Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
172s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 19:30
Static task
static1
Behavioral task
behavioral1
Sample
134667eda244e0bdc151e0c969855fbe55d5af5db8f5e92acf6675d55085d1d1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
134667eda244e0bdc151e0c969855fbe55d5af5db8f5e92acf6675d55085d1d1.exe
Resource
win10v2004-20220812-en
General
-
Target
134667eda244e0bdc151e0c969855fbe55d5af5db8f5e92acf6675d55085d1d1.exe
-
Size
160KB
-
MD5
14a43c0702a81207bdbd22761aaea451
-
SHA1
9da9b834dea2a7264594df45816c34e3398038a8
-
SHA256
134667eda244e0bdc151e0c969855fbe55d5af5db8f5e92acf6675d55085d1d1
-
SHA512
16131d4c2bea45f67ca385b220f33175a4ca6ff8a565cdda1c6b187cb97fc3dc827c4cdf2a1e186ba862c686413a7f4c326dd86a78d462fc0f20470256ea85d4
-
SSDEEP
1536:F+gDbKlmyJKz5jR7766dxocisPfDsCUjhe+SPBp9oEoTTLgY++++1sY+++++ZDdM:FxbkuVbvLn7Uj3
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\31695 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\msmyfvocr.com" svchost.exe -
Executes dropped EXE 3 IoCs
pid Process 1136 xplorer.exe 516 xplorer.exe 2036 xplorer.exe -
resource yara_rule behavioral1/memory/1644-57-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1644-59-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1644-60-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1644-63-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1644-65-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1644-68-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1644-104-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/516-106-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/516-112-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Loads dropped DLL 6 IoCs
pid Process 1644 134667eda244e0bdc151e0c969855fbe55d5af5db8f5e92acf6675d55085d1d1.exe 1644 134667eda244e0bdc151e0c969855fbe55d5af5db8f5e92acf6675d55085d1d1.exe 1644 134667eda244e0bdc151e0c969855fbe55d5af5db8f5e92acf6675d55085d1d1.exe 1644 134667eda244e0bdc151e0c969855fbe55d5af5db8f5e92acf6675d55085d1d1.exe 1136 xplorer.exe 1136 xplorer.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\xplorer = "C:\\Windows\\xplorer\\xplorer.exe" reg.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 134667eda244e0bdc151e0c969855fbe55d5af5db8f5e92acf6675d55085d1d1.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA xplorer.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum xplorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 xplorer.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1680 set thread context of 1644 1680 134667eda244e0bdc151e0c969855fbe55d5af5db8f5e92acf6675d55085d1d1.exe 28 PID 1136 set thread context of 516 1136 xplorer.exe 33 PID 1136 set thread context of 2036 1136 xplorer.exe 34 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\msmyfvocr.com svchost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\xplorer\xplorer.exe 134667eda244e0bdc151e0c969855fbe55d5af5db8f5e92acf6675d55085d1d1.exe File opened for modification C:\Windows\xplorer\xplorer.exe 134667eda244e0bdc151e0c969855fbe55d5af5db8f5e92acf6675d55085d1d1.exe File opened for modification C:\Windows\xplorer\xplorer.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2036 xplorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2036 xplorer.exe 2036 xplorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe Token: SeDebugPrivilege 516 xplorer.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1680 134667eda244e0bdc151e0c969855fbe55d5af5db8f5e92acf6675d55085d1d1.exe 1644 134667eda244e0bdc151e0c969855fbe55d5af5db8f5e92acf6675d55085d1d1.exe 1136 xplorer.exe 516 xplorer.