Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/09/2024, 18:52

General

  • Target

    2b1c6494c471b0ad336e3d9ce8c934f0N.exe

  • Size

    52KB

  • MD5

    2b1c6494c471b0ad336e3d9ce8c934f0

  • SHA1

    80d42b6a617cebfe2c0668b482b87f8742485f9f

  • SHA256

    c46b7fe7ca962ffc011e0f356dc0c5e80d4727d3a2057c33bbb443e67f7e4420

  • SHA512

    21996e570ee4160cb370a6e9a6829f52c3c650b3f47359df1eef1e258edabcded91f120561e7a74c37c550ff085f19ee6cb05cc818732733f3fe744dc30c0ed6

  • SSDEEP

    768:d+ciLamXW9XgMxjFkpvMVX8q18q13yO1oj5n/wFkfw:IzaEW5gMxZVXf8a3yO1opwB

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 10 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 5 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 5 IoCs
  • Windows security bypass 2 TTPs 25 IoCs
  • Blocks application from running via registry modification 30 IoCs

    Adds application to list of disallowed applications.

  • Disables RegEdit via registry modification 10 IoCs
  • Disables use of System Restore points 1 TTPs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 10 IoCs
  • Executes dropped EXE 20 IoCs
  • Loads dropped DLL 4 IoCs
  • Modifies system executable filetype association 2 TTPs 62 IoCs
  • Windows security modification 2 TTPs 30 IoCs
  • Adds Run key to start application 2 TTPs 15 IoCs
  • Drops desktop.ini file(s) 16 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 32 IoCs
  • Drops file in Windows directory 20 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 21 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 45 IoCs
  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 4 IoCs
  • Suspicious use of SetWindowsHookEx 21 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs
  • System policy modification 1 TTPs 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b1c6494c471b0ad336e3d9ce8c934f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\2b1c6494c471b0ad336e3d9ce8c934f0N.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Windows security bypass
    • Blocks application from running via registry modification
    • Disables RegEdit via registry modification
    • Event Triggered Execution: Image File Execution Options Injection
    • Modifies system executable filetype association
    • Windows security modification
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies Internet Explorer settings
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1468
    • C:\Windows\nEwb0Rn.exe
      C:\Windows\nEwb0Rn.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3144
      • C:\Windows\nEwb0Rn.exe
        C:\Windows\nEwb0Rn.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3696
      • C:\Windows\SysWOW64\WishfulThinking.exe
        C:\Windows\system32\WishfulThinking.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2164
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4840
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:376
    • C:\Windows\SysWOW64\WishfulThinking.exe
      C:\Windows\system32\WishfulThinking.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:4228
      • C:\Windows\nEwb0Rn.exe
        C:\Windows\nEwb0Rn.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1056
      • C:\Windows\SysWOW64\WishfulThinking.exe
        C:\Windows\system32\WishfulThinking.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2368
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2948
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1964
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3148
      • C:\Windows\nEwb0Rn.exe
        C:\Windows\nEwb0Rn.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4148
      • C:\Windows\SysWOW64\WishfulThinking.exe
        C:\Windows\system32\WishfulThinking.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4592
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4768
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4588
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visibility of file extensions in Explorer
      • Modifies visiblity of hidden/system files in Explorer
      • Windows security bypass
      • Blocks application from running via registry modification
      • Disables RegEdit via registry modification
      • Event Triggered Execution: Image File Execution Options Injection
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Windows security modification
      • Adds Run key to start application
      • Drops desktop.ini file(s)
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies Control Panel
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3468
      • C:\Windows\nEwb0Rn.exe
        C:\Windows\nEwb0Rn.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:4856
      • C:\Windows\SysWOW64\WishfulThinking.exe
        C:\Windows\system32\WishfulThinking.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3636
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3224
      • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
        "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

    Filesize

    52KB

    MD5

    850060fdf106929d2edf9ee7b1f8fa40

    SHA1

    6ec2d63b11980469a1c29cdba25853a92e7b7ec9

    SHA256

    dbec3764db6babb91391f7b9c18af3c2531fefdbbe337330294a3bb1b8a0a398

    SHA512

    d46ce95f30cf8a7263a9751845d17c92245d9f1bbaea5e5e7055c371335227139863f9c6c4bbfb12f0aaf956cd73e0946725623f86f23f864be3fa8fc1da6f73

  • C:\Users\All Users\Start Menu\Programs\Startup\Empty.pif

    Filesize

    52KB

    MD5

    ebec5b00aa2484e61cbdd7c4be3ac955

    SHA1

    97eddd49699f05cba47e61f4fff0bd87e5273f06

    SHA256

    308d0a5ce9a4c844bbf5bf29ffe762e6ff2796590bdffdd7839ded4c7cacac55

    SHA512

    94d7cac181eaf69a1d6407a04b3e753460a9a3f5d999079a9fa9147392927ce22ed35c7c044799b8fddc087a675a61e795f53c0226da15b34eca7610e8de129c

  • C:\Windows\SysWOW64\DamageControl.scr

    Filesize

    52KB

    MD5

    19068d60686359d65de62c5f167ff9e3

    SHA1

    5b73098de164c37b1b5017585bfbd426a2d72e45

    SHA256

    5f842b30c0a028463c0b86977c82d9f0ea0dc9198786e1eb89f81f57c66b5ab6

    SHA512

    47cbe953ee8fb900fba12619583ea98b8bf5fe0f814563c259751c06351b9e5476daf2b60b57b406262e973515f5132bc930602bb3460f63c66d00eb5441fa64

