Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/10/2022, 20:55
Static task
static1
Behavioral task
behavioral1
Sample
31086e3edf2f7ba07784d28974af817b5f14ff48c298a70e896a65ef878f15eb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
31086e3edf2f7ba07784d28974af817b5f14ff48c298a70e896a65ef878f15eb.exe
Resource
win10v2004-20220812-en
General
-
Target
31086e3edf2f7ba07784d28974af817b5f14ff48c298a70e896a65ef878f15eb.exe
-
Size
30KB
-
MD5
6e045aae034186d910850136570fea60
-
SHA1
5144db0c64b877a2417ce0d16fa78ffb6fcfb012
-
SHA256
31086e3edf2f7ba07784d28974af817b5f14ff48c298a70e896a65ef878f15eb
-
SHA512
ff3572eef94f502389da0be080134e38376ecc492b39d55e83e01968acb964869f43a6f40ab72d352c4ba5aedf4f240316181613b879e694f998776b08426089
-
SSDEEP
768:i0En7YPFpSESsMr2bc765DmODZZPZB52jI:CMECc25DmQn
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d3b98f5693c0d24b85f349229339c59c0000000002000000000010660000000100002000000057b6ed8d068b8fc094cffc7e76ec377df97ab24efd8137ef3aac4c92fb5ff4e5000000000e80000000020000200000002a0acacb28f1f1cf391a9dca5400121043431979e6832dd17b0b4b6a322652f720000000d56de62b264ec86564355f7739f08ea74fcc05bc381d4ef5d8a8d26e0c5d778e4000000013d6dd7434e0a5efd406a042930ae69b8a20ccd39e0ec5eb8d70ec2e47fd7e33dee71fc79a64f8b257451b2958b87cc239abfee34b8411a9606b20e5cbe3351a IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 8045eb07f6d5d801 IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{24A16DD1-41E9-11ED-8C25-6AB3F8C7EA51} = "0" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "371435494" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 112 IEXPLORE.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1488 31086e3edf2f7ba07784d28974af817b5f14ff48c298a70e896a65ef878f15eb.exe 112 IEXPLORE.exe 112 IEXPLORE.exe 1464 IEXPLORE.EXE 1464 IEXPLORE.EXE 1464 IEXPLORE.EXE 1464 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1488 wrote to memory of 112 1488 31086e3edf2f7ba07784d28974af817b5f14ff48c298a70e896a65ef878f15eb.exe 26 PID 1488 wrote to memory of 112 1488 31086e3edf2f7ba07784d28974af817b5f14ff48c298a70e896a65ef878f15eb.exe 26 PID 1488 wrote to memory of 112 1488 31086e3edf2f7ba07784d28974af817b5f14ff48c298a70e896a65ef878f15eb.exe 26 PID 1488 wrote to memory of 112 1488 31086e3edf2f7ba07784d28974af817b5f14ff48c298a70e896a65ef878f15eb.exe 26 PID 112 wrote to memory of 1464 112 IEXPLORE.exe 28 PID 112 wrote to memory of 1464 112 IEXPLORE.exe 28 PID 112 wrote to memory of 1464 112 IEXPLORE.exe 28 PID 112 wrote to memory of 1464 112 IEXPLORE.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\31086e3edf2f7ba07784d28974af817b5f14ff48c298a70e896a65ef878f15eb.exe"C:\Users\Admin\AppData\Local\Temp\31086e3edf2f7ba07784d28974af817b5f14ff48c298a70e896a65ef878f15eb.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Program Files\Internet Explorer\IEXPLORE.exe"C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/vplay.php2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:112 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1464
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
601B
MD5ff15cb6ffa00c2af37344a3ccd0181c9
SHA1fafd02f01c90959a6210fb1c6ff02679f1cabe5e
SHA2564c583c79fcb388ad41d6722ff603668fe57cc42d0c513fc8e588c9e4ceda9e25
SHA51234e05de734d0c55cf5e496e373db26bfbb7dc153f3d1db065757b0ed32bb53965c4518a0dcf61fe3a2569ea5dca4bb2992dc937c1ed079445661ef214b539fc0