Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 00:18
Static task
static1
Behavioral task
behavioral1
Sample
9e782f0c498349e55c5596cb7f716d73d40056e866813e4e3373052550388149.dll
Resource
win7-20240729-en
General
-
Target
9e782f0c498349e55c5596cb7f716d73d40056e866813e4e3373052550388149.dll
-
Size
120KB
-
MD5
d6eeea0d6145e6796832358a235730c3
-
SHA1
fbbd384c89e6b797fe683530680e76c95a1ce72f
-
SHA256
9e782f0c498349e55c5596cb7f716d73d40056e866813e4e3373052550388149
-
SHA512
0b3a5fbaa2080778723dac75470615efa6020cb1813c679a49da03378dcae9d9f403eac6f56917e8e87c5cd50cf1bb225484fd8086198781a1b173afabbf28bb
-
SSDEEP
3072:8w4tG3sMe/ZEwR7TDOsICQZ7SIcalccNly31HJ:3eqwRnhICQ5V/pNlWJ
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f774099.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f775c43.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f775c43.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" f775c43.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" f774099.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" f774099.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f774099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f775c43.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f775c43.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f775c43.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f774099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f774099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f774099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f775c43.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f775c43.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f775c43.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f774099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f774099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f774099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f775c43.exe -
Executes dropped EXE 3 IoCs
pid Process 2696 f774099.exe 2600 f77423e.exe 2960 f775c43.exe -
Loads dropped DLL 6 IoCs
pid Process 2084 rundll32.exe 2084 rundll32.exe 2084 rundll32.exe 2084 rundll32.exe 2084 rundll32.exe 2084 rundll32.exe -
resource yara_rule behavioral1/memory/2696-18-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/2696-21-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/2696-22-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/2696-20-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/2696-19-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/2696-16-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/2696-24-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/2696-15-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/2696-13-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/2696-17-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/2696-64-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/2696-23-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/2696-65-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/2696-66-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/2696-67-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/2696-68-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/2696-70-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/2696-71-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/2696-85-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/2696-87-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/2696-88-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/2696-90-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/2696-162-0x00000000005A0000-0x000000000165A000-memory.dmp upx behavioral1/memory/2960-174-0x0000000000A00000-0x0000000001ABA000-memory.dmp upx behavioral1/memory/2960-218-0x0000000000A00000-0x0000000001ABA000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f774099.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f774099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f775c43.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc f775c43.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" f774099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f774099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f774099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f774099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f775c43.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" f774099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" f775c43.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" f775c43.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" f775c43.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" f775c43.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f775c43.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f774099.exe -
Enumerates connected drives 3 TTPs 17 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: f774099.exe File opened (read-only) \??\E: f775c43.exe File opened (read-only) \??\T: f774099.exe File opened (read-only) \??\G: f774099.exe File opened (read-only) \??\O: f774099.exe File opened (read-only) \??\Q: f774099.exe File opened (read-only) \??\S: f774099.exe File opened (read-only) \??\P: f774099.exe File opened (read-only) \??\R: f774099.exe File opened (read-only) \??\G: f775c43.exe File opened (read-only) \??\E: f774099.exe File opened (read-only) \??\J: f774099.exe File opened (read-only) \??\L: f774099.exe File opened (read-only) \??\N: f774099.exe File opened (read-only) \??\I: f774099.exe File opened (read-only) \??\K: f774099.exe File opened (read-only) \??\M: f774099.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\f7740e7 f774099.exe File opened for modification C:\Windows\SYSTEM.INI f774099.exe File created C:\Windows\f779109 f775c43.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f774099.