Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29/10/2022, 01:53
Static task
static1
Behavioral task
behavioral1
Sample
e202a53eaa7000e41ecbe581c6853d48c4cf960423cefefd46857378c4b5a977.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e202a53eaa7000e41ecbe581c6853d48c4cf960423cefefd46857378c4b5a977.exe
Resource
win10v2004-20220812-en
General
-
Target
e202a53eaa7000e41ecbe581c6853d48c4cf960423cefefd46857378c4b5a977.exe
-
Size
160KB
-
MD5
002271ecc58590e9dcac187fc5b5bd86
-
SHA1
2bcae0358059894ae144812d63e07753d52c23ab
-
SHA256
e202a53eaa7000e41ecbe581c6853d48c4cf960423cefefd46857378c4b5a977
-
SHA512
3d6e36b0babfb91f79584ca8b0bc104f3e199ea5603e9e94899e7cf2a43ecf1651cd07bea139484942d3834f6ff37a2df86a2dee2c2510ad6f06cb87bf5ff6aa
-
SSDEEP
1536:F+gDbKlmyJKz5jR7766dxocisPfDsCUjhe+SPBp9oEoTTLgY++++1sY+++++ZDdM:FxbkuVbvLn7Uj3
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\46976 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\msihiphz.com" svchost.exe -
Executes dropped EXE 3 IoCs
pid Process 1780 xplorer.exe 752 xplorer.exe 1632 xplorer.exe -
resource yara_rule behavioral1/memory/672-57-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/672-59-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/672-60-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/672-63-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/672-64-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/672-68-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/672-103-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/752-109-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/752-112-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 672 e202a53eaa7000e41ecbe581c6853d48c4cf960423cefefd46857378c4b5a977.exe 672 e202a53eaa7000e41ecbe581c6853d48c4cf960423cefefd46857378c4b5a977.exe 672 e202a53eaa7000e41ecbe581c6853d48c4cf960423cefefd46857378c4b5a977.exe 672 e202a53eaa7000e41ecbe581c6853d48c4cf960423cefefd46857378c4b5a977.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\xplorer = "C:\\Windows\\xplorer\\xplorer.exe" reg.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA xplorer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA e202a53eaa7000e41ecbe581c6853d48c4cf960423cefefd46857378c4b5a977.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum xplorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 xplorer.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1344 set thread context of 672 1344 e202a53eaa7000e41ecbe581c6853d48c4cf960423cefefd46857378c4b5a977.exe 26 PID 1780 set thread context of 752 1780 xplorer.exe 31 PID 1780 set thread context of 1632 1780 xplorer.exe 32 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\msihiphz.com svchost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\xplorer\xplorer.exe e202a53eaa7000e41ecbe581c6853d48c4cf960423cefefd46857378c4b5a977.exe File opened for modification C:\Windows\xplorer\xplorer.exe e202a53eaa7000e41ecbe581c6853d48c4cf960423cefefd46857378c4b5a977.exe File opened for modification C:\Windows\xplorer\xplorer.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1632 xplorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1632 xplorer.exe 1632 xplorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe Token: SeDebugPrivilege 752 xplorer.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1344 e202a53eaa7000e41ecbe581c6853d48c4cf960423cefefd46857378c4b5a977.exe 672 e202a53eaa7000e41ecbe581c6853d48c4cf960423cefefd46857378c4b5a977.exe 1780 xplorer.exe 752 xplorer.