Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
38s -
max time network
39s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/10/2024, 22:35
Static task
static1
Behavioral task
behavioral1
Sample
02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe
Resource
win10v2004-20241007-en
Errors
General
-
Target
02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe
-
Size
234KB
-
MD5
52388efef65151557e386d2829247b20
-
SHA1
3258e556cd6e3b6a7941dbe3494c060b63448557
-
SHA256
02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6
-
SHA512
dc829f5cdc3a8bf618aade862a3920bfc2e88146dd3d85d76e5cf4d36331ac43c6fc7944bd17178fc48fc97c013f9d1eb46c4e9a375c3b2f0708341e9cf4ee6f
-
SSDEEP
384:PJG14lR/NpKAN+UJfo8vJh/7neuwyv3ZUKcreuDreuwyv3ZUKcreuDj:RFtFe8vJtDeunUreufeunUreuP
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe -
Disables Task Manager via registry modification
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Winsys = "C:\\Windows\\system32\\winsock.exe /wininit" 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Win32 = "C:\\Windows\\system32\\winkernel32.exe /system" 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe -
Modifies WinLogon 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Micromerde Windobe Xnaze" 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "Vous utilisez Super Winmerde" 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\LogonPrompt = "Entre ton passss !" 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Welcome = "Salut pti blairo !" 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\winkernel32.exe 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe File opened for modification C:\Windows\SysWOW64\winkernel32.exe attrib.exe File created C:\Windows\SysWOW64\winsock.exe 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe File opened for modification C:\Windows\SysWOW64\winsock.exe attrib.exe -
Hide Artifacts: Hidden Files and Directories 1 TTPs 2 IoCs
pid Process 1600 cmd.exe 2608 cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language shutdown.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window Title = "Vive Les Marmottes qui chantent !" 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.webfmdr.com/B/" 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2660 shutdown.exe Token: SeRemoteShutdownPrivilege 2660 shutdown.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2792 wrote to memory of 1600 2792 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe 28 PID 2792 wrote to memory of 1600 2792 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe 28 PID 2792 wrote to memory of 1600 2792 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe 28 PID 2792 wrote to memory of 1600 2792 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe 28 PID 1600 wrote to memory of 3004 1600 cmd.exe 30 PID 1600 wrote to memory of 3004 1600 cmd.exe 30 PID 1600 wrote to memory of 3004 1600 cmd.exe 30 PID 1600 wrote to memory of 3004 1600 cmd.exe 30 PID 2792 wrote to memory of 2608 2792 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe 31 PID 2792 wrote to memory of 2608 2792 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe 31 PID 2792 wrote to memory of 2608 2792 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe 31 PID 2792 wrote to memory of 2608 2792 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe 31 PID 2608 wrote to memory of 2752 2608 cmd.exe 33 PID 2608 wrote to memory of 2752 2608 cmd.exe 33 PID 2608 wrote to memory of 2752 2608 cmd.exe 33 PID 2608 wrote to memory of 2752 2608 cmd.exe 33 PID 2792 wrote to memory of 2132 2792 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe 34 PID 2792 wrote to memory of 2132 2792 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe 34 PID 2792 wrote to memory of 2132 2792 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe 34 PID 2792 wrote to memory of 2132 2792 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe 34 PID 2132 wrote to memory of 2660 2132 cmd.exe 36 PID 2132 wrote to memory of 2660 2132 cmd.exe 36 PID 2132 wrote to memory of 2660 2132 cmd.exe 36 PID 2132 wrote to memory of 2660 2132 cmd.exe 36 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\NoColorChoice = "1" 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\NoSizeChoice = "1" 02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2752 attrib.exe 3004 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe"C:\Users\Admin\AppData\Local\Temp\02b6675eedc6f5f6fa88bae5e331131c6900501e5b543ff16f839320f6d33cb6N.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Adds Run key to start application
- Modifies WinLogon
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2792 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h +s "C:\Windows\system32\winsock.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\attrib.exeattrib +h +s "C:\Windows\system32\winsock.exe"3⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3004
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h +s "C:\Windows\system32\winkernel32.exe"2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\attrib.exeattrib +h +s "C:\Windows\system32\winkernel32.exe"3⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2752
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c shutdown -r2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\shutdown.exeshutdown -r3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:580
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2824
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258KB
MD5f2e15b52a3cdc16e2e0a241e7b7af12b
SHA15fc354c6e2199d8178a7512ef16c56d2b87be372
SHA25693becf493f79d3a981b1ecdb6d4cf8bd13dcf980ebc6a2dc8e4a27e01c2e8c1f
SHA51261a155f138106fab98110fd8e204b9f33898fb25f32e46e1e60512a2a2a79fe5ce078f798db39db7ced47bfa411d681a7847768ab39a132ccaefd44d0786a740