Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
182s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 12:06
Behavioral task
behavioral1
Sample
af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe
Resource
win10v2004-20220812-en
General
-
Target
af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe
-
Size
237KB
-
MD5
6e0b6a02371c80ff3c1474a332e5bf76
-
SHA1
6fff788f07748bcedeb7188f67ebd00e24ba50d6
-
SHA256
af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0
-
SHA512
919ac1ef06e1cb61949560a281c3e857410fd3527b1a71175cf1ee4986432245b26f696d83d3e62b30c11488c32fbda58cbf4bc640391e8a30cd79dc769205d6
-
SSDEEP
6144:JJnf0qkLDB8wuRclrKtBoYBqCOTt1h49cNUmgGug:7hkiIlWBoYBqnx1h49cNUmR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 836 af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0mgr.exe -
resource yara_rule behavioral1/files/0x000c0000000054a8-54.dat upx behavioral1/files/0x000c0000000054a8-55.dat upx behavioral1/memory/836-58-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral1/files/0x000c0000000054a8-57.dat upx behavioral1/files/0x000900000001313e-302.dat upx -
Deletes itself 1 IoCs
pid Process 552 mspaint.exe -
Loads dropped DLL 2 IoCs
pid Process 2044 af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe 2044 af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Screen Saver Pro 3.1 = "C:\\Users\\Admin\\AppData\\Roaming\\ScreenSaverPro.scr" af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Alprpr = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Alprpr.exe" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run mspaint.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Alprpr = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Alprpr.exe" mspaint.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\B: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\D: mspaint.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\F: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\Q: svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2044 set thread context of 1984 2044 af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe 29 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{51AD9691-499C-11ED-BD75-FAF5FAF3A79A} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "372282108" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1984 af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe 1984 af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1984 af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe Token: SeDebugPrivilege 2012 svchost.exe Token: SeDebugPrivilege 1984 af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe Token: SeDebugPrivilege 552 mspaint.exe Token: SeDebugPrivilege 1196 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1828 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 552 mspaint.exe 552 mspaint.exe 552 mspaint.exe 552 mspaint.exe 1828 IEXPLORE.EXE 1828 IEXPLORE.EXE 820 IEXPLORE.EXE 820 IEXPLORE.EXE 820 IEXPLORE.EXE 820 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 2044 wrote to memory of 836 2044 af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe 27 PID 2044 wrote to memory of 836 2044 af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe 27 PID 2044 wrote to memory of 836 2044 af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe 27 PID 2044 wrote to memory of 836 2044 af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe 27 PID 2044 wrote to memory of 2012 2044 af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe 28 PID 2044 wrote to memory of 2012 2044 af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe 28 PID 2044 wrote to memory of 2012 2044 af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe 28 PID 2044 wrote to memory of 2012 2044 af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe 28 PID 2044 wrote to memory of 2012 2044 af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe 28 PID 2044 wrote to memory of 2012 2044 af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe 28 PID 2044 wrote to memory of 2012 2044 af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe 28 PID 2044 wrote to memory of 1984 2044 af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe 29 PID 2044 wrote to memory of 1984 2044 af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe 29 PID 2044 wrote to memory of 1984 2044 af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe 29 PID 2044 wrote to memory of 1984 2044 af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe 29 PID 2044 wrote to memory of 1984 2044 af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe 