Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2022, 19:51

General

  • Target

    ece507d87a5b2732818a270942864957.exe

  • Size

    124KB

  • MD5

    ece507d87a5b2732818a270942864957

  • SHA1

    4fc0c57622b928125b55dcaaba92d966f9703789

  • SHA256

    01f95e3eacbfef97fd73836f0cc2702dff49fc1da1283afb02231586064e6967

  • SHA512

    e28d3aa2dc16624d0b8f2572eddcb6283b9d48bd0e8f3fc68711ede45226721029891bdbf6006cfb69bb5826a300a6691691b094db54fc25f2dd9bfec4a6b26f

  • SSDEEP

    3072:g1i/NU8bOMYcYYcmy5cU+gTn6HOjDhWrzvvQwlgOks5YmMOMYcYY51i/NU8F:Oi/NjO5YBgegD0PHzSv3Oai/NN

Malware Config

Signatures

  • joker

    Joker is an Android malware that targets billing and SMS fraud.

  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies Internet Explorer start page 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ece507d87a5b2732818a270942864957.exe
    "C:\Users\Admin\AppData\Local\Temp\ece507d87a5b2732818a270942864957.exe"
    1⤵
    • Modifies Installed Components in the registry
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies Internet Explorer start page
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1788
    • C:\Program Files\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://www.212ok.com/Gbook.asp?qita
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1780
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1780 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2020
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://www.ymtuku.com/xg/?tan
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      PID:1996
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1996 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2004
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:776
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h "C:\Documents and Settings\All Users\桌面\Internet Explorer.lnk"
        3⤵
        • Views/modifies file attributes
        PID:876
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1348
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h "C:\Documents and Settings\Admin\桌面\Internet Explorer.lnk"
        3⤵
        • Views/modifies file attributes
        PID:1320
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:824
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\启动 Internet Explorer 浏览器.lnk"
        3⤵
        • Views/modifies file attributes
        PID:1796
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1488
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h "C:\Documents and Settings\Admin\Application Data\Microsoft\Internet Explorer\Quick Launch\Internet Explorer.lnk"
        3⤵
        • Views/modifies file attributes
        PID:1872
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1496
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h "C:\Documents and Settings\Admin\「开始」菜单\程序\Internet Explorer.lnk"
        3⤵
        • Views/modifies file attributes
        PID:1100
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c attrib +h "C:\WINDOWS\windows.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2000
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h "C:\WINDOWS\windows.exe"
        3⤵
        • Drops file in Windows directory
        • Views/modifies file attributes
        PID:1120
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c attrib +h "c:\system.exe"
      2⤵
        PID:632
        • C:\Windows\SysWOW64\attrib.exe
          attrib +h "c:\system.exe"
          3⤵
          • Views/modifies file attributes
          PID:1484

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      60KB

      MD5

      6c6a24456559f305308cb1fb6c5486b3

      SHA1

      3273ac27d78572f16c3316732b9756ebc22cb6ed

      SHA256

      efc3c579bd619ceab040c4b8c1b821b2d82c64fddd9e80a00ec0d7f6577ed973

      SHA512

      587d4a9175a6aa82cd8bb1c11ca6508f95cd218f76ac322ddbd1bc7146a0e25f8937ee426a6fb0fb0bb045cedb24d8c8a9edfe9f654112f293d8701220f726b4

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      93fa2bcfb16847b478289ffab7813417

      SHA1

      2873647a323fbc64019f2ba43d56fb113583e494

      SHA256

      fa0180d279d491435f3d76e5098ed857a2a28501cdf4e11009ffccda7a0b4c49

      SHA512

      7c8f83e4037067c008c61270e12c4e01bc082dc627c33c3dd37eb65baf7ad626bc418c7e1c340432e28ce15105c536c09632893ac87fdb35b7c1812db31bf613

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{769D25B1-2FC0-11ED-9AD4-7A3897842414}.dat

      Filesize

      5KB

      MD5

      bcb5ba7c6e1f6d9d1c9d56ae8edcc825

      SHA1

      2cb0afdc98344eb2161ab3cdd47f9adc641bc301

      SHA256

      b568dadf673621209e5350e89cd863a8a60f1d29b924f63f9d19102ad0099d87

      SHA512

      eda8550f792d8d400b39e7e061b9ca503d3cc6f1af346794ea68adebde63ae8d109399e3a39aa6167aa955c5f8b6f30007126cdc6df9b0782d82ca275ab0d79f

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\lwrmjt1\imagestore.dat

      Filesize

      5KB

      MD5

      e2e612a75a7c47ab342cc89518f1f896

      SHA1

      edcef0c5bb6c7ae3523fdf2209e96abda3c65341

      SHA256

      b0fd022b0cc26404b689c7f64428d7f07adbe7faca850aedcfcda5828b351183

      SHA512

      5f99670caa87a5ca091ab1ea0b695ad36fb515ba5051c8a3608f9cd5656031ed097182700210f2ae5e7db82bb2cc1d148d8c9175bac0e477de84d53595d8fd1d

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\HE7CZEND.txt

      Filesize

      603B

      MD5

      c5a1ddb9a2a6265e0d68f9c0535ca8d0

      SHA1

      9d007b260c691498672482531ad92382f1ec95f6

      SHA256

      18e3c8e8c3ea9ada0fbd79ba059c35d73e40ff2ef51bc80ae45d19653a8b4068

      SHA512

      dc9a6fed82afcb0e3a1429ae648ba83f3e4c56cf0b888bc04ab73ae4c6ebdd1ba6f10d13b0cb29e1393b6a0f8f44078b8bc01653737d45733ac3069a276e4aa0

    • C:\WINDOWS\windows.exe

      Filesize

      124KB

      MD5

      b1a57492cf58ff703d03956d38e7c4ce

      SHA1

      fc8d40cd3bd8e7ddb939c08bdfe9b2c0fbbd2f18

      SHA256

      e7d6089f835684b2d0a2e040732733a5ac0e19934dde5fd6a0951a6edacf2a1e

      SHA512

      7c418922b5d7dc2a1ea9e034733c3fb32070c65b745b313c12f27c5ed671ecc8ea145cdfe261fa08ac57e1a68d0eda4e4b3321f83b2a596e93dec2d822409d5e

    • C:\system.exe

      Filesize

      124KB

      MD5

      80f7ce8031b146b0725cd92fc4cf3314

      SHA1

      35e345f28c9f1417e63f5fff2b5083b33bfe55ad

      SHA256

      81c79e5e2d5f63259303af71407990c8b65129e5f21ea93cd315f43311356437

      SHA512

      4a0d9b080377ecdff7f637b472efa8ad1e12ae740fbc38c26c01412e33ab25743fd7486781aa7cf95f1c49392b86042b295b7ad7129c9466ba0eb49348a925f5

    • memory/1788-56-0x0000000076321000-0x0000000076323000-memory.dmp

      Filesize

      8KB