Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
162s -
max time network
206s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2022, 07:38
Static task
static1
Behavioral task
behavioral1
Sample
549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe
Resource
win7-20220901-en
General
-
Target
549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe
-
Size
428KB
-
MD5
62767859b9b880c0efe7546d9bc5d120
-
SHA1
89d2744283d2037738d012593b50212d8b02989c
-
SHA256
549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8
-
SHA512
81fdc2cf41a9113235b2653647efb95402f8553b8f99e0a44d605adaf477cf8579279e6bc8b8e130e976bb5ef5da096e75eecbf2dd63c22994e5b8897583d1e2
-
SSDEEP
6144:Hnp8zTOujFmHrlrAQkbbG0LE0o0N0z3a8ECggYKBjiI:JwQkCgDMji
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created \??\c:\windows\system32\drivers\etc\hosts 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe File opened for modification \??\c:\windows\system32\drivers\etc\hosts 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Installs/modifies Browser Helper Object 2 TTPs 3 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{31D09BA0-12F5-4CCE-BE8A-2923E76605DA} 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1FD49718-1D00-4B19-AF5F-070AF6D5D54C} 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\mshosts.dll 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe File opened for modification \??\c:\windows\SysWOW64\Yhczku.dll.log 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe File created \??\c:\windows\SysWOW64\Msiework.lnk 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Search Page = "http://www.baidu.com" 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://www.baidu.com" 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Default_Search_URL = "http://www.baidu.com" 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://www.baidu.com" 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://www.baidu.com" 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Default_Search_URL = "http://www.baidu.com" 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.baidu.com" 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Start Page = "http://www.baidu.com" 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://www.baidu.com" 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Main\Default_Search_URL = "http://www.baidu.com" 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Main 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Main\Search Page = "http://www.baidu.com" 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Main\Start Page = "http://www.baidu.com" 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.lnkt 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.lnkt\ = "lnkfile" 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Token: SeIncBasePriorityPrivilege 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Token: 33 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe Token: SeIncBasePriorityPrivilege 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4804 wrote to memory of 1296 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 83 PID 4804 wrote to memory of 1296 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 83 PID 4804 wrote to memory of 1296 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 83 PID 4804 wrote to memory of 1936 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 84 PID 4804 wrote to memory of 1936 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 84 PID 4804 wrote to memory of 1936 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 84 PID 4804 wrote to memory of 1432 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 86 PID 4804 wrote to memory of 1432 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 86 PID 4804 wrote to memory of 1432 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 86 PID 4804 wrote to memory of 4212 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 90 PID 4804 wrote to memory of 4212 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 90 PID 4804 wrote to memory of 4212 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 90 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 PID 4804 wrote to memory of 2484 4804 549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe 39 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 4212 attrib.exe 5116 attrib.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe"C:\Users\Admin\AppData\Local\Temp\549596f4d2455aa592ce25ed1b788fc7618a52d34c1665e5cfc2977bd3c7ecb8.exe"2⤵
- Drops file in Drivers directory
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\SysWOW64\cmd.execmd /c del c:\rzxsy*.dll /f /s /q3⤵PID:1296
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c del /f /s /q "%USERPROFILE%\COOKIES\*.TXT"3⤵PID:1936
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c del /f /s /q "%USERPROFILE%\Local Settings\Temporary Internet Files\*.*"3⤵PID:1432
-
-
C:\Windows\SysWOW64\attrib.exeattrib.exe c:\windows\system32\drivers\etc\hosts -s -h -r3⤵
- Views/modifies file attributes
PID:4212
-
-
C:\Windows\SysWOW64\attrib.exeattrib.exe c:\windows\system32\drivers\etc\hosts -s -h -r3⤵
- Views/modifies file attributes
PID:5116
-
-