29 PID 2044 wrote to memory of 1984 2044 af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe 29 PID 2044 wrote to memory of 1984 2044 af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe 29 PID 2044 wrote to memory of 1984 2044 af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe 29 PID 2044 wrote to memory of 1984 2044 af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe 29 PID 2044 wrote to memory of 1984 2044 af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe 29 PID 2012 wrote to memory of 552 2012 svchost.exe 30 PID 2012 wrote to memory of 552 2012 svchost.exe 30 PID 2012 wrote to memory of 552 2012 svchost.exe 30 PID 2012 wrote to memory of 552 2012 svchost.exe 30 PID 1984 wrote to memory of 1196 1984 af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe 32 PID 1984 wrote to memory of 1196 1984 af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe 32 PID 1984 wrote to memory of 1196 1984 af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe 32 PID 1984 wrote to memory of 1196 1984 af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe 32 PID 1196 wrote to memory of 1828 1196 iexplore.exe 33 PID 1196 wrote to memory of 1828 1196 iexplore.exe 33 PID 1196 wrote to memory of 1828 1196 iexplore.exe 33 PID 1196 wrote to memory of 1828 1196 iexplore.exe 33 PID 1984 wrote to memory of 2012 1984 af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe 28 PID 1984 wrote to memory of 2012 1984 af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe 28 PID 1984 wrote to memory of 552 1984 af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe 30 PID 1984 wrote to memory of 552 1984 af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe 30 PID 1984 wrote to memory of 1196 1984 af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe 32 PID 1984 wrote to memory of 1196 1984 af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe 32 PID 1828 wrote to memory of 820 1828 IEXPLORE.EXE 35 PID 1828 wrote to memory of 820 1828 IEXPLORE.EXE 35 PID 1828 wrote to memory of 820 1828 IEXPLORE.EXE 35 PID 1828 wrote to memory of 820 1828 IEXPLORE.EXE 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe"C:\Users\Admin\AppData\Local\Temp\af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0mgr.exeC:\Users\Admin\AppData\Local\Temp\af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0mgr.exe2⤵
- Executes dropped EXE
PID:836
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe"3⤵
- Deletes itself
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:552
-
-
-
C:\Users\Admin\AppData\Local\Temp\af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe"C:\Users\Admin\AppData\Local\Temp\af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1828 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:820
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0mgr.exe
Filesize104KB
MD50d8842136deadeb566f22bcd560fea1a
SHA16b70692f980e5f574db6bf51c54ddf4e0b8700d0
SHA256d49b36564fa3e4da96fe3855d5a9c5a965a7fc1be86ea7d32aab22929b7c239d
SHA512d1dae9b60bfca6b19c2daab0947d242ee68b329fe40df0b7fb2c6295307eae66e53bd640a25a5895e1413cc07f124f5ba3df8fa73ca4d811a679cc68cded87c7
-
Filesize
237KB
MD56e0b6a02371c80ff3c1474a332e5bf76
SHA16fff788f07748bcedeb7188f67ebd00e24ba50d6
SHA256af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0
SHA512919ac1ef06e1cb61949560a281c3e857410fd3527b1a71175cf1ee4986432245b26f696d83d3e62b30c11488c32fbda58cbf4bc640391e8a30cd79dc769205d6
-
Filesize
603B
MD57bd9f2a71acdc09534a3b604e2f8edf0
SHA1bed63cfc1563224561f7a43a86ca6c4cac40ab78
SHA2567204ead9339f5578c39ce2f6c3cb45e3b5961844c0398b981d13fa960d8d3db7
SHA51283822dc9f983fe07d6584fa604837c5595199c126e7c1fdab5dcab140e1503d7403dedaa82c525e856f8493f5e420b1b0d1e52e0811a6581c7a4bdbf73cc4cbf
-
\Users\Admin\AppData\Local\Temp\af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0mgr.exe
Filesize104KB
MD50d8842136deadeb566f22bcd560fea1a
SHA16b70692f980e5f574db6bf51c54ddf4e0b8700d0
SHA256d49b36564fa3e4da96fe3855d5a9c5a965a7fc1be86ea7d32aab22929b7c239d
SHA512d1dae9b60bfca6b19c2daab0947d242ee68b329fe40df0b7fb2c6295307eae66e53bd640a25a5895e1413cc07f124f5ba3df8fa73ca4d811a679cc68cded87c7
-
\Users\Admin\AppData\Local\Temp\af87629834c2a4c9f2abaa9fb16c139699ff72276bba5277eb71bba90677bcb0mgr.exe
Filesize104KB
MD50d8842136deadeb566f22bcd560fea1a
SHA16b70692f980e5f574db6bf51c54ddf4e0b8700d0
SHA256d49b36564fa3e4da96fe3855d5a9c5a965a7fc1be86ea7d32aab22929b7c239d
SHA512d1dae9b60bfca6b19c2daab0947d242ee68b329fe40df0b7fb2c6295307eae66e53bd640a25a5895e1413cc07f124f5ba3df8fa73ca4d811a679cc68cded87c7