Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
107s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 06:36
Static task
static1
Behavioral task
behavioral1
Sample
7415660245c16d2973ab0205948c2b2c0d410abe12033065fd66460caa860c9a.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7415660245c16d2973ab0205948c2b2c0d410abe12033065fd66460caa860c9a.exe
Resource
win10v2004-20220901-en
General
-
Target
7415660245c16d2973ab0205948c2b2c0d410abe12033065fd66460caa860c9a.exe
-
Size
53KB
-
MD5
5047bb8f66a22a605489fbec87712ec8
-
SHA1
976166ea19eeaad1e560b9a840a960c40d9c5fbb
-
SHA256
7415660245c16d2973ab0205948c2b2c0d410abe12033065fd66460caa860c9a
-
SHA512
404604a679eb1a50dae8826ae8e0bb4ddafa873f43c436ee4984398851218b06286585209b6eec8778a4fd17d8c9d657bc0df5afec2f07a6f45155f1d0b668ad
-
SSDEEP
1536:4zKoS7SwxxgIgHqtaf/RtrZu+58aGtlDLaQfK0M3kOlwKsB2:AK77CPf/7rZu+58aGtlD+KK0MUOlwKsA
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000048ca5449a4d21846ba8a995ea0abd35a00000000020000000000106600000001000020000000cb6625d7ab3dd79b5c9630a13030c9357faa671f5b94de6302b709914796aa33000000000e800000000200002000000015621fa31b6c0856f7a75cd7fe6ae05d6661aa2829847bcf7998b4c14e5a1c6d2000000032fa8a90998046a0793fa68eba1f496d4eef227b97774cde9179e53fec6cf81a40000000df3db3e01c2f48370923c27b4993a9202c365b29628e10d7c1c2c137e944aa1888c8b9771e6349e902f3caaf0c3f9592b1b3efc3da1633252f1e36a0e331a73f iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "371679104" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{5BFDDF01-4420-11ED-A20B-4279513DF160} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f023f4352dd8d801 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 900 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 900 iexplore.exe 900 iexplore.exe 456 IEXPLORE.EXE 456 IEXPLORE.EXE 456 IEXPLORE.EXE 456 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2032 wrote to memory of 900 2032 7415660245c16d2973ab0205948c2b2c0d410abe12033065fd66460caa860c9a.exe 27 PID 2032 wrote to memory of 900 2032 7415660245c16d2973ab0205948c2b2c0d410abe12033065fd66460caa860c9a.exe 27 PID 2032 wrote to memory of 900 2032 7415660245c16d2973ab0205948c2b2c0d410abe12033065fd66460caa860c9a.exe 27 PID 2032 wrote to memory of 900 2032 7415660245c16d2973ab0205948c2b2c0d410abe12033065fd66460caa860c9a.exe 27 PID 900 wrote to memory of 456 900 iexplore.exe 29 PID 900 wrote to memory of 456 900 iexplore.exe 29 PID 900 wrote to memory of 456 900 iexplore.exe 29 PID 900 wrote to memory of 456 900 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7415660245c16d2973ab0205948c2b2c0d410abe12033065fd66460caa860c9a.exe"C:\Users\Admin\AppData\Local\Temp\7415660245c16d2973ab0205948c2b2c0d410abe12033065fd66460caa860c9a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=7415660245c16d2973ab0205948c2b2c0d410abe12033065fd66460caa860c9a.exe&platform=0009&osver=5&isServer=0&shimver=4.0.30319.02⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:900 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:456
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
608B
MD55d9113255428ffa804131d36fe813383
SHA14e6313809b92d422a91f9751d8efa55ae001b61f
SHA25688f2372447c58ab938deda6fda927c96e22feff2d7297edcf2dcecc696ca4ec0
SHA5129fe7bc200cfc61940f864d432a8f15c43383d3f09ccd90231f449a998b91f51c685eeb6b74bb4d84960d61489e3b34f87184789acb5b931355837122fad6f151