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1680 wrote to memory of 1644 1680 134667eda244e0bdc151e0c969855fbe55d5af5db8f5e92acf6675d55085d1d1.exe 28 PID 1680 wrote to memory of 1644 1680 134667eda244e0bdc151e0c969855fbe55d5af5db8f5e92acf6675d55085d1d1.exe 28 PID 1680 wrote to memory of 1644 1680 134667eda244e0bdc151e0c969855fbe55d5af5db8f5e92acf6675d55085d1d1.exe 28 PID 1680 wrote to memory of 1644 1680 134667eda244e0bdc151e0c969855fbe55d5af5db8f5e92acf6675d55085d1d1.exe 28 PID 1680 wrote to memory of 1644 1680 134667eda244e0bdc151e0c969855fbe55d5af5db8f5e92acf6675d55085d1d1.exe 28 PID 1680 wrote to memory of 1644 1680 134667eda244e0bdc151e0c969855fbe55d5af5db8f5e92acf6675d55085d1d1.exe 28 PID 1680 wrote to memory of 1644 1680 134667eda244e0bdc151e0c969855fbe55d5af5db8f5e92acf6675d55085d1d1.exe 28 PID 1680 wrote to memory of 1644 1680 134667eda244e0bdc151e0c969855fbe55d5af5db8f5e92acf6675d55085d1d1.exe 28 PID 1644 wrote to memory of 1984 1644 134667eda244e0bdc151e0c969855fbe55d5af5db8f5e92acf6675d55085d1d1.exe 29 PID 1644 wrote to memory of 1984 1644 134667eda244e0bdc151e0c969855fbe55d5af5db8f5e92acf6675d55085d1d1.exe 29 PID 1644 wrote to memory of 1984 1644 134667eda244e0bdc151e0c969855fbe55d5af5db8f5e92acf6675d55085d1d1.exe 29 PID 1644 wrote to memory of 1984 1644 134667eda244e0bdc151e0c969855fbe55d5af5db8f5e92acf6675d55085d1d1.exe 29 PID 1984 wrote to memory of 1952 1984 cmd.exe 31 PID 1984 wrote to memory of 1952 1984 cmd.exe 31 PID 1984 wrote to memory of 1952 1984 cmd.exe 31 PID 1984 wrote to memory of 1952 1984 cmd.exe 31 PID 1644 wrote to memory of 1136 1644 134667eda244e0bdc151e0c969855fbe55d5af5db8f5e92acf6675d55085d1d1.exe 32 PID 1644 wrote to memory of 1136 1644 134667eda244e0bdc151e0c969855fbe55d5af5db8f5e92acf6675d55085d1d1.exe 32 PID 1644 wrote to memory of 1136 1644 134667eda244e0bdc151e0c969855fbe55d5af5db8f5e92acf6675d55085d1d1.exe 32 PID 1644 wrote to memory of 1136 1644 134667eda244e0bdc151e0c969855fbe55d5af5db8f5e92acf6675d55085d1d1.exe 32 PID 1136 wrote to memory of 516 1136 xplorer.exe 33 PID 1136 wrote to memory of 516 1136 xplorer.exe 33 PID 1136 wrote to memory of 516 1136 xplorer.exe 33 PID 1136 wrote to memory of 516 1136 xplorer.exe 33 PID 1136 wrote to memory of 516 1136 xplorer.exe 33 PID 1136 wrote to memory of 516 1136 xplorer.exe 33 PID 1136 wrote to memory of 516 1136 xplorer.exe 33 PID 1136 wrote to memory of 516 1136 xplorer.exe 33 PID 1136 wrote to memory of 2036 1136 xplorer.exe 34 PID 1136 wrote to memory of 2036 1136 xplorer.exe 34 PID 1136 wrote to memory of 2036 1136 xplorer.exe 34 PID 1136 wrote to memory of 2036 1136 xplorer.exe 34 PID 1136 wrote to memory of 2036 1136 xplorer.exe 34 PID 1136 wrote to memory of 2036 1136 xplorer.exe 34 PID 1136 wrote to memory of 2036 1136 xplorer.exe 34 PID 2036 wrote to memory of 976 2036 xplorer.exe 35 PID 2036 wrote to memory of 976 2036 xplorer.exe 35 PID 2036 wrote to memory of 976 2036 xplorer.exe 35 PID 2036 wrote to memory of 976 2036 xplorer.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\134667eda244e0bdc151e0c969855fbe55d5af5db8f5e92acf6675d55085d1d1.exe"C:\Users\Admin\AppData\Local\Temp\134667eda244e0bdc151e0c969855fbe55d5af5db8f5e92acf6675d55085d1d1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\134667eda244e0bdc151e0c969855fbe55d5af5db8f5e92acf6675d55085d1d1.exe"C:\Users\Admin\AppData\Local\Temp\134667eda244e0bdc151e0c969855fbe55d5af5db8f5e92acf6675d55085d1d1.exe"2⤵
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\UKGFS.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "xplorer" /t REG_SZ /d "C:\Windows\xplorer\xplorer.exe" /f4⤵
- Adds Run key to start application
PID:1952
-
-
-
C:\Windows\xplorer\xplorer.exe"C:\Windows\xplorer\xplorer.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\xplorer\xplorer.exe"C:\Windows\xplorer\xplorer.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:516
