Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 18:00
Static task
static1
Behavioral task
behavioral1
Sample
b042426e8a30b6ecf6e44f2b21138560N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b042426e8a30b6ecf6e44f2b21138560N.exe
Resource
win10v2004-20240910-en
General
-
Target
b042426e8a30b6ecf6e44f2b21138560N.exe
-
Size
82KB
-
MD5
b042426e8a30b6ecf6e44f2b21138560
-
SHA1
99f9e5a21b4719cb9b4627897d398fe083e8cade
-
SHA256
be58a027ae8df7933a92acd5190c1e2775c3e4137e126fd1456b01c0b4a6f069
-
SHA512
dc86c047cd17d27832cdbf2ded7f65fa93047622d9b87ace822fd9d5dc2586aed086f1b67f23708d4336b955df9d87b42eb52dfe4682432d3b8730a98cfca4e5
-
SSDEEP
1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOzr9/q9:GhfxHNIreQm+Hi8r9/q9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2744 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 2932 b042426e8a30b6ecf6e44f2b21138560N.exe 2932 b042426e8a30b6ecf6e44f2b21138560N.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command b042426e8a30b6ecf6e44f2b21138560N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" b042426e8a30b6ecf6e44f2b21138560N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" b042426e8a30b6ecf6e44f2b21138560N.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\notepad¢¬.exe b042426e8a30b6ecf6e44f2b21138560N.exe File opened for modification C:\Windows\SysWOW64\¢«.exe b042426e8a30b6ecf6e44f2b21138560N.exe File created C:\Windows\SysWOW64\¢«.exe b042426e8a30b6ecf6e44f2b21138560N.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe b042426e8a30b6ecf6e44f2b21138560N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe b042426e8a30b6ecf6e44f2b21138560N.exe File created C:\Windows\system\rundll32.exe b042426e8a30b6ecf6e44f2b21138560N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b042426e8a30b6ecf6e44f2b21138560N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\MSipv b042426e8a30b6ecf6e44f2b21138560N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" b042426e8a30b6ecf6e44f2b21138560N.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command b042426e8a30b6ecf6e44f2b21138560N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command b042426e8a30b6ecf6e44f2b21138560N.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1726336803" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" b042426e8a30b6ecf6e44f2b21138560N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" b042426e8a30b6ecf6e44f2b21138560N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" b042426e8a30b6ecf6e44f2b21138560N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1726336803" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2932 b042426e8a30b6ecf6e44f2b21138560N.exe 2932 b042426e8a30b6ecf6e44f2b21138560N.exe 2932 b042426e8a30b6ecf6e44f2b21138560N.exe 2932 b042426e8a30b6ecf6e44f2b21138560N.exe 2932 b042426e8a30b6ecf6e44f2b21138560N.exe 2932 b042426e8a30b6ecf6e44f2b21138560N.exe 2932 b042426e8a30b6ecf6e44f2b21138560N.exe 2932 b042426e8a30b6ecf6e44f2b21138560N.exe 2932 b042426e8a30b6ecf6e44f2b21138560N.exe 2932 b042426e8a30b6ecf6e44f2b21138560N.exe 2932 b042426e8a30b6ecf6e44f2b21138560N.exe 2932 b042426e8a30b6ecf6e44f2b21138560N.exe 2932 b042426e8a30b6ecf6e44f2b21138560N.exe 2932 b042426e8a30b6ecf6e44f2b21138560N.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2744 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2932 b042426e8a30b6ecf6e44f2b21138560N.exe 2744 rundll32.exe 2744 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2744 2932 b042426e8a30b6ecf6e44f2b21138560N.exe 30 PID 2932 wrote to memory of 2744 2932 b042426e8a30b6ecf6e44f2b21138560N.exe 30 PID 2932 wrote to memory of 2744 2932 b042426e8a30b6ecf6e44f2b21138560N.exe 30 PID 2932 wrote to memory of 2744 2932 b042426e8a30b6ecf6e44f2b21138560N.exe 30 PID 2932 wrote to memory of 2744 2932 b042426e8a30b6ecf6e44f2b21138560N.exe 30 PID 2932 wrote to memory of 2744 2932 b042426e8a30b6ecf6e44f2b21138560N.exe 30 PID 2932 wrote to memory of 2744 2932 b042426e8a30b6ecf6e44f2b21138560N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b042426e8a30b6ecf6e44f2b21138560N.exe"C:\Users\Admin\AppData\Local\Temp\b042426e8a30b6ecf6e44f2b21138560N.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5c5a219f118245bed951796588f5c3810
SHA108a7449696f37d7328761752d9ba44cde898efba
SHA2569f83c9fb07ec7503eb9dc1409ae20176a4dca9334fe220c3134dc79071321759
SHA512976f810fea22d7261bb9bddedcfff8b163e143fb6b0b6288db73bea0f931f2dd4245a2b22ff724d6ca85048414c691c9264c7bb9e70319276421c07e5392ffe0
-
Filesize
80KB
MD51e2092d5f3f3d884fe671de81e376468
SHA1b41aa683a6c2c342253a2f5fe49b89520958be3e
SHA256ba9b9daeb1976999c96a3de51e2f3aaa75eb37d1094020f9c7ae527913899f8f
SHA512484c55db804e769f1968d835d4d44d9a77d0614ccd44cd2309dcd025685b9b5794820914179636f09c4869eb55b2e38f7fb8683761a03793aa847922d3f7f552