Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
112s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 14:39
Static task
static1
Behavioral task
behavioral1
Sample
179a141591e3228757685ea95755ad5ffdea7cd637b6399f9b86840685b644d9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
179a141591e3228757685ea95755ad5ffdea7cd637b6399f9b86840685b644d9.exe
Resource
win10v2004-20220901-en
General
-
Target
179a141591e3228757685ea95755ad5ffdea7cd637b6399f9b86840685b644d9.exe
-
Size
44KB
-
MD5
e6250b187fdb24674a16e46b32fc0d13
-
SHA1
f8f2d8937da8dc89854efebd5efade01a7eec40a
-
SHA256
179a141591e3228757685ea95755ad5ffdea7cd637b6399f9b86840685b644d9
-
SHA512
e84c57921419bcb6e9070c2432de137e078b6ade7b09df5f8e26705cbf2b5ccaeaf7005af8fb6b347f136dec3d8b761fc4e416cdf8338261d56dcae6fb9113fb
-
SSDEEP
768:v7l6igXICM1xV27C3nCE0BjZSz3sdF6MKe5bJURHgV3FdVghJWg:pwYCM1F3CE6ZSz3sTKeVJpV3X2G
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1248 set thread context of 1384 1248 179a141591e3228757685ea95755ad5ffdea7cd637b6399f9b86840685b644d9.exe 26 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "370396686" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{775C2FA1-3876-11ED-A964-EAF6071D98F9} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\xpigeon 179a141591e3228757685ea95755ad5ffdea7cd637b6399f9b86840685b644d9.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\xpigeon\config = 10372b2c622f35313c766b6b6a6a76372a3f2408372a2c6269241f2a372d28629cf49097ef8e8fb12408392b2b2f372a3c62696a6b6c6d6e24152d2c3d20620008313f3d37366a686968 179a141591e3228757685ea95755ad5ffdea7cd637b6399f9b86840685b644d9.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\xpigeon\path = 433a5c55736572735c41646d696e5c417070446174615c4c6f63616c5c54656d705c313739613134313539316533323238373537363835656139353735356164356666646561376364363337623633393966396238363834303638356236343464392e657865 179a141591e3228757685ea95755ad5ffdea7cd637b6399f9b86840685b644d9.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1384 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1384 iexplore.exe 1384 iexplore.exe 1560 IEXPLORE.EXE 1560 IEXPLORE.EXE 1560 IEXPLORE.EXE 1560 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1248 wrote to memory of 1384 1248 179a141591e3228757685ea95755ad5ffdea7cd637b6399f9b86840685b644d9.exe 26 PID 1248 wrote to memory of 1384 1248 179a141591e3228757685ea95755ad5ffdea7cd637b6399f9b86840685b644d9.exe 26 PID 1248 wrote to memory of 1384 1248 179a141591e3228757685ea95755ad5ffdea7cd637b6399f9b86840685b644d9.exe 26 PID 1248 wrote to memory of 1384 1248 179a141591e3228757685ea95755ad5ffdea7cd637b6399f9b86840685b644d9.exe 26 PID 1248 wrote to memory of 1384 1248 179a141591e3228757685ea95755ad5ffdea7cd637b6399f9b86840685b644d9.exe 26 PID 1384 wrote to memory of 1560 1384 iexplore.exe 28 PID 1384 wrote to memory of 1560 1384 iexplore.exe 28 PID 1384 wrote to memory of 1560 1384 iexplore.exe 28 PID 1384 wrote to memory of 1560 1384 iexplore.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\179a141591e3228757685ea95755ad5ffdea7cd637b6399f9b86840685b644d9.exe"C:\Users\Admin\AppData\Local\Temp\179a141591e3228757685ea95755ad5ffdea7cd637b6399f9b86840685b644d9.exe"1⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1384 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1560
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
606B
MD542f98d24ecf4d9bb4f595cea0e720d02
SHA1564d6651029fa24a98165af27f07845c68bda634
SHA2567fea3dd3e8ce528f4300297d6502d78015059a13704c462cf7c67395c4231f23
SHA5121a7a1e725ec9c3d467f42260d99f5d7a565e02ca2fff0c217ba425188b154588ded32b4300d9800b202afee9281b594bed6ffebf750660e8a98869da9a5fa47c