-
-
C:\Windows\xplorer\xplorer.exe"C:\Windows\xplorer\xplorer.exe"4⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\syswow64\svchost.exeC:\Windows\syswow64\svchost.exe5⤵
- Adds policy Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
PID:976
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124B
MD54e6e99d38b1264af2b53a68c7cd6d648
SHA155ffe17732d1d9c539d702a1311ef9674fe7b3cf
SHA256168d9cdf4849fde3b4817db207e60934b6c877be439289f3fb3a4eb9e4326ff0
SHA512bde21abed1bfc3dbdd6afc83614aa27c3f33dfbb434e139523ac57ecd84875b0e96a241f5828eda0b055f787ec7f95850b0f4ab0ee752ac36484b2bfd78a859d
-
Filesize
160KB
MD5427c757769a0ab997f868b41eac4d77b
SHA17f3f793d2b1c0effb1f7a953f0f640171bc1e43e
SHA25651ffdd0710e2058e4459b458b16834f2dff66dc44532c060b5ebbc7190d6f5d4
SHA51275674454374068b330ffa4659d710a06db7252bdc21a32b949471686f6a4665e40796d3b5926b048dd1e1ebb6ffbf273a53c75ada7b3ac05f966381e77f0c4ab
-
Filesize
160KB
MD5427c757769a0ab997f868b41eac4d77b
SHA17f3f793d2b1c0effb1f7a953f0f640171bc1e43e
SHA25651ffdd0710e2058e4459b458b16834f2dff66dc44532c060b5ebbc7190d6f5d4
SHA51275674454374068b330ffa4659d710a06db7252bdc21a32b949471686f6a4665e40796d3b5926b048dd1e1ebb6ffbf273a53c75ada7b3ac05f966381e77f0c4ab
-
Filesize
160KB
MD5427c757769a0ab997f868b41eac4d77b
SHA17f3f793d2b1c0effb1f7a953f0f640171bc1e43e
SHA25651ffdd0710e2058e4459b458b16834f2dff66dc44532c060b5ebbc7190d6f5d4
SHA51275674454374068b330ffa4659d710a06db7252bdc21a32b949471686f6a4665e40796d3b5926b048dd1e1ebb6ffbf273a53c75ada7b3ac05f966381e77f0c4ab
-
Filesize
160KB
MD5427c757769a0ab997f868b41eac4d77b
SHA17f3f793d2b1c0effb1f7a953f0f640171bc1e43e
SHA25651ffdd0710e2058e4459b458b16834f2dff66dc44532c060b5ebbc7190d6f5d4
SHA51275674454374068b330ffa4659d710a06db7252bdc21a32b949471686f6a4665e40796d3b5926b048dd1e1ebb6ffbf273a53c75ada7b3ac05f966381e77f0c4ab
-
Filesize
160KB
MD5427c757769a0ab997f868b41eac4d77b
SHA17f3f793d2b1c0effb1f7a953f0f640171bc1e43e
SHA25651ffdd0710e2058e4459b458b16834f2dff66dc44532c060b5ebbc7190d6f5d4
SHA51275674454374068b330ffa4659d710a06db7252bdc21a32b949471686f6a4665e40796d3b5926b048dd1e1ebb6ffbf273a53c75ada7b3ac05f966381e77f0c4ab
-
Filesize
160KB
MD5427c757769a0ab997f868b41eac4d77b
SHA17f3f793d2b1c0effb1f7a953f0f640171bc1e43e
SHA25651ffdd0710e2058e4459b458b16834f2dff66dc44532c060b5ebbc7190d6f5d4
SHA51275674454374068b330ffa4659d710a06db7252bdc21a32b949471686f6a4665e40796d3b5926b048dd1e1ebb6ffbf273a53c75ada7b3ac05f966381e77f0c4ab
-
Filesize
160KB
MD5427c757769a0ab997f868b41eac4d77b
SHA17f3f793d2b1c0effb1f7a953f0f640171bc1e43e
SHA25651ffdd0710e2058e4459b458b16834f2dff66dc44532c060b5ebbc7190d6f5d4
SHA51275674454374068b330ffa4659d710a06db7252bdc21a32b949471686f6a4665e40796d3b5926b048dd1e1ebb6ffbf273a53c75ada7b3ac05f966381e77f0c4ab
-
Filesize
160KB
MD5427c757769a0ab997f868b41eac4d77b
SHA17f3f793d2b1c0effb1f7a953f0f640171bc1e43e
SHA25651ffdd0710e2058e4459b458b16834f2dff66dc44532c060b5ebbc7190d6f5d4
SHA51275674454374068b330ffa4659d710a06db7252bdc21a32b949471686f6a4665e40796d3b5926b048dd1e1ebb6ffbf273a53c75ada7b3ac05f966381e77f0c4ab
-
Filesize
160KB
MD5427c757769a0ab997f868b41eac4d77b
SHA17f3f793d2b1c0effb1f7a953f0f640171bc1e43e
SHA25651ffdd0710e2058e4459b458b16834f2dff66dc44532c060b5ebbc7190d6f5d4
SHA51275674454374068b330ffa4659d710a06db7252bdc21a32b949471686f6a4665e40796d3b5926b048dd1e1ebb6ffbf273a53c75ada7b3ac05f966381e77f0c4ab
-
Filesize
160KB
MD5427c757769a0ab997f868b41eac4d77b
SHA17f3f793d2b1c0effb1f7a953f0f640171bc1e43e
SHA25651ffdd0710e2058e4459b458b16834f2dff66dc44532c060b5ebbc7190d6f5d4
SHA51275674454374068b330ffa4659d710a06db7252bdc21a32b949471686f6a4665e40796d3b5926b048dd1e1ebb6ffbf273a53c75ada7b3ac05f966381e77f0c4ab