Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
110s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 03:27
Static task
static1
Behavioral task
behavioral1
Sample
a4cf71001f11fcfef6e47f4447d63914aec506a94c777859522f22bce7c6f279.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a4cf71001f11fcfef6e47f4447d63914aec506a94c777859522f22bce7c6f279.exe
Resource
win10v2004-20220812-en
General
-
Target
a4cf71001f11fcfef6e47f4447d63914aec506a94c777859522f22bce7c6f279.exe
-
Size
3.6MB
-
MD5
18989531139c93409dc60bb5256d5915
-
SHA1
5dd4d702ce7c8178161b9bde7c3a5749b29b4c6f
-
SHA256
a4cf71001f11fcfef6e47f4447d63914aec506a94c777859522f22bce7c6f279
-
SHA512
c14ee8ad73727cd08900f2e54e676e2f3e9b8fa8eca753620f0a807ab464098168e4f2dd29671748065b1d7f8ce35adfb1537558a1f967b19406b9f3dd62c17b
-
SSDEEP
98304:Yz1J+xiQdyJxiJqCUH47d47lrrXIHeZOU75lznopm13GjE4U:YC4BZ4Z23XGeflzz3ss
Malware Config
Signatures
-
joker
Joker is an Android malware that targets billing and SMS fraud.
-
Executes dropped EXE 2 IoCs
pid Process 1484 CSOLСҹ-36.0.exe 1908 server.exe -
Loads dropped DLL 7 IoCs
pid Process 240 a4cf71001f11fcfef6e47f4447d63914aec506a94c777859522f22bce7c6f279.exe 240 a4cf71001f11fcfef6e47f4447d63914aec506a94c777859522f22bce7c6f279.exe 240 a4cf71001f11fcfef6e47f4447d63914aec506a94c777859522f22bce7c6f279.exe 240 a4cf71001f11fcfef6e47f4447d63914aec506a94c777859522f22bce7c6f279.exe 624 WerFault.exe 624 WerFault.exe 624 WerFault.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 624 1908 WerFault.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e0f3d159765a7f43b6bf060b4b70c9a30000000002000000000010660000000100002000000003fbaa741da019bc093b6b7a927865ca5fdc237ed26a69bbffde3973fdc02e38000000000e80000000020000200000005cf5295f92a23d4cc195db2fe6d3cc487ad5a78fd73510d7bb7ebc9e8ab12e1d20000000b60874c7237d29004037fe1b423e7d0535aaf773700f7500097e96532ba37f6240000000ffe824808eedaaf3561117415e6253fc64182eb09396e7a92d73e6e3179ce1aca977d5add9b3f4ba24010be0ccd0847a6f38b41127d3590e0814e079b68b9d66 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\92sk.com\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{77072761-37E7-11ED-B19F-72E6D75F6BEB} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.92sk.com\ = "63" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40131d54f4cbd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "63" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\92sk.com\Total = "63" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "370335255" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.92sk.com IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DOMStorage\92sk.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e0f3d159765a7f43b6bf060b4b70c9a3000000000200000000001066000000010000200000006c24163a8413464f09130332544d94abc9ccedbf8fd489cf3a19fdaf4b00691b000000000e80000000020000200000005502c8ba3bdcae90647594ab3e89828b72d9c362285210c41a07ef9b382fb503900000007d24a442d38c9982a49afb92651c795ea64a3eb2eca82ed7bcf552ba065e2f3b6276ff320ee5f8a19981446fa1c66f441c5d7a8eb15c69cadca3e92b6f65a252acff5b7f2b1873cef61a9a20694909d5c089a870c712f0408e8049cef75569624ad748bfc56c128add68562be752e69c0497f0eceac8d6b730745203b2da0922a7e7c9ecd16badebbbfc3fe0b017fc7f40000000b589bd89f4e2c3046510df3e139a1642f98def41d50793cb63811e6796d42dda8b586b62d8b241d5a2ae0719a19a0254fc76308bb7b466de6cf1c36bd9b6f634 