Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
130s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 14:19
Static task
static1
Behavioral task
behavioral1
Sample
475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe
Resource
win10v2004-20220901-en
General
-
Target
475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe
-
Size
361KB
-
MD5
1431404f1348c88b7686da7b1968355d
-
SHA1
08c328c0f085f8337c7c9b7e1041de0513f879f3
-
SHA256
475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38
-
SHA512
04a87a348f8bf7810e6b88323d4ade7a96a6127f13688a091de80d896a88d2d05c50a2e9e5dcdfd4ae19946d73cbce111422b13a7f4b14818d91ccd55827d017
-
SSDEEP
6144:gflfAsiL4lIJjiJcbI03GBc3ucY5DCSjX:gflfAsiVGjSGecvX
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1512 opngedecdbrtrsqr.exe 1060 CreateProcess.exe 736 cyxxtsponc.exe 1880 CreateProcess.exe -
Loads dropped DLL 4 IoCs
pid Process 1384 475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe 1512 opngedecdbrtrsqr.exe 1512 opngedecdbrtrsqr.exe 736 cyxxtsponc.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1092 ipconfig.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{7781AAE1-49BB-11ED-98FE-466E2F293893} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d3b98f5693c0d24b85f349229339c59c00000000020000000000106600000001000020000000446c9f2a54f08065ccb51b202b224c71045bf7186f11304d800142185c6458b6000000000e800000000200002000000009abb82acc422b380d462ebefadbdffa43ba68d64b0e131a2cff822f2007f937200000002250f4ed3c4e7224445c0a3727ad06e8a5bd895e4bde3e2c52f173e24acafc724000000089febebd1dce534ea66aa20b6d365f816876583b330b784c8fb08cfa26a44216025d3fd336e4598f17e72f95ce17a3add81b28652400d51a03fcf0655181b8b5 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "372295486" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 80680762c8ddd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 1384 475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe 1384 475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe 1384 475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe 1384 475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe 1384 475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe 1384 475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe 1384 475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe 1384 475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe 1384 475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe 1384 475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe 1384 475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe 1384 475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe 1384 475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe 1384 475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe 1384 475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe 1384 475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe 1384 475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe 1384 475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe 1384 475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe 1384 475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe 1512 opngedecdbrtrsqr.exe 1384 475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe 1512 opngedecdbrtrsqr.exe 1384 475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe 1512 opngedecdbrtrsqr.exe 1384 475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe 1512 opngedecdbrtrsqr.exe 1384 475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe 1512 opngedecdbrtrsqr.exe 1384 475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe 1512 opngedecdbrtrsqr.exe 1384 475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe 1512 opngedecdbrtrsqr.exe 1384 475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe 1384 475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe 736 cyxxtsponc.exe 736 cyxxtsponc.exe 736 cyxxtsponc.exe 736 cyxxtsponc.exe 736 cyxxtsponc.exe 736 cyxxtsponc.exe 736 cyxxtsponc.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 460 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 792 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 792 iexplore.exe 792 iexplore.exe 908 IEXPLORE.EXE 908 IEXPLORE.EXE 908 IEXPLORE.EXE 908 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1384 wrote to memory of 1512 1384 475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe 27 PID 1384 wrote to memory of 1512 1384 475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe 27 PID 1384 wrote to memory of 1512 1384 475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe 27 PID 1384 wrote to memory of 1512 1384 475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe 27 PID 1384 wrote to memory of 792 1384 475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe 28 PID 1384 wrote to memory of 792 1384 475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe 28 PID 1384 wrote to memory of 792 1384 475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe 28 PID 1384 wrote to memory of 792 1384 475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe 28 PID 792 wrote to memory of 908 792 iexplore.exe 30 PID 792 wrote to memory of 908 792 iexplore.exe 30 PID 792 wrote to memory of 908 792 iexplore.exe 30 PID 792 wrote to memory of 908 792 iexplore.exe 30 PID 1512 wrote to memory of 1060 1512 opngedecdbrtrsqr.exe 32 PID 1512 wrote to memory of 1060 1512 opngedecdbrtrsqr.exe 32 PID 1512 wrote to memory of 1060 1512 opngedecdbrtrsqr.exe 32 PID 1512 wrote to memory of 1060 1512 opngedecdbrtrsqr.exe 32 PID 736 wrote to memory of 1880 736 cyxxtsponc.exe 34 PID 736 wrote to memory of 1880 736 cyxxtsponc.exe 34 PID 736 wrote to memory of 1880 736 cyxxtsponc.exe 34 PID 736 wrote to memory of 1880 736 cyxxtsponc.