Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
188s -
max time network
88s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/11/2022, 16:12
Behavioral task
behavioral1
Sample
499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe
Resource
win10v2004-20220901-en
General
-
Target
499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe
-
Size
288KB
-
MD5
07c548dabc58a122a1c40b5a46db0ed0
-
SHA1
e70dc8f83ca92ae0b3ac9e735cbf6d55d2849dfb
-
SHA256
499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c
-
SHA512
dd2a7454db1755b0f196975d83060086ea8771dabce8141d09ef534a64e1d8626bcafa85e63d76252d109094d755491aee624c357f0c494ff62bef87ad72048e
-
SSDEEP
6144:UYZTNk3D6LyUXwLLk+cR3qh0GQ43VJRD0ew+/UO85Y0:USNC80I+cR3R03VseuO857
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe gphone.exe" 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe -
Disables Task Manager via registry modification
-
resource yara_rule behavioral1/memory/1640-55-0x0000000000400000-0x00000000004AC000-memory.dmp upx behavioral1/memory/1640-62-0x0000000000400000-0x00000000004AC000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Yahoo Messengger = "C:\\Windows\\system32\\gphone.exe" 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\a: 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe File opened (read-only) \??\g: 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe File opened (read-only) \??\h: 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe File opened (read-only) \??\l: 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe File opened (read-only) \??\p: 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe File opened (read-only) \??\y: 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe File opened (read-only) \??\e: 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe File opened (read-only) \??\i: 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe File opened (read-only) \??\j: 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe File opened (read-only) \??\n: 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe File opened (read-only) \??\q: 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe File opened (read-only) \??\u: 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe File opened (read-only) \??\w: 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe File opened (read-only) \??\x: 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe File opened (read-only) \??\z: 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe File opened (read-only) \??\b: 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe File opened (read-only) \??\m: 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe File opened (read-only) \??\v: 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe File opened (read-only) \??\f: 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe File opened (read-only) \??\k: 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe File opened (read-only) \??\o: 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe File opened (read-only) \??\r: 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe File opened (read-only) \??\s: 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe File opened (read-only) \??\t: 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe -
AutoIT Executable 2 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1640-55-0x0000000000400000-0x00000000004AC000-memory.dmp autoit_exe behavioral1/memory/1640-62-0x0000000000400000-0x00000000004AC000-memory.dmp autoit_exe -
Drops autorun.inf file 1 TTPs 1 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created \??\d:\autorun.inf 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\gphone.exe 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe File opened for modification C:\Windows\SysWOW64\gphone.exe 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe File opened for modification C:\Windows\SysWOW64\autorun.ini 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\gphone.exe 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe File opened for modification C:\Windows\gphone.exe 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Main 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Page_URL = "http://rnd009.googlepages.com/google.html" 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Default_Search_URL = "http://rnd009.googlepages.com/google.html" 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Search Page = "http://rnd009.googlepages.com/google.html" 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\MAIN\Start Page = "http://rnd009.googlepages.com/google.html" 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "http://rnd009.googlepages.com/google.html" 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2012 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 28 PID 1640 wrote to memory of 2012 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 28 PID 1640 wrote to memory of 2012 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 28 PID 1640 wrote to memory of 2012 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 28 PID 2012 wrote to memory of 1712 2012 cmd.exe 30 PID 2012 wrote to memory of 1712 2012 cmd.exe 30 PID 2012 wrote to memory of 1712 2012 cmd.exe 30 PID 2012 wrote to memory of 1712 2012 cmd.exe 30 PID 1640 wrote to memory of 1988 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 31 PID 1640 wrote to memory of 1988 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 31 PID 1640 wrote to memory of 1988 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 31 PID 1640 wrote to memory of 1988 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 31 PID 1988 wrote to memory of 1944 1988 cmd.exe 33 PID 1988 wrote to memory of 1944 1988 cmd.exe 33 PID 1988 wrote to memory of 1944 1988 cmd.exe 33 PID 1988 wrote to memory of 1944 1988 cmd.exe 33 PID 1640 wrote to memory of 420 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 36 PID 1640 wrote to memory of 420 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 36 PID 1640 wrote to memory of 420 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 36 PID 1640 wrote to memory of 420 1640 499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe 36 PID 420 wrote to memory of 1464 420 cmd.exe 38 PID 420 wrote to memory of 1464 420 cmd.exe 38 PID 420 wrote to memory of 1464 420 cmd.exe 38 PID 420 wrote to memory of 1464 420 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe"C:\Users\Admin\AppData\Local\Temp\499d05e36ad8ab973d4fc771de426f20ee8ffe0c358bf7595a008f68983e247c.exe"1⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Adds Run key to start application
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT /delete /yes2⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\at.exeAT /delete /yes3⤵PID:1712
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C AT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\gphone.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\at.exeAT 09:00 /interactive /EVERY:m,t,w,th,f,s,su C:\Windows\system32\gphone.exe3⤵PID:1944
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C cacls "C:\system volume information" /e /g "Admin":f2⤵
- Suspicious use of WriteProcessMemory
PID:420 -
C:\Windows\SysWOW64\cacls.execacls "C:\system volume information" /e /g "Admin":f3⤵PID:1464
-
-