Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/10/2024, 05:12
Static task
static1
Behavioral task
behavioral1
Sample
0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe
Resource
win10v2004-20241007-en
General
-
Target
0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe
-
Size
1.8MB
-
MD5
8ae84d125b4d3cca4b310a9f519747a0
-
SHA1
9f28f6eecb9ce84bd918f22c9af5f6e102ef6e57
-
SHA256
0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283b
-
SHA512
15268db416f0bcc2512f7f62d95903ea559f8e2fe697adcfc05067a03453d1b3c748040882010ed565bda1ee6f2fad92c1c24a88c369ed81ccfc776236f40d49
-
SSDEEP
24576:bMbXdVtTj2i64T+jdxQCfgOFD3WSwd2QtBBw6xxhVxQtmibjOhZaiRu/4oMaop0P:bMhbTChxKCnFnQXBbrtgb/iQvu0UHOaE
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe -
Executes dropped EXE 3 IoCs
pid Process 2224 @AE784B.tmp.exe 2760 0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe 2232 WdExt.exe -
Loads dropped DLL 7 IoCs
pid Process 2088 explorer.exe 2088 explorer.exe 2224 @AE784B.tmp.exe 2088 explorer.exe 2220 cmd.exe 2220 cmd.exe 2232 WdExt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @AE784B.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WdExt.exe -
Modifies registry class 27 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff 0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 7e0074001c0043465346160031000000000000000000100041707044617461000000741a595e96dfd3488d671733bcee28bac5cdfadf9f6756418947c5c76bc0b67f3c0008000400efbe00000000000000002a000000000000000000000000000000000000000000000000004100700070004400610074006100000042000000 0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f44471a0359723fa74489c55595fe6b30ee0000 0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4a0031000000000000000000100054656d700000360008000400efbe00000000000000002a00000000000000000000000000000000000000000000000000540065006d007000000014000000 0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU 0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff 0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 4c003100000000000000000010004c6f63616c00380008000400efbe00000000000000002a000000000000000000000000000000000000000000000000004c006f00630061006c00000014000000 0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 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 0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_Classes\Local Settings 0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff 0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\NodeSlot = "1" 0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = ffffffff 0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots 0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff 0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell 0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff 0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff 0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell 0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags 0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" 0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2224 @AE784B.tmp.exe 2232 WdExt.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2088 2936 0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe 30 PID 2936 wrote to memory of 2088 2936 0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe 30 PID 2936 wrote to memory of 2088 2936 0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe 30 PID 2936 wrote to memory of 2088 2936 0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe 30 PID 2936 wrote to memory of 2088 2936 0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe 30 PID 2936 wrote to memory of 2088 2936 0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe 30 PID 2088 wrote to memory of 2224 2088 explorer.exe 31 PID 2088 wrote to memory of 2224 2088 explorer.exe 31 PID 