  • C:\Windows\SysWOW64\DamageControl.scr

    Filesize

    52KB

    MD5

    2b1c6494c471b0ad336e3d9ce8c934f0

    SHA1

    80d42b6a617cebfe2c0668b482b87f8742485f9f

    SHA256

    c46b7fe7ca962ffc011e0f356dc0c5e80d4727d3a2057c33bbb443e67f7e4420

    SHA512

    21996e570ee4160cb370a6e9a6829f52c3c650b3f47359df1eef1e258edabcded91f120561e7a74c37c550ff085f19ee6cb05cc818732733f3fe744dc30c0ed6

  • C:\Windows\SysWOW64\JawsOfLife.exe

    Filesize

    52KB

    MD5

    7bde935e17f6f613e54906db721af635

    SHA1

    7b1ce30f9766b05fe401e6a023d296b15edece39

    SHA256

    778c3165a176efa01eea8045dadc6b6968889918f322b5fd647165e977b49b36

    SHA512

    7e34ae42ee27180bcc41acfb6822635d86041e996b8305b0058b2dc4694c2654d29351d2ed01222202118fb46d49cc17b9a89850093fa3ed3a27637b70cf80e6

  • C:\Windows\SysWOW64\WishfulThinking.exe

    Filesize

    52KB

    MD5

    367c4a003e5e5d7fdf38d41fe7cb1c43

    SHA1

    14695e4b6c1d0dfa665b2e33c1b26935a7570747

    SHA256

    64d30ac58cb78c4f8411576c2bb4a1406d27a6b2b6fa9020b4de944ce4675012

    SHA512

    e6f7249d8ddf44f4496faa64710e99f6a0808ffd7b0adc26b30980965908eb4d35bb4d42a18258779a7ba17376901a1e383a21cb05124e3169c9c2ee662132f8

  • C:\Windows\msvbvm60.dll

    Filesize

    1.4MB

    MD5

    25f62c02619174b35851b0e0455b3d94

    SHA1

    4e8ee85157f1769f6e3f61c0acbe59072209da71

    SHA256

    898288bd3b21d0e7d5f406df2e0b69a5bbfa4f241baf29a2cdf8a3cf4d4619f2

    SHA512

    f4529fd9eca4e4696f7f06874866ff98a1447a9b0d3a20ef0de54d4d694e2497fd39c452f73fab9b8a02962a7b2b88d1e85f6e35c7cbcb9555003c6828bebc3a

  • C:\Windows\nEwb0Rn.exe

    Filesize

    52KB

    MD5

    7872710af387f4155da23d1504b92842

    SHA1

    0fd43329f7cd96e087731b9dc39908bd93fa0c9a

    SHA256

    d45767f77f29f15d2856c4c43505bee518b8253f087b6e05ab137b48ae13fed5

    SHA512

    00a4b213c95c6edced27646167d60411c91bf025d4d399b75fd1be778d6c991c042fe227266287800582650cc855d98ffcaaa34306d0ec0addbfcfd58f1f2406

  • C:\about.htm

    Filesize

    2KB

    MD5

    94c0c5518c4f4bb044842a006d04932a

    SHA1

    23d9a914f6681d65e2b1faa171f4cf492562ebdb

    SHA256

    224c4e5cdc0e7495c5fb5d1f52d76807092b5cc2d0a7c95fa612ff7b1412706e

    SHA512

    79cb2cd9e19ac3cc8bd94f1a20369e61224f8db02bc04d1f5768d62163b68467a3d317808a942bc7cca6ca84c221bb54a76e097f543c88bb89f0a3c9534ff3bb

  • C:\desktop.ini

    Filesize

    222B

    MD5

    b78e2c99b0e66f6f6accbebdaa4d8442

    SHA1

    a546aaed8820b44437538600deba9d08a4a11ddc

    SHA256

    59e9ccbcb65a03c7965b93c758e4562ff8ddd5500b8ec1b66811f9b62744b2ca

    SHA512

    82d09d87f8dffbc9c261b8d9dc9437350638197430ecee513bf1803ad18db3b939c56141e970d0d9523c93befebd1e76743b860d9dfd2072280becdf5aa2fc6e

  • C:\nEwb0Rn.exe

    Filesize

    52KB

    MD5

    577fdc00bffffd5df137989f12d1a621

    SHA1

    907bffbbf29369af261028f5d4346d9fbd3c51d3

    SHA256

    e9aa54367a75b21f04267efb8de1c6e8218551bcdc4374fcdb8794debb7df0fc

    SHA512

    0d4555c5793b7f06b1e69de659d67c0109f702a0bdd99f1381914b5f5b1e276aae828513a89820ae75c51b04fa2021e04e81ebffc03b474d5868b49bbce560d9

  • C:\nEwb0Rn\Folder.htt

    Filesize

    640B

    MD5

    5d142e7978321fde49abd9a068b64d97

    SHA1

    70020fcf7f3d6dafb6c8cd7a55395196a487bef4

    SHA256

    fe222b08327bbfb35cbd627c0526ba7b5755b02ce0a95823a4c0bf58e601d061

    SHA512

    2351284652a9a1b35006baf4727a85199406e464ac33cb4701a6182e1076aaff022c227dbe4ad6e916eba15ebad08b10719a8e86d5a0f89844a163a7d4a7bbf9

  • memory/376-311-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1056-186-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1056-166-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1468-99-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1468-0-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1964-269-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1964-286-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2164-252-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2368-187-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2368-247-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2948-272-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3144-244-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3144-76-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3144-453-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3148-257-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3148-89-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3148-455-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3224-314-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3468-456-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3468-263-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3636-256-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3636-279-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3696-143-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3696-130-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4148-249-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4148-203-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4228-255-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4228-81-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4228-454-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4588-316-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4592-275-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4768-288-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4768-282-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4840-277-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4856-250-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB