Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07/11/2022, 09:42 UTC
Static task
static1
Behavioral task
behavioral1
Sample
ab6fe618e09399709a8337cce0fcd8fa233144283681a10d7c7eac475d79c07f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ab6fe618e09399709a8337cce0fcd8fa233144283681a10d7c7eac475d79c07f.exe
Resource
win10v2004-20220901-en
General
-
Target
ab6fe618e09399709a8337cce0fcd8fa233144283681a10d7c7eac475d79c07f.exe
-
Size
476KB
-
MD5
89c4bf7297f085059f17b0ba1aa9c28d
-
SHA1
f745c646fdf028af68934ed508ea59196690c6d6
-
SHA256
ab6fe618e09399709a8337cce0fcd8fa233144283681a10d7c7eac475d79c07f
-
SHA512
3b4e5f9fb6440d8ca00d6c186cf8d8a541705d27b2e2e293c8742a54c531f73d23a6e1bd4a99d9a327b8f71aa95b8887df336c48844d8427946517ca6f3241e9
-
SSDEEP
12288:st5AZ4CH2jUyobbWxLxKveZt/nNrV7LS8W:5Z4CWonixKverN9ZW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1368 izsilaivzltjlbd.exe -
Loads dropped DLL 2 IoCs
pid Process 1008 ab6fe618e09399709a8337cce0fcd8fa233144283681a10d7c7eac475d79c07f.exe 1008 ab6fe618e09399709a8337cce0fcd8fa233144283681a10d7c7eac475d79c07f.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main izsilaivzltjlbd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1368 izsilaivzltjlbd.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1368 izsilaivzltjlbd.exe 1368 izsilaivzltjlbd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1008 wrote to memory of 1368 1008 ab6fe618e09399709a8337cce0fcd8fa233144283681a10d7c7eac475d79c07f.exe 28 PID 1008 wrote to memory of 1368 1008 ab6fe618e09399709a8337cce0fcd8fa233144283681a10d7c7eac475d79c07f.exe 28 PID 1008 wrote to memory of 1368 1008 ab6fe618e09399709a8337cce0fcd8fa233144283681a10d7c7eac475d79c07f.exe 28 PID 1008 wrote to memory of 1368 1008 ab6fe618e09399709a8337cce0fcd8fa233144283681a10d7c7eac475d79c07f.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab6fe618e09399709a8337cce0fcd8fa233144283681a10d7c7eac475d79c07f.exe"C:\Users\Admin\AppData\Local\Temp\ab6fe618e09399709a8337cce0fcd8fa233144283681a10d7c7eac475d79c07f.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\izsilaivzltjlbd.exe"C:\Users\Admin\AppData\Local\Temp\\izsilaivzltjlbd.exe"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1368
-
Network
-
Remote address:8.8.8.8:53Requestdtrack.secdls.comIN AResponse
-
Remote address:8.8.8.8:53Requestdtrack.secdls.comIN AResponsedtrack.secdls.comIN A127.0.0.1
-
Remote address:8.8.8.8:53Requestapi.v2.secdls.comIN AResponseapi.v2.secdls.comIN A127.0.0.1
-
Remote address:8.8.8.8:53Requeststaticrr.paleokits.netIN AResponse
-
Remote address:8.8.8.8:53Requeststaticrr.sslsecure1.comIN AResponsestaticrr.sslsecure1.comIN A193.166.255.171
-
Remote address:8.8.8.8:53Requeststaticrr.sslsecure2.comIN AResponse
-
Remote address:8.8.8.8:53Requeststaticrr.sslsecure3.comIN AResponse
-
Remote address:8.8.8.8:53Requeststaticrr.sslsecure4.comIN AResponse
-
Remote address:8.8.8.8:53Requeststaticrr.sslsecure5.comIN AResponse
