Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
174s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
30/10/2022, 05:11
Behavioral task
behavioral1
Sample
974d4ad18807a4b58284bfb01eec98136d465281b0180682d7fb9c8650550b7f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
974d4ad18807a4b58284bfb01eec98136d465281b0180682d7fb9c8650550b7f.exe
Resource
win10v2004-20220812-en
General
-
Target
974d4ad18807a4b58284bfb01eec98136d465281b0180682d7fb9c8650550b7f.exe
-
Size
139KB
-
MD5
a2ac60fa95b1e2d98252b7e86e4a027e
-
SHA1
1afcb183d78bf94b58f0ed59ebc15ba40b1b58ca
-
SHA256
974d4ad18807a4b58284bfb01eec98136d465281b0180682d7fb9c8650550b7f
-
SHA512
8faeb3e7f933df7e4084434636a0861a9c2e8be7f976d39c87653105eb03156797178cc4b859989d26b80bf980fe42187b8f5965fdb1d1429c15f0ad477d5aa3
-
SSDEEP
3072:3CpRq0P0gSlzkMBEHfHa0KmRTrqeD2oWTZoN7VBRcIyOjP0aO:qlPQzK60xWoWSN7Bv
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run 974d4ad18807a4b58284bfb01eec98136d465281b0180682d7fb9c8650550b7f.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\wmplayer = "C:\\MessengerPlus\\wmplayer.exe" 974d4ad18807a4b58284bfb01eec98136d465281b0180682d7fb9c8650550b7f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "373916736" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000062e6ef0d45f4454ab79548c962d74cdf000000000200000000001066000000010000200000009ca4a49e84a5a8247b2a1c298ee1e8063886ec8a9d92d738eca90b4266c79a3c000000000e8000000002000020000000d2c4e99484c960558cc69fefd470560dd8b601baf3c4f118d613bf790736cd23200000009a26080b63f3987e144fdff004c518d7bd293e5a6baf3f2bcb5a862992507b5040000000cfb48b85aab7f9d6903508cf69d33e6758fbc3a380efff0d351212601c56b5f0be5a2644b0acfe1d2f53ddd2d8b057f471c6554c5c7bc6fa2b514b611923ff9e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Download 974d4ad18807a4b58284bfb01eec98136d465281b0180682d7fb9c8650550b7f.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{325C1F91-587A-11ED-B390-DA7E66F9F45D} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" 974d4ad18807a4b58284bfb01eec98136d465281b0180682d7fb9c8650550b7f.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Download\RunInvalidSignatures = "00000001" 974d4ad18807a4b58284bfb01eec98136d465281b0180682d7fb9c8650550b7f.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 3044f12887ecd801 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1124 iexplore.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 808 974d4ad18807a4b58284bfb01eec98136d465281b0180682d7fb9c8650550b7f.exe 1124 iexplore.exe 1124 iexplore.exe 1564 IEXPLORE.EXE 1564 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 808 wrote to memory of 1124 808 974d4ad18807a4b58284bfb01eec98136d465281b0180682d7fb9c8650550b7f.exe 27 PID 808 wrote to memory of 1124 808 974d4ad18807a4b58284bfb01eec98136d465281b0180682d7fb9c8650550b7f.exe 27 PID 808 wrote to memory of 1124 808 974d4ad18807a4b58284bfb01eec98136d465281b0180682d7fb9c8650550b7f.exe 27 PID 808 wrote to memory of 1124 808 974d4ad18807a4b58284bfb01eec98136d465281b0180682d7fb9c8650550b7f.exe 27 PID 1124 wrote to memory of 1564 1124 iexplore.exe 29 PID 1124 wrote to memory of 1564 1124 iexplore.exe 29 PID 1124 wrote to memory of 1564 1124 iexplore.exe 29 PID 1124 wrote to memory of 1564 1124 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\974d4ad18807a4b58284bfb01eec98136d465281b0180682d7fb9c8650550b7f.exe"C:\Users\Admin\AppData\Local\Temp\974d4ad18807a4b58284bfb01eec98136d465281b0180682d7fb9c8650550b7f.exe"1⤵
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://www.youtube.com/watch?v=tkFQS92d6gw2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1124 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1564
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize340B
MD59360fb5dc5be77398bd0078ed99d63a1
SHA16aa4fe5e1d06b1c53d772d61554af5e27f7f46f8
SHA256f01e9c4a4939684998212501d9143c6456979580375b1d11744fadf5af550d47
SHA512f41447b6192704d235d9da233f35e326b13b693fd67616bc691d56233284be29028672a6d9a0913b1c951f85785c08c93d40f05d5a334d17e9f9da6248b209ed
-
Filesize
5KB
MD53ba8449b4f122cd0f49d1dca5a295f07
SHA198b9a50ab6e67e7588c067fd03d88fbe3b5b0e77
SHA2561b9df084339bdf925fa78810c92d9874b38081f18cb3acc5c00969a2f9678251
SHA512cd504f6dc9741c813fb3c0423297b54d4f055c395ded2c2d68448aa9fbd23b857b94355bd366f9bb9dff6e38eaf1ed38bf098707a90993a34c12fa6590f94c79
-
Filesize
603B
MD55d542244d6b8fe1aa5e0e7018559401a
SHA1572903cefe740c650467a7988a4b8fcbf5603fc3
SHA256bf2d97ce932c102ee7088ee546ca4105ca92d5966ded172064ea622b22897a10
SHA512ba5149fe32f848d6d20d5e3115602fa84fe62481b8c97794d0bacb598b12dc53d366213e6c002aa86615811e6c02ca65b33bca4d581ff8f594398b9c772ca551