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1100 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1484 CSOLСҹ-36.0.exe 1484 CSOLСҹ-36.0.exe 1100 iexplore.exe 1100 iexplore.exe 956 IEXPLORE.EXE 956 IEXPLORE.EXE 956 IEXPLORE.EXE 956 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 240 wrote to memory of 1484 240 a4cf71001f11fcfef6e47f4447d63914aec506a94c777859522f22bce7c6f279.exe 28 PID 240 wrote to memory of 1484 240 a4cf71001f11fcfef6e47f4447d63914aec506a94c777859522f22bce7c6f279.exe 28 PID 240 wrote to memory of 1484 240 a4cf71001f11fcfef6e47f4447d63914aec506a94c777859522f22bce7c6f279.exe 28 PID 240 wrote to memory of 1484 240 a4cf71001f11fcfef6e47f4447d63914aec506a94c777859522f22bce7c6f279.exe 28 PID 240 wrote to memory of 1908 240 a4cf71001f11fcfef6e47f4447d63914aec506a94c777859522f22bce7c6f279.exe 29 PID 240 wrote to memory of 1908 240 a4cf71001f11fcfef6e47f4447d63914aec506a94c777859522f22bce7c6f279.exe 29 PID 240 wrote to memory of 1908 240 a4cf71001f11fcfef6e47f4447d63914aec506a94c777859522f22bce7c6f279.exe 29 PID 240 wrote to memory of 1908 240 a4cf71001f11fcfef6e47f4447d63914aec506a94c777859522f22bce7c6f279.exe 29 PID 1908 wrote to memory of 624 1908 server.exe 30 PID 1908 wrote to memory of 624 1908 server.exe 30 PID 1908 wrote to memory of 624 1908 server.exe 30 PID 1908 wrote to memory of 624 1908 server.exe 30 PID 1484 wrote to memory of 1100 1484 CSOLСҹ-36.0.exe 33 PID 1484 wrote to memory of 1100 1484 CSOLСҹ-36.0.exe 33 PID 1484 wrote to memory of 1100 1484 CSOLСҹ-36.0.exe 33 PID 1484 wrote to memory of 1100 1484 CSOLСҹ-36.0.exe 33 PID 1100 wrote to memory of 956 1100 iexplore.exe 35 PID 1100 wrote to memory of 956 1100 iexplore.exe 35 PID 1100 wrote to memory of 956 1100 iexplore.exe 35 PID 1100 wrote to memory of 956 1100 iexplore.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4cf71001f11fcfef6e47f4447d63914aec506a94c777859522f22bce7c6f279.exe"C:\Users\Admin\AppData\Local\Temp\a4cf71001f11fcfef6e47f4447d63914aec506a94c777859522f22bce7c6f279.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Users\Admin\AppData\Local\Temp\CSOLСҹ-36.0.exe"C:\Users\Admin\AppData\Local\Temp\CSOLСҹ-36.0.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.92sk.com/3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1100 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:956
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\server.exe"C:\Users\Admin\AppData\Local\Temp\server.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1908 -s 363⤵
- Loads dropped DLL
- Program crash
PID:624
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize340B
MD588161a9d92873983ae4d4e15bfcae476
SHA124fb83cfe41b6569e52866e8b916ed674ba5194e
SHA256c6a07afcb38831780700316b76650f47a3b3458631c8bda5a70a7874972b7068
SHA5125f964c22b42d3adb9367ff2b592d1bc5ca6a0396a723c8287d508e68aa74d21b8b1f4eb80ac81ee2aaebf10bbb72b85507a371fe7fa3a906b75ad95faa6bebd8
-
Filesize
6KB
MD523704680d64886b4683058450fba4a67
SHA1e62feddfe921afb3f2599fff4f71b1cf67c7b18d
SHA256642f3e3c81b006169163219fab5b8c1f594332ab6862c5450b6b36bbb60482bc
