Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 14:08
Static task
static1
Behavioral task
behavioral1
Sample
0f4c83a80e28fda7257eb5d6357b9890N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0f4c83a80e28fda7257eb5d6357b9890N.exe
Resource
win10v2004-20240802-en
General
-
Target
0f4c83a80e28fda7257eb5d6357b9890N.exe
-
Size
280KB
-
MD5
0f4c83a80e28fda7257eb5d6357b9890
-
SHA1
5ac8b3d61d216ee5869d9a0f5312122b66100cee
-
SHA256
ce5353f0fff1f1e50d5456b1f716fa0796d9dbb0565591fecee47da523fc65f4
-
SHA512
0f9e14d23e27ba991eb1f5b4176d8788c555888e07e71f39fc07f0590602e2adc6ecb9bd88c088bed63b246304760ca197220421018f4beab8b468e4b2217b1b
-
SSDEEP
6144:uTz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDK:uTBPFV0RyWl3h2E+7pl
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2704 dwmsys.exe 2756 dwmsys.exe -
Loads dropped DLL 4 IoCs
pid Process 2528 0f4c83a80e28fda7257eb5d6357b9890N.exe 2528 0f4c83a80e28fda7257eb5d6357b9890N.exe 2528 0f4c83a80e28fda7257eb5d6357b9890N.exe 2704 dwmsys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwmsys.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f4c83a80e28fda7257eb5d6357b9890N.exe -
Modifies registry class 28 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\systemui\shell\runas 0f4c83a80e28fda7257eb5d6357b9890N.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\.exe\shell\open 0f4c83a80e28fda7257eb5d6357b9890N.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\.exe\shell\runas\command 0f4c83a80e28fda7257eb5d6357b9890N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 0f4c83a80e28fda7257eb5d6357b9890N.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\systemui 0f4c83a80e28fda7257eb5d6357b9890N.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\systemui\shell\runas\command 0f4c83a80e28fda7257eb5d6357b9890N.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\.exe 0f4c83a80e28fda7257eb5d6357b9890N.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\.exe\shell\open\command 0f4c83a80e28fda7257eb5d6357b9890N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\systemui\ = "Application" 0f4c83a80e28fda7257eb5d6357b9890N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\.exe\ = "systemui" 0f4c83a80e28fda7257eb5d6357b9890N.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\.exe\shell 0f4c83a80e28fda7257eb5d6357b9890N.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\systemui\DefaultIcon 0f4c83a80e28fda7257eb5d6357b9890N.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\.exe\DefaultIcon 0f4c83a80e28fda7257eb5d6357b9890N.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\systemui\shell\open\command 0f4c83a80e28fda7257eb5d6357b9890N.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\systemui\shell 0f4c83a80e28fda7257eb5d6357b9890N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\systemui\shell\runas\command\ = "\"%1\" %*" 0f4c83a80e28fda7257eb5d6357b9890N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\systemui\Content-Type = "application/x-msdownload" 0f4c83a80e28fda7257eb5d6357b9890N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\.exe\DefaultIcon\ = "%1" 0f4c83a80e28fda7257eb5d6357b9890N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\.exe\Content-Type = "application/x-msdownload" 0f4c83a80e28fda7257eb5d6357b9890N.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\systemui\shell\open 0f4c83a80e28fda7257eb5d6357b9890N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\systemui\shell\open\command\IsolatedCommand = "\"%1\" %*" 0f4c83a80e28fda7257eb5d6357b9890N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SView\\dwmsys.exe\" /START \"%1\" %*" 0f4c83a80e28fda7257eb5d6357b9890N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 0f4c83a80e28fda7257eb5d6357b9890N.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\.exe\shell\runas 0f4c83a80e28fda7257eb5d6357b9890N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\.exe\shell\runas\command\ = "\"%1\" %*" 0f4c83a80e28fda7257eb5d6357b9890N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\systemui\DefaultIcon\ = "%1" 0f4c83a80e28fda7257eb5d6357b9890N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\systemui\shell\runas\command\IsolatedCommand = "\"%1\" %*" 0f4c83a80e28fda7257eb5d6357b9890N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\systemui\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SView\\dwmsys.exe\" /START \"%1\" %*" 0f4c83a80e28fda7257eb5d6357b9890N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2704 dwmsys.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2704 2528 0f4c83a80e28fda7257eb5d6357b9890N.exe 30 PID 2528 wrote to memory of 2704 2528 0f4c83a80e28fda7257eb5d6357b9890N.exe 30 PID 2528 wrote to memory of 2704 2528 0f4c83a80e28fda7257eb5d6357b9890N.exe 30 PID 2528 wrote to memory of 2704 2528 0f4c83a80e28fda7257eb5d6357b9890N.exe 30 PID 2704 wrote to memory of 2756 2704 dwmsys.exe 31 PID 2704 wrote to memory of 2756 2704 dwmsys.exe 31 PID 2704 wrote to memory of 2756 2704 dwmsys.exe 31 PID 2704 wrote to memory of 2756 2704 dwmsys.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f4c83a80e28fda7257eb5d6357b9890N.exe"C:\Users\Admin\AppData\Local\Temp\0f4c83a80e28fda7257eb5d6357b9890N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Roaming\Microsoft\SView\dwmsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SView\dwmsys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SView\dwmsys.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Roaming\Microsoft\SView\dwmsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SView\dwmsys.exe"3⤵
- Executes dropped EXE
PID:2756
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
280KB
MD5e5caba04888dc731efc34f6c5133fd60
SHA191de4f70060297f5a8d2436661832dd602939703
SHA25602b2bdaeb8d9df3ff72ebac768ab1609ac2c324d46fb58442429c218e31b3899
SHA5129df7a96db35e838392bd910bc3b10ef47a0c44a3a9c3b60d79eb3e903392abce6748a0fe384499756efa569a7e7c094fd60e32604f1213af7db84aa2a0e58b17