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1344 wrote to memory of 672 1344 e202a53eaa7000e41ecbe581c6853d48c4cf960423cefefd46857378c4b5a977.exe 26 PID 1344 wrote to memory of 672 1344 e202a53eaa7000e41ecbe581c6853d48c4cf960423cefefd46857378c4b5a977.exe 26 PID 1344 wrote to memory of 672 1344 e202a53eaa7000e41ecbe581c6853d48c4cf960423cefefd46857378c4b5a977.exe 26 PID 1344 wrote to memory of 672 1344 e202a53eaa7000e41ecbe581c6853d48c4cf960423cefefd46857378c4b5a977.exe 26 PID 1344 wrote to memory of 672 1344 e202a53eaa7000e41ecbe581c6853d48c4cf960423cefefd46857378c4b5a977.exe 26 PID 1344 wrote to memory of 672 1344 e202a53eaa7000e41ecbe581c6853d48c4cf960423cefefd46857378c4b5a977.exe 26 PID 1344 wrote to memory of 672 1344 e202a53eaa7000e41ecbe581c6853d48c4cf960423cefefd46857378c4b5a977.exe 26 PID 1344 wrote to memory of 672 1344 e202a53eaa7000e41ecbe581c6853d48c4cf960423cefefd46857378c4b5a977.exe 26 PID 672 wrote to memory of 736 672 e202a53eaa7000e41ecbe581c6853d48c4cf960423cefefd46857378c4b5a977.exe 27 PID 672 wrote to memory of 736 672 e202a53eaa7000e41ecbe581c6853d48c4cf960423cefefd46857378c4b5a977.exe 27 PID 672 wrote to memory of 736 672 e202a53eaa7000e41ecbe581c6853d48c4cf960423cefefd46857378c4b5a977.exe 27 PID 672 wrote to memory of 736 672 e202a53eaa7000e41ecbe581c6853d48c4cf960423cefefd46857378c4b5a977.exe 27 PID 736 wrote to memory of 1756 736 cmd.exe 29 PID 736 wrote to memory of 1756 736 cmd.exe 29 PID 736 wrote to memory of 1756 736 cmd.exe 29 PID 736 wrote to memory of 1756 736 cmd.exe 29 PID 672 wrote to memory of 1780 672 e202a53eaa7000e41ecbe581c6853d48c4cf960423cefefd46857378c4b5a977.exe 30 PID 672 wrote to memory of 1780 672 e202a53eaa7000e41ecbe581c6853d48c4cf960423cefefd46857378c4b5a977.exe 30 PID 672 wrote to memory of 1780 672 e202a53eaa7000e41ecbe581c6853d48c4cf960423cefefd46857378c4b5a977.exe 30 PID 672 wrote to memory of 1780 672 e202a53eaa7000e41ecbe581c6853d48c4cf960423cefefd46857378c4b5a977.exe 30 PID 1780 wrote to memory of 752 1780 xplorer.exe 31 PID 1780 wrote to memory of 752 1780 xplorer.exe 31 PID 1780 wrote to memory of 752 1780 xplorer.exe 31 PID 1780 wrote to memory of 752 1780 xplorer.exe 31 PID 1780 wrote to memory of 752 1780 xplorer.exe 31 PID 1780 wrote to memory of 752 1780 xplorer.exe 31 PID 1780 wrote to memory of 752 1780 xplorer.exe 31 PID 1780 wrote to memory of 752 1780 xplorer.exe 31 PID 1780 wrote to memory of 1632 1780 xplorer.exe 32 PID 1780 wrote to memory of 1632 1780 xplorer.exe 32 PID 1780 wrote to memory of 1632 1780 xplorer.exe 32 PID 1780 wrote to memory of 1632 1780 xplorer.exe 32 PID 1780 wrote to memory of 1632 1780 xplorer.exe 32 PID 1780 wrote to memory of 1632 1780 xplorer.exe 32 PID 1780 wrote to memory of 1632 1780 xplorer.exe 32 PID 1632 wrote to memory of 1028 1632 xplorer.exe 33 PID 1632 wrote to memory of 1028 1632 xplorer.exe 33 PID 1632 wrote to memory of 1028 1632 xplorer.exe 33 PID 1632 wrote to memory of 1028 1632 xplorer.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\e202a53eaa7000e41ecbe581c6853d48c4cf960423cefefd46857378c4b5a977.exe"C:\Users\Admin\AppData\Local\Temp\e202a53eaa7000e41ecbe581c6853d48c4cf960423cefefd46857378c4b5a977.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\e202a53eaa7000e41ecbe581c6853d48c4cf960423cefefd46857378c4b5a977.exe"C:\Users\Admin\AppData\Local\Temp\e202a53eaa7000e41ecbe581c6853d48c4cf960423cefefd46857378c4b5a977.exe"2⤵
- Loads dropped DLL
