Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    180s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2022, 20:39

General

  • Target

    b1fc90cbed47c7c7e8db6ca4c567b23a3a2d783f4f88778da5492620f2b79f3c.exe

  • Size

    212KB

  • MD5

    5413dcbdbb2bd0d88776a31b83b11037

  • SHA1

    6e1f42b7256b8f5567154a320e2d8407a055ba4f

  • SHA256

    b1fc90cbed47c7c7e8db6ca4c567b23a3a2d783f4f88778da5492620f2b79f3c

  • SHA512

    821eb0886078520af1059529d92d820a58aee8c1f647198418fa09d569da2b6d8faf60c19bc558ac17d4aafa7ce4105ccc8e5f82c8320bd1393889578bca9161

  • SSDEEP

    6144:dcyyU/A5rZRLEhFTnRa26s+Wdz8V7Wdfwn1nbmuSDm3:dHp/urb4A1WdBfU

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 58 IoCs
  • Modifies registry class 60 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b1fc90cbed47c7c7e8db6ca4c567b23a3a2d783f4f88778da5492620f2b79f3c.exe
    "C:\Users\Admin\AppData\Local\Temp\b1fc90cbed47c7c7e8db6ca4c567b23a3a2d783f4f88778da5492620f2b79f3c.exe"
    1⤵
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1740
    • \??\c:\Program FilesEEL7F3.exe
      "c:\Program FilesEEL7F3.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:948
      • C:\Program Files\Internet Explorer\IEXPLORE.exe
        "C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/vplay.php
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1204
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1204 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1632
      • C:\Program Files\Internet Explorer\IEXPLORE.exe
        "C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/PPTV(pplive)_forjieku_977.html
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:972
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:972 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1308
    • C:\Windows\SysWOW64\WScript.Exe
      WScript.Exe jies.bak.vbs
      2⤵
      • Deletes itself
      PID:1940

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program FilesEEL7F3.exe

    Filesize

    36KB

    MD5

    c04250a762980b55d853ed1dbbfb5737

    SHA1

    0cfef8cea78f5d68255dd377c393a5cb4aa7729a

    SHA256

    92c0f1dcb8ce087f2261b5c438bc002a3774882507ebc1852560079a633ebb2d

    SHA512

    31317fa2290f39602bacffc00fa4faedda40fe363f24c366b39ec340011da49d9f509af7d74819972360382998094c465a8a5c04ff18e29e78a3a30928c0a0c9

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{D1A69191-5814-11ED-B2BF-6651945CA213}.dat

    Filesize

    5KB

    MD5

    4acfa2bab5e93a97dec760f605419ac1

    SHA1

    b5585d66e77022f340980ab2fa1f956ed746138a

    SHA256

    819b6ed9918af175ae776480f576891424ecd8bc7a694c7b55b40af4202cabd1

    SHA512

    0b004722510bac76dd597816325c99a259aefeac83ea1f5d5d390f7a3e1062e612f2c09435aff4e9f0b71b6d553fef53a6daf9cc2a5f41dba4b32de40481a894

  • C:\Users\Admin\AppData\Local\Temp\jies.bak.vbs

    Filesize

    486B

    MD5

    daa9cfa3312a0b4dc5e2db91a9aff4d7

    SHA1

    f5415f2e5e05042fa58db71a4b854c94d310c098

    SHA256

    bec9a0016f0a4ed336e28efaba8fcbe2216b62d59808f4c12cf74f6d4819fa2d

    SHA512

    75f70350a5e5f3ef62a539a094ebc9f3de38673a9080aa0c9c28bbe91ad9ecc6a6550f9ea1080314d86fba336c82b8de494ea01452ef77b54660187c716b5483

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\PFKVS3UV.txt

    Filesize

    608B

    MD5

    dd2134368778732cd68fe3ca20a31439

    SHA1

    00b54ca82ba18868715dd8c6556628d389e35f25

    SHA256

    9db10b0e575ccdf9c9210b8ee9abb31bbbfab47074f5d6d5c0ea97ab911b671a

    SHA512

    b39bffcf5de2b5cb206b4ec7d9ca7e1ebfec90d864cbb8fba2651bca6db51312bac41b69bd4da7ebf1a4a7ed4a096fc45f5c1e188250925d85746c25c9a043f9

  • memory/1740-56-0x0000000075CF1000-0x0000000075CF3000-memory.dmp

    Filesize

    8KB