Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/09/2022, 17:02

General

  • Target

    https://www.uops-uetdniu.us

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://www.uops-uetdniu.us
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1364
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1364 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:392
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1364 CREDAT:82950 /prefetch:2
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Modifies Internet Explorer settings
      PID:4344
  • C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
    C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe
    1⤵
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4844

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\dqptnfu\imagestore.dat

    Filesize

    1KB

    MD5

    001c74523b65f9c55401d29df3f2b5b9

    SHA1

    bee671e2c4870e4b95e171f0e88e0f918d165754

    SHA256

    4828306da61860491824f0932f8cbb0c373bc934bbe2a92f3a4b150589f60df9

    SHA512

    337dff985d2021cff2798e194dca73c7a5d7705dcfcd30a24db270a037c3c41d878079bb2c112f48ff7e1c60253263d5c76e32f5432fcd7abb53bb3c1c948dff

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\26HZJLHZ\favicon[2].ico

    Filesize

    1KB

    MD5

    178819cc32a7774822e3550c57cd20aa

    SHA1

    c8050ec440e8cc1367a6115934edc0bf94a0d343

    SHA256

    8565aaa87282f585b8a021ee0e693f662eb179df62890d01e086cc9f23dec1d2

    SHA512

    794c0578a7521c093c27a5592ab6f4874742f6db4c53e9b0b07acfecabf8575117ff1808ff0f0426594f4981f5933c756647b146b7ac815decaa9c5fcec246fa