Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2022, 01:19
Behavioral task
behavioral1
Sample
c9fb30c59e33216f6474894ac190bbe8f431d338c4d11b649e0466f2295afcdf.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
c9fb30c59e33216f6474894ac190bbe8f431d338c4d11b649e0466f2295afcdf.exe
Resource
win10v2004-20220901-en
General
-
Target
c9fb30c59e33216f6474894ac190bbe8f431d338c4d11b649e0466f2295afcdf.exe
-
Size
127KB
-
MD5
3b5854809fa6c65c3660116d1e054df0
-
SHA1
777e5e6d47f553a128584098cf9ec9109ce6c5b1
-
SHA256
c9fb30c59e33216f6474894ac190bbe8f431d338c4d11b649e0466f2295afcdf
-
SHA512
c72439d25654709f4291b74ea7da4b65739424536f5fa62ecc87cdc836afc6e5f0705740764f0318907652bc31e7c75ea63e49e442ce70557101e3d9df415885
-
SSDEEP
3072:XmBes5HVuSQ7lr1ia2FHS6p4SwnzSJ0H9K/GyKoKLB/:XeeszuSFTH/4nm0dgGyKo0
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2536-132-0x0000000000400000-0x000000000059C000-memory.dmp upx -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\F: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\B: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\L: svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2536 set thread context of 3672 2536 c9fb30c59e33216f6474894ac190bbe8f431d338c4d11b649e0466f2295afcdf.exe 83 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "371644780" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30988253" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30988253" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1173703063" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30988253" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{7129FF8F-43D0-11ED-A0EE-E2272FE8D9C1} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1168857501" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1168857501" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5040 mspaint.exe 5040 mspaint.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3104 IEXPLORE.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3672 c9fb30c59e33216f6474894ac190bbe8f431d338c4d11b649e0466f2295afcdf.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3104 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 5040 mspaint.exe 5040 mspaint.exe 5040 mspaint.exe 5040 mspaint.exe 3104 IEXPLORE.EXE 3104 IEXPLORE.EXE 3856 IEXPLORE.EXE 3856 IEXPLORE.EXE 3856 IEXPLORE.EXE 3856 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2536 wrote to memory of 4480 2536 c9fb30c59e33216f6474894ac190bbe8f431d338c4d11b649e0466f2295afcdf.exe 82 PID 2536 wrote to memory of 4480 2536 c9fb30c59e33216f6474894ac190bbe8f431d338c4d11b649e0466f2295afcdf.exe 82 PID 2536 wrote to memory of 4480 2536 c9fb30c59e33216f6474894ac190bbe8f431d338c4d11b649e0466f2295afcdf.exe 82 PID 2536 wrote to memory of 4480 2536 c9fb30c59e33216f6474894ac190bbe8f431d338c4d11b649e0466f2295afcdf.exe 82 PID 2536 wrote to memory of 4480 2536 c9fb30c59e33216f6474894ac190bbe8f431d338c4d11b649e0466f2295afcdf.exe 82 PID 2536 wrote to memory of 4480 2536 c9fb30c59e33216f6474894ac190bbe8f431d338c4d11b649e0466f2295afcdf.exe 82 PID 2536 wrote to memory of 3672 2536 c9fb30c59e33216f6474894ac190bbe8f431d338c4d11b649e0466f2295afcdf.exe 83 PID 2536 wrote to memory of 3672 2536 c9fb30c59e33216f6474894ac190bbe8f431d338c4d11b649e0466f2295afcdf.exe 83 PID 2536 wrote to memory of 3672 2536 c9fb30c59e33216f6474894ac190bbe8f431d338c4d11b649e0466f2295afcdf.exe 83 PID 2536 wrote to memory of 3672 2536 c9fb30c59e33216f6474894ac190bbe8f431d338c4d11b649e0466f2295afcdf.exe 83 PID 2536 wrote to memory of 3672 2536 c9fb30c59e33216f6474894ac190bbe8f431d338c4d11b649e0466f2295afcdf.exe 83 PID 2536 wrote to memory of 3672 2536 c9fb30c59e33216f6474894ac190bbe8f431d338c4d11b649e0466f2295afcdf.exe 83 PID 2536 wrote to memory of 3672 2536 c9fb30c59e33216f6474894ac190bbe8f431d338c4d11b649e0466f2295afcdf.exe 83 PID 2536 wrote to memory of 3672 2536 c9fb30c59e33216f6474894ac190bbe8f431d338c4d11b649e0466f2295afcdf.exe 83 PID 2536 wrote to memory of 3672 2536 c9fb30c59e33216f6474894ac190bbe8f431d338c4d11b649e0466f2295afcdf.exe 83 PID 4480 wrote to memory of 5040 4480 svchost.exe 84 PID 4480 wrote to memory of 5040 4480 svchost.exe 84 PID 4480 wrote to memory of 5040 4480 svchost.exe 84 PID 3672 wrote to memory of 1764 3672 c9fb30c59e33216f6474894ac190bbe8f431d338c4d11b649e0466f2295afcdf.exe 89 PID 3672 wrote to memory of 1764 3672 c9fb30c59e33216f6474894ac190bbe8f431d338c4d11b649e0466f2295afcdf.exe 89 PID 3672 wrote to memory of 1764 3672 c9fb30c59e33216f6474894ac190bbe8f431d338c4d11b649e0466f2295afcdf.exe 89 PID 1764 wrote to memory of 3104 1764 iexplore.exe 90 PID 1764 wrote to memory of 3104 1764 iexplore.exe 90 PID 3104 wrote to memory of 3856 3104 IEXPLORE.EXE 91 PID 3104 wrote to memory of 3856 3104 IEXPLORE.EXE 91 PID 3104 wrote to memory of 3856 3104 IEXPLORE.EXE 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9fb30c59e33216f6474894ac190bbe8f431d338c4d11b649e0466f2295afcdf.exe"C:\Users\Admin\AppData\Local\Temp\c9fb30c59e33216f6474894ac190bbe8f431d338c4d11b649e0466f2295afcdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe"3⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5040
-
-
-
C:\Users\Admin\AppData\Local\Temp\c9fb30c59e33216f6474894ac190bbe8f431d338c4d11b649e0466f2295afcdf.exe"C:\Users\Admin\AppData\Local\Temp\c9fb30c59e33216f6474894ac190bbe8f431d338c4d11b649e0466f2295afcdf.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"4⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3104 CREDAT:17410 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3856
-
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:1956
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5afc3e2584b32e1e7c23c33e9534089a5
SHA1ea4e2266d010c300621d2287ea60fe3e9a9ee753
SHA25661597f5f937da250a5ed7b4b82867bebc546a5a35c0029982a003b1e9cbd2e7e
SHA512f0e0d20b15bc390292baf0d93d982315afc466ccd2d4e48152ed65af97aed573d5b9e65b2b50925cbcd2e736955dfec4f63de5739cdb1499eb2db5dfc3cc4fe6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD588584d673bf48501d9c6fdec7faabb7b
SHA15375baf1255e8ac642a90700232e036214deabe5
SHA256b488b8b1b4f41244e28927bb442811d3766b99550bff9a76141f2ace2ad2b2c5
SHA5120642154d6a47c068fc340f31e0547d46581eef2106cd68f8901edcd4ebad6278ad1854f7fb86e60301316b8e37d8a739d85f49e09a55de5ddc43a28852093d28