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f775c43.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2696 f774099.exe 2696 f774099.exe 2960 f775c43.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 2696 f774099.exe Token: SeDebugPrivilege 2696 f774099.exe Token: SeDebugPrivilege 2696 f774099.exe Token: SeDebugPrivilege 2696 f774099.exe Token: SeDebugPrivilege 2696 f774099.exe Token: SeDebugPrivilege 2696 f774099.exe Token: SeDebugPrivilege 2696 f774099.exe Token: SeDebugPrivilege 2696 f774099.exe Token: SeDebugPrivilege 2696 f774099.exe Token: SeDebugPrivilege 2696 f774099.exe Token: SeDebugPrivilege 2696 f774099.exe Token: SeDebugPrivilege 2696 f774099.exe Token: SeDebugPrivilege 2696 f774099.exe Token: SeDebugPrivilege 2696 f774099.exe Token: SeDebugPrivilege 2696 f774099.exe Token: SeDebugPrivilege 2696 f774099.exe Token: SeDebugPrivilege 2696 f774099.exe Token: SeDebugPrivilege 2696 f774099.exe Token: SeDebugPrivilege 2696 f774099.exe Token: SeDebugPrivilege 2696 f774099.exe Token: SeDebugPrivilege 2696 f774099.exe Token: SeDebugPrivilege 2696 f774099.exe Token: SeDebugPrivilege 2696 f774099.exe Token: SeDebugPrivilege 2960 f775c43.exe Token: SeDebugPrivilege 2960 f775c43.exe Token: SeDebugPrivilege 2960 f775c43.exe Token: SeDebugPrivilege 2960 f775c43.exe Token: SeDebugPrivilege 2960 f775c43.exe Token: SeDebugPrivilege 2960 f775c43.exe Token: SeDebugPrivilege 2960 f775c43.exe Token: SeDebugPrivilege 2960 f775c43.exe Token: SeDebugPrivilege 2960 f775c43.exe Token: SeDebugPrivilege 2960 f775c43.exe Token: SeDebugPrivilege 2960 f775c43.exe Token: SeDebugPrivilege 2960 f775c43.exe Token: SeDebugPrivilege 2960 f775c43.exe Token: SeDebugPrivilege 2960 f775c43.exe Token: SeDebugPrivilege 2960 f775c43.exe Token: SeDebugPrivilege 2960 f775c43.exe Token: SeDebugPrivilege 2960 f775c43.exe Token: SeDebugPrivilege 2960 f775c43.exe Token: SeDebugPrivilege 2960 f775c43.exe Token: SeDebugPrivilege 2960 f775c43.exe Token: SeDebugPrivilege 2960 f775c43.exe Token: SeDebugPrivilege 2960 f775c43.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2640 wrote to memory of 2084 2640 rundll32.exe 30 PID 2640 wrote to memory of 2084 2640 rundll32.exe 30 PID 2640 wrote to memory of 2084 2640 rundll32.exe 30 PID 2640 wrote to memory of 2084 2640 rundll32.exe 30 PID 2640 wrote to memory of 2084 2640 rundll32.exe 30 PID 2640 wrote to memory of 2084 2640 rundll32.exe 30 PID 2640 wrote to memory of 2084 2640 rundll32.exe 30 PID 2084 wrote to memory of 2696 2084 rundll32.exe 31 PID 2084 wrote to memory of 2696 2084 rundll32.exe 31 PID 2084 wrote to memory of 2696 2084 rundll32.exe 31 PID 2084 wrote to memory of 2696 2084 rundll32.exe 31 PID 2696 wrote to memory of 1100 2696 f774099.exe 19 PID 2696 wrote to memory of 1156 2696 f774099.exe 20 PID 2696 wrote to memory of 1196 2696 f774099.exe 21 PID 2696 wrote to memory of 1684 2696 f774099.exe 25 PID 2696 wrote to memory of 2640 2696 f774099.exe 29 PID 2696 wrote to memory of 2084 2696 f774099.exe 30 PID 2696 wrote to memory of 2084 2696 f774099.exe 30 PID 2084 wrote to memory of 2600 2084 rundll32.exe 32 PID 2084 wrote to memory of 2600 2084 rundll32.exe 32 PID 2084 wrote to memory of 2600 2084 rundll32.exe 32 PID 2084 wrote to memory of 2600 2084 rundll32.exe 32 PID 2084 wrote to memory of 2960 2084 rundll32.exe 33 PID 2084 wrote to memory of 2960 2084 rundll32.exe 33 PID 2084 wrote to memory of 2960 2084 rundll32.exe 33 PID 2084 wrote to memory of 2960 2084 rundll32.exe 33 PID 2696 wrote to memory of 1100 2696 f774099.exe 19 PID 2696 wrote to memory of 1156 2696 f774099.exe 20 PID 2696 wrote to memory of 1196 2696 f774099.exe 21 PID 2696 wrote to memory of 1684 2696 f774099.exe 25 PID 2696 wrote to memory of 2600 2696 f774099.exe 32 PID 2696 wrote to memory of 2600 2696 f774099.exe 32 PID 2696 wrote to memory of 2960 2696 f774099.exe 33 PID 2696 wrote to memory of 2960 2696 f774099.exe 33 PID 2960 wrote to memory of 1100 2960 f775c43.exe 19 PID 2960 wrote to memory of 1156 2960 f775c43.exe 20 PID 2960 wrote to memory of 1196 2960 f775c43.exe 21 PID 2960 wrote to memory of 1684 2960 f775c43.exe 25 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f774099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" f775c43.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1100
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1156
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9e782f0c498349e55c5596cb7f716d73d40056e866813e4e3373052550388149.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9e782f0c498349e55c5596cb7f716d73d40056e866813e4e3373052550388149.dll,#13⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\f774099.exeC:\Users\Admin\AppData\Local\Temp\f774099.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2696
-
-
C:\Users\Admin\AppData\Local\Temp\f77423e.exeC:\Users\Admin\AppData\Local\Temp\f77423e.exe4⤵
- Executes dropped EXE
PID:2600
-
-
C:\Users\Admin\AppData\Local\Temp\f775c43.exeC:\Users\Admin\AppData\Local\Temp\f775c43.exe4⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2960
-
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1684
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257B
MD5dd10e76064d579ef3f0108bd4500163d
SHA16810967369f85728239af6d2018ee69065bb4a70
SHA256bca9828e4e353afb5064dcf6066881128633ce3f20dddbb759e3019a8df8f28f
SHA5127eff5bf663a1678fc68b6d0dc8bd6e1099226b1409ad264bda62ecdcb48326eee008b2b16c1aba547573db58d78b540e7b246d0433cc4695559c4d9ccf06e908
-
Filesize
97KB
MD5baaac6da9db3a8e120f555544d79ee14
SHA15b651e29531e3c9e4f6e567595394feb9c30eb74
SHA25642cfd9dcd8172469c94bacfec145a82a95c5e9773c3af8b81ff779332e4b8735
SHA51255a2df0e7f9ca2514175cea16a86fefeb0621bf7e9d1d16d20d905fedfa61753211249af076b29b12dde7b3b733f4021c2209d6339ceb18fbde0684ecff3aa7b