Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
170s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2022, 01:28
Static task
static1
Behavioral task
behavioral1
Sample
2a8a207c0d4589d61845084821f6178c36af2e54dab2ea988ff25d8db7fb2724.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
2a8a207c0d4589d61845084821f6178c36af2e54dab2ea988ff25d8db7fb2724.exe
Resource
win10v2004-20220812-en
General
-
Target
2a8a207c0d4589d61845084821f6178c36af2e54dab2ea988ff25d8db7fb2724.exe
-
Size
160KB
-
MD5
6e5b59ff245f9bef635cd1d8f17b3155
-
SHA1
09547b3fb452546efca08575c252ade007937338
-
SHA256
2a8a207c0d4589d61845084821f6178c36af2e54dab2ea988ff25d8db7fb2724
-
SHA512
324a0137eaae40cd09a2ed0f70e5fc3e7c1483a50a70d571801f824bf8e106ec250b02cf24444c2f8023f64c480806ef39e57209a174ef662697684c1e1bacb4
-
SSDEEP
3072:qm64Xco1T+HflHnMopK4meh6YVgvPq4ljI+elAxWiDUUWK:NoGqRMopKReJVgHHQlAxWTUWK
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Zyfrfq = "C:\\Users\\Admin\\AppData\\Roaming\\Zyfrfq.exe" iexplore.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2224 set thread context of 204 2224 2a8a207c0d4589d61845084821f6178c36af2e54dab2ea988ff25d8db7fb2724.exe 80 -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30988034" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{FE512A2F-42F5-11ED-89AC-4A8324823CC0} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3538576837" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "371550956" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30988034" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30988034" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3543420275" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3538576837" IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 204 2a8a207c0d4589d61845084821f6178c36af2e54dab2ea988ff25d8db7fb2724.exe 204 2a8a207c0d4589d61845084821f6178c36af2e54dab2ea988ff25d8db7fb2724.exe 204 2a8a207c0d4589d61845084821f6178c36af2e54dab2ea988ff25d8db7fb2724.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4792 IEXPLORE.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 204 2a8a207c0d4589d61845084821f6178c36af2e54dab2ea988ff25d8db7fb2724.exe Token: SeDebugPrivilege 3256 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4792 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4792 IEXPLORE.EXE 4792 IEXPLORE.EXE 4000 IEXPLORE.EXE 4000 IEXPLORE.EXE 4000 IEXPLORE.EXE 4000 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2224 wrote to memory of 204 2224 2a8a207c0d4589d61845084821f6178c36af2e54dab2ea988ff25d8db7fb2724.exe 80 PID 2224 wrote to memory of 204 2224 2a8a207c0d4589d61845084821f6178c36af2e54dab2ea988ff25d8db7fb2724.exe 80 PID 2224 wrote to memory of 204 2224 2a8a207c0d4589d61845084821f6178c36af2e54dab2ea988ff25d8db7fb2724.exe 80 PID 2224 wrote to memory of 204 2224 2a8a207c0d4589d61845084821f6178c36af2e54dab2ea988ff25d8db7fb2724.exe 80 PID 2224 wrote to memory of 204 2224 2a8a207c0d4589d61845084821f6178c36af2e54dab2ea988ff25d8db7fb2724.exe 80 PID 2224 wrote to memory of 204 2224 2a8a207c0d4589d61845084821f6178c36af2e54dab2ea988ff25d8db7fb2724.exe 80 PID 2224 wrote to memory of 204 2224 2a8a207c0d4589d61845084821f6178c36af2e54dab2ea988ff25d8db7fb2724.exe 80 PID 2224 wrote to memory of 204 2224 2a8a207c0d4589d61845084821f6178c36af2e54dab2ea988ff25d8db7fb2724.exe 80 PID 2224 wrote to memory of 204 2224 2a8a207c0d4589d61845084821f6178c36af2e54dab2ea988ff25d8db7fb2724.exe 80 PID 204 wrote to memory of 3256 204 2a8a207c0d4589d61845084821f6178c36af2e54dab2ea988ff25d8db7fb2724.exe 81 PID 204 wrote to memory of 3256 204 2a8a207c0d4589d61845084821f6178c36af2e54dab2ea988ff25d8db7fb2724.exe 81 PID 204 wrote to memory of 3256 204 2a8a207c0d4589d61845084821f6178c36af2e54dab2ea988ff25d8db7fb2724.exe 81 PID 204 wrote to memory of 3256 204 2a8a207c0d4589d61845084821f6178c36af2e54dab2ea988ff25d8db7fb2724.exe 81 PID 204 wrote to memory of 3256 204 2a8a207c0d4589d61845084821f6178c36af2e54dab2ea988ff25d8db7fb2724.exe 81 PID 3256 wrote to memory of 4792 3256 iexplore.exe 82 PID 3256 wrote to memory of 4792 3256 iexplore.exe 82 PID 3256 wrote to memory of 4792 3256 iexplore.exe 82 PID 4792 wrote to memory of 4000 4792 IEXPLORE.EXE 83 PID 4792 wrote to memory of 4000 4792 IEXPLORE.EXE 83 PID 4792 wrote to memory of 4000 4792 IEXPLORE.EXE 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a8a207c0d4589d61845084821f6178c36af2e54dab2ea988ff25d8db7fb2724.exe"C:\Users\Admin\AppData\Local\Temp\2a8a207c0d4589d61845084821f6178c36af2e54dab2ea988ff25d8db7fb2724.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\2a8a207c0d4589d61845084821f6178c36af2e54dab2ea988ff25d8db7fb2724.exe"C:\Users\Admin\AppData\Local\Temp\2a8a207c0d4589d61845084821f6178c36af2e54dab2ea988ff25d8db7fb2724.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:204 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"4⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4792 CREDAT:17410 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4000
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5fd70739fca5345a28f924f9102ae10ee
SHA16ce3f92183544f3bf52cb76364591589cb940a19
SHA256f238404cc643efddef8ff430f128cdc8ec1513969eaac24b5e5bce81248a91e7
SHA512a787d3a2bceeaed2f2a29f357df6ae17d5b9f66a3c561550d5f83c308ad26a1ddf876488151ff5e51ce93bfb9d0c7b8ca812d595e8d3ebdda7d805707ac1b278
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD53269f644828abc60a35f3d04f2cb19ab
SHA1f1a86dbcc5bed0ba2b436575f9a060b9eddc3541
SHA2566935f42067d07b5572b4033670e9455bba2ac2e9aee9251e9df7586109ff2723
SHA5122379fd38cdeb312d3f25c5c4f889572f4d8424c00a93dbec788f7da43b1b7670917f95948705eb3f9cd48e5570ede90c8b14613bb731d090b89a8eba20a6a79e