2088 wrote to memory of 2224 2088 explorer.exe 31 PID 2088 wrote to memory of 2224 2088 explorer.exe 31 PID 2088 wrote to memory of 2760 2088 explorer.exe 32 PID 2088 wrote to memory of 2760 2088 explorer.exe 32 PID 2088 wrote to memory of 2760 2088 explorer.exe 32 PID 2088 wrote to memory of 2760 2088 explorer.exe 32 PID 2224 wrote to memory of 2220 2224 @AE784B.tmp.exe 33 PID 2224 wrote to memory of 2220 2224 @AE784B.tmp.exe 33 PID 2224 wrote to memory of 2220 2224 @AE784B.tmp.exe 33 PID 2224 wrote to memory of 2220 2224 @AE784B.tmp.exe 33 PID 2224 wrote to memory of 2580 2224 @AE784B.tmp.exe 34 PID 2224 wrote to memory of 2580 2224 @AE784B.tmp.exe 34 PID 2224 wrote to memory of 2580 2224 @AE784B.tmp.exe 34 PID 2224 wrote to memory of 2580 2224 @AE784B.tmp.exe 34 PID 2220 wrote to memory of 2232 2220 cmd.exe 37 PID 2220 wrote to memory of 2232 2220 cmd.exe 37 PID 2220 wrote to memory of 2232 2220 cmd.exe 37 PID 2220 wrote to memory of 2232 2220 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe"C:\Users\Admin\AppData\Local\Temp\0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\@AE784B.tmp.exe"C:\Users\Admin\AppData\Local\Temp\@AE784B.tmp.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin0.bat" "4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2232
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:2580
-
-
-
C:\Users\Admin\AppData\Local\Temp\0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe"C:\Users\Admin\AppData\Local\Temp\0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe"3⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2760
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\0b84008fd4237fdd2a952ba968aec2b0e429801cbab4a016ee32db6e4eeb283bN.exe
Filesize98KB
MD5bc1632e3622b50f0c3229eab9f9887d9
SHA1bad1291ae3c33bfed2288b3ea4a30d6c52dc7d02
SHA2564be220fe98d5e6743e8031292df3bfddd9d32f1600ef5c8854b4f90bdb19ef05
SHA5123df7c3cef642fddad2a7e2be2a7fb8ee7690493ae299f7222aa5375fbcbe7289a20dab645d498a06024f86bfa8a98b99fb122bdaddfe7cd080b717496b0e6d9e
-
Filesize
1.0MB
MD5df2c63605573c2398d796370c11cb26c
SHA1efba97e2184ba3941edb008fcc61d8873b2b1653
SHA25607ffcde2097d0af67464907fec6a4079b92da11583013bae7d3313fa32312fe8
SHA512d9726e33fcfa96415cc906bdb1b0e53eba674eaf30ed77d41d245c1c59aa53e222246f691d82fa3a45f049fbf23d441768f9da21370e489232770ad5ae91d32f
-
Filesize
129B
MD5d1073c9b34d1bbd570928734aacff6a5
SHA178714e24e88d50e0da8da9d303bec65b2ee6d903
SHA256b3c704b1a728004fc5e25899d72930a7466d7628dd6ddd795b3000897dfa4020
SHA5124f2b9330e30fcc55245dc5d12311e105b2b2b9d607fbfc4a203c69a740006f0af58d6a01e2da284575a897528da71a2e61a7321034755b78feb646c8dd12347f
-
Filesize
196B
MD5237abb5bd9d8cdb8a7bc3749181f4aaa
SHA12d5cc9ac022c7bda30235f240847896cee9266a9
SHA256d82acb8439ce0ab114700c7647ea4f5ed816d1dbad6308d023ed050ffbaef061
SHA51250c00c6f4c6b763aa0deefa18e46ccbd714735043a9f2f7ab16e12419ffd703427781909a37a8290f029aee452dd7b167b0efdd75d51d27530f9f5fac0563944
-
Filesize
1.7MB
MD51ff1843e6a7eead8d84d5782d8be0a8c
SHA149056c9a4c7deac17948549a76456011efc5447b
SHA2563629d15c90e8c7b0b2b127b1dcc5da9ae5e0458804468406e5816db165d745cc
SHA512a0c21b5f288a4ca935960260217890491bae9625e0fabc1040cf4aa5d53971bd0d87f171df0866b28db4e478ca37b322c034fbc36501452c94f3a4a4be57079b
-
Filesize
1.7MB
MD5c4cd9abdd1829b9e54886aa1bec9fc8b
SHA16d3c2a02924d31126a5189a2957edf238111c624
SHA25684d298402b5591f447ffd64c8ae8ec4e50306ae816f7ab869b1b9a6c4989950d
SHA512134fb86aa6ddb5f1ed103e4f916049ef1787c9a9d4bdfd1d0b3db0ebe7be929b817013bf5d72918983b6b30f41406568dddbe16e5a78755730a02ac6001f90b4
-
Filesize
202KB
MD57ff15a4f092cd4a96055ba69f903e3e9
SHA1a3d338a38c2b92f95129814973f59446668402a8
SHA2561b594e6d057c632abb3a8cf838157369024bd6b9f515ca8e774b22fe71a11627
SHA5124b015d011c14c7e10568c09bf81894681535efb7d76c3ef9071fffb3837f62b36e695187b2d32581a30f07e79971054e231a2ca4e8ad7f0f83d5876f8c086dae