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\LULAV.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "xplorer" /t REG_SZ /d "C:\Windows\xplorer\xplorer.exe" /f4⤵
- Adds Run key to start application
PID:1756
-
-
-
C:\Windows\xplorer\xplorer.exe"C:\Windows\xplorer\xplorer.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\xplorer\xplorer.exe"C:\Windows\xplorer\xplorer.exe"4⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:752
-
-
C:\Windows\xplorer\xplorer.exe"C:\Windows\xplorer\xplorer.exe"4⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\syswow64\svchost.exeC:\Windows\syswow64\svchost.exe5⤵
- Adds policy Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
PID:1028
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124B
MD54e6e99d38b1264af2b53a68c7cd6d648
SHA155ffe17732d1d9c539d702a1311ef9674fe7b3cf
SHA256168d9cdf4849fde3b4817db207e60934b6c877be439289f3fb3a4eb9e4326ff0
SHA512bde21abed1bfc3dbdd6afc83614aa27c3f33dfbb434e139523ac57ecd84875b0e96a241f5828eda0b055f787ec7f95850b0f4ab0ee752ac36484b2bfd78a859d
-
Filesize
160KB
MD5d2891e6e864c640062944719b22f50f8
SHA1248b19acac3ebed80afe4879dd73cc60982d63de
SHA25679b9b71dd15261e081c5ef113393775bc03dde604b4d991f167dd9dba4ad62b9
SHA512a57f6fddce8f4bc9dafc16c9efac2b78af635cb72b9b4c8c2bef7864cadba92fa74b06d722443b423456cb019cabf8f81456cd8d136404de3a14cf361a6cedb8
-
Filesize
160KB
MD5d2891e6e864c640062944719b22f50f8
SHA1248b19acac3ebed80afe4879dd73cc60982d63de
SHA25679b9b71dd15261e081c5ef113393775bc03dde604b4d991f167dd9dba4ad62b9
SHA512a57f6fddce8f4bc9dafc16c9efac2b78af635cb72b9b4c8c2bef7864cadba92fa74b06d722443b423456cb019cabf8f81456cd8d136404de3a14cf361a6cedb8
-
Filesize
160KB
MD5d2891e6e864c640062944719b22f50f8
SHA1248b19acac3ebed80afe4879dd73cc60982d63de
SHA25679b9b71dd15261e081c5ef113393775bc03dde604b4d991f167dd9dba4ad62b9
SHA512a57f6fddce8f4bc9dafc16c9efac2b78af635cb72b9b4c8c2bef7864cadba92fa74b06d722443b423456cb019cabf8f81456cd8d136404de3a14cf361a6cedb8
-
Filesize
160KB
MD5d2891e6e864c640062944719b22f50f8
SHA1248b19acac3ebed80afe4879dd73cc60982d63de
SHA25679b9b71dd15261e081c5ef113393775bc03dde604b4d991f167dd9dba4ad62b9
SHA512a57f6fddce8f4bc9dafc16c9efac2b78af635cb72b9b4c8c2bef7864cadba92fa74b06d722443b423456cb019cabf8f81456cd8d136404de3a14cf361a6cedb8
-
Filesize
160KB
MD5d2891e6e864c640062944719b22f50f8
SHA1248b19acac3ebed80afe4879dd73cc60982d63de
SHA25679b9b71dd15261e081c5ef113393775bc03dde604b4d991f167dd9dba4ad62b9
SHA512a57f6fddce8f4bc9dafc16c9efac2b78af635cb72b9b4c8c2bef7864cadba92fa74b06d722443b423456cb019cabf8f81456cd8d136404de3a14cf361a6cedb8
-
Filesize
160KB
MD5d2891e6e864c640062944719b22f50f8
SHA1248b19acac3ebed80afe4879dd73cc60982d63de
SHA25679b9b71dd15261e081c5ef113393775bc03dde604b4d991f167dd9dba4ad62b9
SHA512a57f6fddce8f4bc9dafc16c9efac2b78af635cb72b9b4c8c2bef7864cadba92fa74b06d722443b423456cb019cabf8f81456cd8d136404de3a14cf361a6cedb8
-
Filesize
160KB
MD5d2891e6e864c640062944719b22f50f8
SHA1248b19acac3ebed80afe4879dd73cc60982d63de
SHA25679b9b71dd15261e081c5ef113393775bc03dde604b4d991f167dd9dba4ad62b9
SHA512a57f6fddce8f4bc9dafc16c9efac2b78af635cb72b9b4c8c2bef7864cadba92fa74b06d722443b423456cb019cabf8f81456cd8d136404de3a14cf361a6cedb8
-
Filesize
160KB
MD5d2891e6e864c640062944719b22f50f8
SHA1248b19acac3ebed80afe4879dd73cc60982d63de
SHA25679b9b71dd15261e081c5ef113393775bc03dde604b4d991f167dd9dba4ad62b9
SHA512a57f6fddce8f4bc9dafc16c9efac2b78af635cb72b9b4c8c2bef7864cadba92fa74b06d722443b423456cb019cabf8f81456cd8d136404de3a14cf361a6cedb8