SHA51288c9d3560951f93805bf1db2ad9293e500ae32dceb948c0b9b783fd100bc09078a903563affc3c1b9c94b0b3c01726b3d31c3688d5814e0950e99dea7465bc59
-
Filesize
3.4MB
MD5a2eda3b79e687837e8fed33ce11c0694
SHA10e99d53481c5813dc23430bb890743daa0c886aa
SHA25608605ba6c34738d1dbc9dac1dbca7a73c48df7cc96ae6ab5ab2518dc0e37c76e
SHA51284e5fe080f6f11d66be2636fc80139b72b2df73b054c67725c6926abbd04ce4a9df263c90103e371aafe421cc34856eeb98a7303c7b0abf4668c87f27152dbbd
-
Filesize
20KB
MD5c10ffff4b4ebcd8ad73dbdb4ca21975e
SHA1f1dc61b7cc11dc5134666f4e0a093fddea04bb28
SHA256b0edeac938ce918571628e76ed329b6b85fef91ce9c0c50530897b35c979417e
SHA512fabc626d53b6f60c3944b3a81d30267a5dcd0f0daeb00858b4bca31085281368567bb6a2fbd4a3370b60591b125a5c3804636887ee2414d098256812a4ca06df
-
Filesize
603B
MD53b4aac5af755b253f42470e477eb9dff
SHA1cbfe44347a9a45001362416bb621b079aef44713
SHA256cdc4fb0d457d426c89f9c24deca7edd720249ae443cb955c8aeca043eee2cf57
SHA5128a28819c2049e843911ec27cd772bf3832dee5e3418109223898ca36a46ad77b63446accab53283600dd4e5dbf61cb41954181e1ac9e6ca7e06130c8995ce470
-
Filesize
3.4MB
MD5a2eda3b79e687837e8fed33ce11c0694
SHA10e99d53481c5813dc23430bb890743daa0c886aa
SHA25608605ba6c34738d1dbc9dac1dbca7a73c48df7cc96ae6ab5ab2518dc0e37c76e
SHA51284e5fe080f6f11d66be2636fc80139b72b2df73b054c67725c6926abbd04ce4a9df263c90103e371aafe421cc34856eeb98a7303c7b0abf4668c87f27152dbbd
-
Filesize
3.4MB
MD5a2eda3b79e687837e8fed33ce11c0694
SHA10e99d53481c5813dc23430bb890743daa0c886aa
SHA25608605ba6c34738d1dbc9dac1dbca7a73c48df7cc96ae6ab5ab2518dc0e37c76e
SHA51284e5fe080f6f11d66be2636fc80139b72b2df73b054c67725c6926abbd04ce4a9df263c90103e371aafe421cc34856eeb98a7303c7b0abf4668c87f27152dbbd
-
Filesize
20KB
MD5c10ffff4b4ebcd8ad73dbdb4ca21975e
SHA1f1dc61b7cc11dc5134666f4e0a093fddea04bb28
SHA256b0edeac938ce918571628e76ed329b6b85fef91ce9c0c50530897b35c979417e
SHA512fabc626d53b6f60c3944b3a81d30267a5dcd0f0daeb00858b4bca31085281368567bb6a2fbd4a3370b60591b125a5c3804636887ee2414d098256812a4ca06df
-
Filesize
20KB
MD5c10ffff4b4ebcd8ad73dbdb4ca21975e
SHA1f1dc61b7cc11dc5134666f4e0a093fddea04bb28
SHA256b0edeac938ce918571628e76ed329b6b85fef91ce9c0c50530897b35c979417e
SHA512fabc626d53b6f60c3944b3a81d30267a5dcd0f0daeb00858b4bca31085281368567bb6a2fbd4a3370b60591b125a5c3804636887ee2414d098256812a4ca06df
-
Filesize
20KB
MD5c10ffff4b4ebcd8ad73dbdb4ca21975e
SHA1f1dc61b7cc11dc5134666f4e0a093fddea04bb28
SHA256b0edeac938ce918571628e76ed329b6b85fef91ce9c0c50530897b35c979417e
SHA512fabc626d53b6f60c3944b3a81d30267a5dcd0f0daeb00858b4bca31085281368567bb6a2fbd4a3370b60591b125a5c3804636887ee2414d098256812a4ca06df
-
Filesize
20KB
MD5c10ffff4b4ebcd8ad73dbdb4ca21975e
SHA1f1dc61b7cc11dc5134666f4e0a093fddea04bb28
SHA256b0edeac938ce918571628e76ed329b6b85fef91ce9c0c50530897b35c979417e
SHA512fabc626d53b6f60c3944b3a81d30267a5dcd0f0daeb00858b4bca31085281368567bb6a2fbd4a3370b60591b125a5c3804636887ee2414d098256812a4ca06df
-
Filesize
20KB
MD5c10ffff4b4ebcd8ad73dbdb4ca21975e
SHA1f1dc61b7cc11dc5134666f4e0a093fddea04bb28
SHA256b0edeac938ce918571628e76ed329b6b85fef91ce9c0c50530897b35c979417e
SHA512fabc626d53b6f60c3944b3a81d30267a5dcd0f0daeb00858b4bca31085281368567bb6a2fbd4a3370b60591b125a5c3804636887ee2414d098256812a4ca06df