Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
106s -
max time network
199s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 12:13
Static task
static1
Behavioral task
behavioral1
Sample
6cc446035e3c53d9b6c1962abe7c8970e2be0ff0ec2cc5eb9bed4d4dc0c907cf.exe
Resource
win7-20220812-en
General
-
Target
6cc446035e3c53d9b6c1962abe7c8970e2be0ff0ec2cc5eb9bed4d4dc0c907cf.exe
-
Size
563KB
-
MD5
479afc9b85f6f79ddf3a1c77485608e0
-
SHA1
06fc0786770f9169bf66e803563755e3e3393cf4
-
SHA256
6cc446035e3c53d9b6c1962abe7c8970e2be0ff0ec2cc5eb9bed4d4dc0c907cf
-
SHA512
d457910c793ecf2dc25079e7b464a2cbc574c54117ee9f99050737384e20f105de607371183568884ba89db1fff546b6e9ae886147ac402a6d3c4831830e1666
-
SSDEEP
12288:WrnkzL6RcJq3U+LKyB/AGBZrTBSn7q8G8luor8S+mGvpB4wrj:WoQcJj8KwBSn+Iw3SpUDP
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1708 6cc446035e3c53d9b6c1962abe7c8970e2be0ff0ec2cc5eb9bed4d4dc0c907cfSrv.exe 3332 DesktopLayer.exe -
resource yara_rule behavioral2/files/0x000d000000022deb-133.dat upx behavioral2/files/0x000d000000022deb-134.dat upx behavioral2/memory/3332-142-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral2/files/0x0008000000022e26-140.dat upx behavioral2/files/0x0008000000022e26-139.dat upx behavioral2/memory/1708-136-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\pxF457.tmp 6cc446035e3c53d9b6c1962abe7c8970e2be0ff0ec2cc5eb9bed4d4dc0c907cfSrv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe 6cc446035e3c53d9b6c1962abe7c8970e2be0ff0ec2cc5eb9bed4d4dc0c907cfSrv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe 6cc446035e3c53d9b6c1962abe7c8970e2be0ff0ec2cc5eb9bed4d4dc0c907cfSrv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4057514091" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "372279434" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "4045794962" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4045794962" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{1B6771D2-4996-11ED-89AC-DEF0885D2AEB} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30989730" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30989730" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30989730" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3332 DesktopLayer.exe 3332 DesktopLayer.exe 3332 DesktopLayer.exe 3332 DesktopLayer.exe 3332 DesktopLayer.exe 3332 DesktopLayer.exe 3332 DesktopLayer.exe 3332 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4064 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2032 6cc446035e3c53d9b6c1962abe7c8970e2be0ff0ec2cc5eb9bed4d4dc0c907cf.exe 2032 6cc446035e3c53d9b6c1962abe7c8970e2be0ff0ec2cc5eb9bed4d4dc0c907cf.exe 4064 iexplore.exe 4064 iexplore.exe 2032 6cc446035e3c53d9b6c1962abe7c8970e2be0ff0ec2cc5eb9bed4d4dc0c907cf.exe 4312 IEXPLORE.EXE 4312 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1708 2032 6cc446035e3c53d9b6c1962abe7c8970e2be0ff0ec2cc5eb9bed4d4dc0c907cf.exe 81 PID 2032 wrote to memory of 1708 2032 6cc446035e3c53d9b6c1962abe7c8970e2be0ff0ec2cc5eb9bed4d4dc0c907cf.exe 81 PID 2032 wrote to memory of 1708 2032 6cc446035e3c53d9b6c1962abe7c8970e2be0ff0ec2cc5eb9bed4d4dc0c907cf.exe 81 PID 1708 wrote to memory of 3332 1708 6cc446035e3c53d9b6c1962abe7c8970e2be0ff0ec2cc5eb9bed4d4dc0c907cfSrv.exe 82 PID 1708 wrote to memory of 3332 1708 6cc446035e3c53d9b6c1962abe7c8970e2be0ff0ec2cc5eb9bed4d4dc0c907cfSrv.exe 82 PID 1708 wrote to memory of 3332 1708 6cc446035e3c53d9b6c1962abe7c8970e2be0ff0ec2cc5eb9bed4d4dc0c907cfSrv.exe 82 PID 3332 wrote to memory of 4064 3332 DesktopLayer.exe 83 PID 3332 wrote to memory of 4064 3332 DesktopLayer.exe 83 PID 4064 wrote to memory of 4312 4064 iexplore.exe 84 PID 4064 wrote to memory of 4312 4064 iexplore.exe 84 PID 4064 wrote to memory of 4312 4064 iexplore.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\6cc446035e3c53d9b6c1962abe7c8970e2be0ff0ec2cc5eb9bed4d4dc0c907cf.exe"C:\Users\Admin\AppData\Local\Temp\6cc446035e3c53d9b6c1962abe7c8970e2be0ff0ec2cc5eb9bed4d4dc0c907cf.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\6cc446035e3c53d9b6c1962abe7c8970e2be0ff0ec2cc5eb9bed4d4dc0c907cfSrv.exeC:\Users\Admin\AppData\Local\Temp\6cc446035e3c53d9b6c1962abe7c8970e2be0ff0ec2cc5eb9bed4d4dc0c907cfSrv.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4064 CREDAT:17410 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4312
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD57de3527d962389a61a0825bebf9031b7
SHA1ffc04b363ec1d3976e454446827d36813002a9b7
SHA25663db191be3bdce3f969a6f457edaa2bf5c9ec863a311540d719ad80ca9ce4a19
SHA51257220b86487cefb01b4c2b9b904a147ea35133f490d5da092dbf10e1568c14a2f1359ed36529edc779335a9f4530c25a67d2065620379eec0e682b03389ae91d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD557e5179fc378bd24f49825f0c67d529d
SHA1e0b77309f995cf41367db32737cffc2e5e0c5a4b
SHA2560fa3412180c8995789f2c5e23fce46e0a570fbc1bcf0d45b2d77a659a156d3df
SHA512eabf92797726486402c417f4853c0818eeea9e076348fb4f2879db27832d13c2a5188b6e188a80529c43923b447305203b009eb506db90eb94befd32da053f8f
-
C:\Users\Admin\AppData\Local\Temp\6cc446035e3c53d9b6c1962abe7c8970e2be0ff0ec2cc5eb9bed4d4dc0c907cfSrv.exe
Filesize55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a
-
C:\Users\Admin\AppData\Local\Temp\6cc446035e3c53d9b6c1962abe7c8970e2be0ff0ec2cc5eb9bed4d4dc0c907cfSrv.exe
Filesize55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a