Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 21:58
Static task
static1
Behavioral task
behavioral1
Sample
84cf608fffe5ad67aad2f913953ac950dfd803f40267111709e98d1485ca8b90.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
84cf608fffe5ad67aad2f913953ac950dfd803f40267111709e98d1485ca8b90.exe
Resource
win10v2004-20220901-en
General
-
Target
84cf608fffe5ad67aad2f913953ac950dfd803f40267111709e98d1485ca8b90.exe
-
Size
286KB
-
MD5
93ae065f559a891f6e3ea4abeb58d036
-
SHA1
073596e51d809e227aeb5984142e93c2526179c6
-
SHA256
84cf608fffe5ad67aad2f913953ac950dfd803f40267111709e98d1485ca8b90
-
SHA512
47c13d211da60bba0ad0a5d90d820e16516e6c21f2ba0705f1c040598597a7e7295557b92f9a9cbe0cc87ba4769fe6a8572086247f82a26768b064d2c283d5d5
-
SSDEEP
6144:RDKW1Lgbdl0TBBvjc/TWawZq8CC95GpQWQByQWBoG2oJ:hh1Lk70TnvjcBwtCC7GprMGoGTJ
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "121" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "115" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "197" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "6597" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "282" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "6" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "197" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000d3b98f5693c0d24b85f349229339c59c0000000002000000000010660000000100002000000009f09f5b87e55e01323d4d7bf05a8c1960760edd68995ded90aac95a132099fe000000000e8000000002000020000000abcc0b840d76cc8ee87a5df70fde5d80ac5cfc0b9d144e2147b93753534eb9e720000000074fb12f5f18ddca5a995fa6abbe41cc94752b9045abec637b984d46528da4f74000000070475912e7560ec2522d70421cc8c65f39656a878b0951c57286c5759fc3483a75249a1a18b76ead40b09893d6b0501c5202fe322b28921d8b397d7597f1a0b7 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\hugedomains.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "121" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "373089371" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{E2555E91-50F3-11ED-A964-EAF6071D98F9} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "115" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "6597" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "282" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e01923cd00e5d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\hugedomains.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "115" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "6" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.youtube.com\ = "6" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "121" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\youtube.com\Total = "6597" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "282" IEXPLORE.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1248 84cf608fffe5ad67aad2f913953ac950dfd803f40267111709e98d1485ca8b90.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 952 iexplore.exe 1124 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 952 iexplore.exe 952 iexplore.exe 1124 iexplore.exe 1124 iexplore.exe 1520 IEXPLORE.EXE 1520 IEXPLORE.EXE 776 IEXPLORE.EXE 776 IEXPLORE.EXE 1520 IEXPLORE.EXE 1520 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1248 wrote to memory of 1124 1248 84cf608fffe5ad67aad2f913953ac950dfd803f40267111709e98d1485ca8b90.exe 26 PID 1248 wrote to memory of 1124 1248 84cf608fffe5ad67aad2f913953ac950dfd803f40267111709e98d1485ca8b90.exe 26 PID 1248 wrote to memory of 1124 1248 84cf608fffe5ad67aad2f913953ac950dfd803f40267111709e98d1485ca8b90.exe 26 PID 1248 wrote to memory of 1124 1248 84cf608fffe5ad67aad2f913953ac950dfd803f40267111709e98d1485ca8b90.exe 26 PID 1248 wrote to memory of 952 1248 84cf608fffe5ad67aad2f913953ac950dfd803f40267111709e98d1485ca8b90.exe 27 PID 1248 wrote to memory of 952 1248 84cf608fffe5ad67aad2f913953ac950dfd803f40267111709e98d1485ca8b90.exe 27 PID 1248 wrote to memory of 952 1248 84cf608fffe5ad67aad2f913953ac950dfd803f40267111709e98d1485ca8b90.exe 