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe"C:\Users\Admin\AppData\Local\Temp\475fb53ad0a86fccb2b2e71e4206c8d2fe62c9c25a035bb5a52903071c834d38.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Temp\opngedecdbrtrsqr.exeC:\Temp\opngedecdbrtrsqr.exe run2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\Temp\cyxxtsponc.exe ups_run3⤵
- Executes dropped EXE
PID:1060 -
C:\Temp\cyxxtsponc.exeC:\Temp\cyxxtsponc.exe ups_run4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:736 -
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release5⤵
- Executes dropped EXE
PID:1880 -
C:\windows\system32\ipconfig.exeC:\windows\system32\ipconfig.exe /release6⤵
- Gathers network information
PID:1092
-
-
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://xytets.com:2345/t.asp?os=home2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:792 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:908
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD52f3b498941f5e7bdf9dabd96f8d41712
SHA19484347485a1f96115b1af4c6ca41777b9bf880f
SHA256e1d0eee613b1d7811ef1c9a669c2169677d22975a06620f014700edcb26f8acb
SHA512585b76e2fb029f73653ea8699856d76511b578dfb21d3fe1acc9863635a6cf0b3cccd47cc258b06d1e146d9645a88dfe6debbcf0b329f24a30079282edc1395b
-
Filesize
3KB
MD52f3b498941f5e7bdf9dabd96f8d41712
SHA19484347485a1f96115b1af4c6ca41777b9bf880f
SHA256e1d0eee613b1d7811ef1c9a669c2169677d22975a06620f014700edcb26f8acb
SHA512585b76e2fb029f73653ea8699856d76511b578dfb21d3fe1acc9863635a6cf0b3cccd47cc258b06d1e146d9645a88dfe6debbcf0b329f24a30079282edc1395b
-
Filesize
361KB
MD5de43ef02ca74c0cf299bc4fd4b4acdcd
SHA1348d3c056a2c8c25dbbbccca33dbf57ca605201b
SHA256620d0e72b216021b695210b9340ad1af98b30394b9f04e2fa847a7261e24c2b8
SHA512410517e890be56e896b97f745a1151f03c0b1779631854e1e6dde1dd5738ad09a5c17539e5a53cfadcb416272ef46f917212e05a72fc6abbbd49b3f1dd3fb2cb
-
Filesize
361KB
MD5119ce39f8ed2a47a8dedf6bddd4f6975
SHA12b3165fe37eb1dcf4f4d029b84d10af5d82e4f39
SHA256a454327150a6141d37dc3ca4cb29e59094c078926622f8f71c6c8ccdaf892eb4
SHA512adfba388074f81dc2c55a2c9c8e479bf990b707a4acaf545e9580cbee7ee6c6606bf38e02bf8fea79fbbec038400eae8e1687bccbd564b79d05faa3fc8f6bbf9
-
Filesize
361KB
MD5119ce39f8ed2a47a8dedf6bddd4f6975
SHA12b3165fe37eb1dcf4f4d029b84d10af5d82e4f39
SHA256a454327150a6141d37dc3ca4cb29e59094c078926622f8f71c6c8ccdaf892eb4
SHA512adfba388074f81dc2c55a2c9c8e479bf990b707a4acaf545e9580cbee7ee6c6606bf38e02bf8fea79fbbec038400eae8e1687bccbd564b79d05faa3fc8f6bbf9
-
Filesize
605B
MD50651f1bc0baf460e4624441210de9265
SHA186109fa35c0465468fa42aacd8b570d04071017c
SHA256392cec91ce4aae55a21e051867bba74837a28e8e8a699b9d3e86b24ab7859fc7
SHA512e57934cfe469b7699225d7dc1594b148f2b69fd8333468caefea6fbfea0741b4ceebb8202868b0404c024112aa6e67d146d5f40394d7e5e1d2fd4d857a013a5d
-
Filesize
3KB
MD52f3b498941f5e7bdf9dabd96f8d41712
SHA19484347485a1f96115b1af4c6ca41777b9bf880f
SHA256e1d0eee613b1d7811ef1c9a669c2169677d22975a06620f014700edcb26f8acb
SHA512585b76e2fb029f73653ea8699856d76511b578dfb21d3fe1acc9863635a6cf0b3cccd47cc258b06d1e146d9645a88dfe6debbcf0b329f24a30079282edc1395b
-
Filesize
3KB
MD52f3b498941f5e7bdf9dabd96f8d41712
SHA19484347485a1f96115b1af4c6ca41777b9bf880f
SHA256e1d0eee613b1d7811ef1c9a669c2169677d22975a06620f014700edcb26f8acb
SHA512585b76e2fb029f73653ea8699856d76511b578dfb21d3fe1acc9863635a6cf0b3cccd47cc258b06d1e146d9645a88dfe6debbcf0b329f24a30079282edc1395b
-
Filesize
3KB
MD52f3b498941f5e7bdf9dabd96f8d41712
SHA19484347485a1f96115b1af4c6ca41777b9bf880f
SHA256e1d0eee613b1d7811ef1c9a669c2169677d22975a06620f014700edcb26f8acb
SHA512585b76e2fb029f73653ea8699856d76511b578dfb21d3fe1acc9863635a6cf0b3cccd47cc258b06d1e146d9645a88dfe6debbcf0b329f24a30079282edc1395b
-
Filesize
3KB
MD52f3b498941f5e7bdf9dabd96f8d41712
SHA19484347485a1f96115b1af4c6ca41777b9bf880f
SHA256e1d0eee613b1d7811ef1c9a669c2169677d22975a06620f014700edcb26f8acb
SHA512585b76e2fb029f73653ea8699856d76511b578dfb21d3fe1acc9863635a6cf0b3cccd47cc258b06d1e146d9645a88dfe6debbcf0b329f24a30079282edc1395b
-
Filesize
361KB
MD5119ce39f8ed2a47a8dedf6bddd4f6975
SHA12b3165fe37eb1dcf4f4d029b84d10af5d82e4f39
SHA256a454327150a6141d37dc3ca4cb29e59094c078926622f8f71c6c8ccdaf892eb4
SHA512adfba388074f81dc2c55a2c9c8e479bf990b707a4acaf545e9580cbee7ee6c6606bf38e02bf8fea79fbbec038400eae8e1687bccbd564b79d05faa3fc8f6bbf9