
05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.exe
-
Size
1.5MB
-
MD5
ce5aed08ef0b8c758f49605d860dfbc0
-
SHA1
6db3aa68327bfea13dd178b4e5e4694b9e726462
-
SHA256
05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b
-
SHA512
6b8af571bfa24b3ef2f3faba08dc7e4a105df7fd86b9838da50241402385108096b3788e783fb7265529120505d11c76da91849bd9c0d36f3088a2c9fc8e2db0
-
SSDEEP
24576:P4nXubIQGyxbPV0db26fLywtAvfAc+bv8++UHavwRerOC2V:Pqe3f6yqAH+7A4avwR51
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.tmp -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 2660 netsh.exe 2444 netsh.exe -
Executes dropped EXE 2 IoCs
pid Process 3008 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.tmp 2808 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.tmp -
Loads dropped DLL 2 IoCs
pid Process 2192 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.exe 2628 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.exe -
Kills process with taskkill 1 IoCs
pid Process 2492 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2492 taskkill.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2192 wrote to memory of 3008 2192 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.exe 30 PID 2192 wrote to memory of 3008 2192 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.exe 30 PID 2192 wrote to memory of 3008 2192 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.exe 30 PID 2192 wrote to memory of 3008 2192 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.exe 30 PID 2192 wrote to memory of 3008 2192 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.exe 30 PID 2192 wrote to memory of 3008 2192 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.exe 30 PID 2192 wrote to memory of 3008 2192 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.exe 30 PID 3008 wrote to memory of 2628 3008 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.tmp 31 PID 3008 wrote to memory of 2628 3008 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.tmp 31 PID 3008 wrote to memory of 2628 3008 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.tmp 31 PID 3008 wrote to memory of 2628 3008 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.tmp 31 PID 3008 wrote to memory of 2628 3008 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.tmp 31 PID 3008 wrote to memory of 2628 3008 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.tmp 31 PID 3008 wrote to memory of 2628 3008 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.tmp 31 PID 2628 wrote to memory of 2808 2628 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.exe 32 PID 2628 wrote to memory of 2808 2628 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.exe 32 PID 2628 wrote to memory of 2808 2628 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.exe 32 PID 2628 wrote to memory of 2808 2628 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.exe 32 PID 2628 wrote to memory of 2808 2628 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.exe 32 PID 2628 wrote to memory of 2808 2628 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.exe 32 PID 2628 wrote to memory of 2808 2628 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.exe 32 PID 2808 wrote to memory of 2660 2808 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.tmp 33 PID 2808 wrote to memory of 2660 2808 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.tmp 33 PID 2808 wrote to memory of 2660 2808 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.tmp 33 PID 2808 wrote to memory of 2660 2808 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.tmp 33 PID 2808 wrote to memory of 2444 2808 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.tmp 35 PID 2808 wrote to memory of 2444 2808 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.tmp 35 PID 2808 wrote to memory of 2444 2808 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.tmp 35 PID 2808 wrote to memory of 2444 2808 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.tmp 35 PID 2808 wrote to memory of 2492 2808 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.tmp 37 PID 2808 wrote to memory of 2492 2808 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.tmp 37 PID 2808 wrote to memory of 2492 2808 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.tmp 37 PID 2808 wrote to memory of 2492 2808 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.tmp 37 -
System policy modification 1 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableSecureUIAPaths = "1" 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ValidateAdminCodeSignatures = "0" 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableUIADesktopToggle = "0" 05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.tmp
Processes
-
C:\Users\Admin\AppData\Local\Temp\05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.exe"C:\Users\Admin\AppData\Local\Temp\05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\is-S7510.tmp\05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.tmp"C:\Users\Admin\AppData\Local\Temp\is-S7510.tmp\05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.tmp" /SL5="$A01B6,776704,776704,C:\Users\Admin\AppData\Local\Temp\05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.exe"C:\Users\Admin\AppData\Local\Temp\05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.exe" /VERYSILENT /SUPPRESSMSGBOXES /NORESTART /FORCECLOSEAPPLICATIONS3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\is-NA8CI.tmp\05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.tmp"C:\Users\Admin\AppData\Local\Temp\is-NA8CI.tmp\05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.tmp" /SL5="$B01B6,776704,776704,C:\Users\Admin\AppData\Local\Temp\05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.exe" /VERYSILENT /SUPPRESSMSGBOXES /NORESTART /FORCECLOSEAPPLICATIONS4⤵
- UAC bypass
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2808 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall delete rule name="Gear"5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2660
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\system32\netsh.exe" advfirewall firewall add rule name="Gear" dir=in action=allow program="C:\Program Files (x86)\Gear\Gear.exe" enable=yes5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2444
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill" /F /IM Gear.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2492
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\is-S7510.tmp\05d1cf1d8a06c7db5b6a37a616ef6f54fb13e863e9785cb431ae060efb04185b.tmp
Filesize3.0MB
MD5ab518bda5c5f5be1bc85e491ced83924
SHA140b70d1759015cf35ff9823e636184544dc15e6d
SHA2567857bc438cbb8c3492e8e169ed48a9c5c84e7c1d1ead989adf0bf159e74185c6
SHA51269b2a737d3398502a487a65423c840308e82cd222546cfb646ca692c99b0cc46aeb34f245181c210b31394ece44ddb4c71ae4a961a1873a75432307bbca28f1e