27 PID 1248 wrote to memory of 952 1248 84cf608fffe5ad67aad2f913953ac950dfd803f40267111709e98d1485ca8b90.exe 27 PID 952 wrote to memory of 776 952 iexplore.exe 30 PID 952 wrote to memory of 776 952 iexplore.exe 30 PID 952 wrote to memory of 776 952 iexplore.exe 30 PID 952 wrote to memory of 776 952 iexplore.exe 30 PID 1124 wrote to memory of 1520 1124 iexplore.exe 29 PID 1124 wrote to memory of 1520 1124 iexplore.exe 29 PID 1124 wrote to memory of 1520 1124 iexplore.exe 29 PID 1124 wrote to memory of 1520 1124 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\84cf608fffe5ad67aad2f913953ac950dfd803f40267111709e98d1485ca8b90.exe"C:\Users\Admin\AppData\Local\Temp\84cf608fffe5ad67aad2f913953ac950dfd803f40267111709e98d1485ca8b90.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://badeshan.com/2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1124 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1520
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://www.facebook.com/emre.turgut.315212⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:952 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:776
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD5d15aaa7c9be910a9898260767e2490e1
SHA12090c53f8d9fc3fbdbafd3a1e4dc25520eb74388
SHA256f8ebaaf487cba0c81a17c8cd680bdd2dd8e90d2114ecc54844cffc0cc647848e
SHA5127e1c1a683914b961b5cc2fe5e4ae288b60bab43bfaa21ce4972772aa0589615c19f57e672e1d93e50a7ed7b76fbd2f1b421089dcaed277120b93f8e91b18af94
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize340B
MD50df4831226d6ceb34345636e36b85d1a
SHA13291656541c8e3aeaf97c1d8e57e26a21c56e429
SHA256ab26e2d2e6c43d44cb240638d54ca0bdafb22b70d9ed73c78b17b074f5691417
SHA512572a30503ff9e2e35e427c044d0b88f729bedf4c7581a82d81105fc0de4a2d4caa23a55e2a271bb8c8932018eaf51c1e356a4488a2e916c9b3c6541aa941bf3c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fd16ac1e8e5621d83e1236e8f10d0ed3
SHA1cb751954fac6fa65bab073e017d168346c3969b0
SHA25697a6c8b655d8f6bc4de399b9e9315798f71ff8427bde3d059456ba7964b1d68a
SHA51201ad2f967724e16b31a403f69714370a2b7118fa84b8566b2dd65c0862020f4befd2fafca624aee7d21ff386ac783bd5ece7092fe8c41cc478d1284e0b3127a4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5920c61ba123f65018a6802401d4f2659
SHA1ae7e93ef68019bedf02948f4315968c91fe27eac
SHA256dfe5dd01993b6c6bc6e77dfe96f4e9108776693de0bc5c724673a92088e79c55
SHA512d62ca7d72f00a139a33f64fa34e4c61a165c397e1285c2bd934ff40874c0b2141e3a26cb5a9ded27773be147b7d0963b0e93cbe5ff499e04a62a7f369ae25274
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{E2555E91-50F3-11ED-A964-EAF6071D98F9}.dat
Filesize5KB
MD5c636d276db74c5046aea1cfc218799f2
SHA1d9f7d3697e8689824e3ea696f7308560c57057f1
SHA256a23059df94b54ce5c88c1dd9efe5b7aba61fa354062334885dbea04b6f97b121
SHA512044125f7861ea218ba1d54b364a398ecd1a31245e1db46e20c6e59b6115c40bb2973073167d7acfa21c69b28d553c221eb9f2261607b6ea424ae1db02ab2c3c2
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{E25C82B1-50F3-11ED-A964-EAF6071D98F9}.dat
Filesize4KB
MD5fa4a9e491ed6d6dbe0563e07c028fb1d
SHA125bfb1d2ac1612c7c1eb22e20979b3a6b4d0ce9e
SHA25662fd933f5682ddf5d76daa25bbc20d0211da6aa164b7b624fc7528037d5767cd
SHA5129786afeb1861920b3442105bf4fcfa9e91282bd8a931e68faeedeba7148aa64051fc29bcf83dfdb9a03186099078b376c06458251410a78901485d238d97afbb
-
Filesize
5KB
MD5dd21c9b1f04dcd9d1831b3eb53cb27a8
SHA1bcd1147300a981752d7149ff0fb5175ab2acebd8
SHA25680671a6dc9d5e987c372d09457577798332cb2c476020071155961435e4039fc
SHA5129e4f02a968fed1a2435046fe58dba164d1414eaaa3555a10235c28f29eab609a20c61044c50bee44c0b95bd662a041bb7ec0902d1357d3e8f059431ab399d1dc
-
Filesize
606B
MD515c92ed7996282ab89bcd094f561bff7
SHA12a0c95443c9840cde35bed082eca9df306a0c932
SHA256346cde61423599655aff86f5b1f187e7d927b0b3c0623b408386c8d721d5f6bd
SHA51273c24be81de7cf294b9fd2defc1f2645cf26bd21fd8f7d8e6b1072b43e9e803cef15f941cc2f032cc26df4389634c9baae2300eb1bad1d88e04efd0f6b06aa6c