-
Remote address:8.8.8.8:53Requeststaticrr.sslsecure6.comIN AResponse
-
Remote address:8.8.8.8:53Requeststaticrr.sslsecure7.comIN AResponse
-
Remote address:8.8.8.8:53Requeststaticrr.sslsecure8.comIN AResponse
-
Remote address:8.8.8.8:53Requeststaticrr.sslsecure9.comIN AResponse
-
Remote address:8.8.8.8:53Requeststaticrr.sslsecure10.comIN AResponse
-
Remote address:8.8.8.8:53Requesttrack.v2.secdls.comIN AResponsetrack.v2.secdls.comIN A127.0.0.1
-
Remote address:8.8.8.8:53Requesttrack.v2.sslsecure1.comIN AResponsetrack.v2.sslsecure1.comIN A193.166.255.171
-
Remote address:8.8.8.8:53Requesttrack.v2.sslsecure2.comIN AResponse
-
Remote address:8.8.8.8:53Requesttrack.v2.sslsecure3.comIN AResponse
-
Remote address:8.8.8.8:53Requesttrack.v2.sslsecure4.comIN AResponse
-
Remote address:8.8.8.8:53Requesttrack.v2.sslsecure5.comIN AResponse
-
Remote address:8.8.8.8:53Requesttrack.v2.sslsecure6.comIN AResponse
-
Remote address:8.8.8.8:53Requesttrack.v2.sslsecure7.comIN AResponse
-
Remote address:8.8.8.8:53Requesttrack.v2.sslsecure8.comIN AResponse
-
Remote address:8.8.8.8:53Requesttrack.v2.sslsecure9.comIN AResponse
-
Remote address:8.8.8.8:53Requesttrack.v2.sslsecure10.comIN AResponse
-
Remote address:8.8.8.8:53Requestapi.v2.sslsecure1.comIN AResponseapi.v2.sslsecure1.comIN A193.166.255.171
-
Remote address:8.8.8.8:53Requestapi.v2.sslsecure2.comIN AResponse
-
Remote address:8.8.8.8:53Requestapi.v2.sslsecure3.comIN AResponse
-
Remote address:8.8.8.8:53Requestapi.v2.sslsecure4.comIN AResponse
-
Remote address:8.8.8.8:53Requestapi.v2.sslsecure5.comIN AResponse
-
Remote address:8.8.8.8:53Requestapi.v2.sslsecure6.comIN AResponse
-
Remote address:8.8.8.8:53Requestapi.v2.sslsecure7.comIN AResponse
-
Remote address:8.8.8.8:53Requestapi.v2.sslsecure8.comIN AResponse
-
Remote address:8.8.8.8:53Requestapi.v2.sslsecure9.comIN AResponse
-
Remote address:8.8.8.8:53Requestapi.v2.sslsecure10.comIN AResponse
-
-
-
-
-
152 B 3
-
-
152 B 3
-
-
152 B 3
-
-
-
-
152 B 3
-
-
-
104 B 2
-
126 B 142 B 2 2
DNS Request
dtrack.secdls.com
DNS Request
dtrack.secdls.com
DNS Response
127.0.0.1
-
63 B 79 B 1 1
DNS Request
api.v2.secdls.com
DNS Response
127.0.0.1
-
68 B 141 B 1 1
DNS Request
staticrr.paleokits.net
-
69 B 85 B 1 1
DNS Request
staticrr.sslsecure1.com
DNS Response
193.166.255.171
-
69 B 142 B 1 1
DNS Request
staticrr.sslsecure2.com
-
69 B 142 B 1 1
DNS Request
staticrr.sslsecure3.com
-
69 B 142 B 1 1
DNS Request
staticrr.sslsecure4.com
-
69 B 142 B 1 1
DNS Request
staticrr.sslsecure5.com
-
69 B 142 B 1 1
DNS Request
staticrr.sslsecure6.com
-
69 B 142 B 1 1
DNS Request
staticrr.sslsecure7.com
-
69 B 142 B 1 1
DNS Request
staticrr.sslsecure8.com
-
69 B 142 B 1 1
DNS Request
staticrr.sslsecure9.com
-
70 B 143 B 1 1
DNS Request
staticrr.sslsecure10.com
-
65 B 81 B 1 1
DNS Request
track.v2.secdls.com
DNS Response
127.0.0.1
-
69 B 85 B 1 1
DNS Request
track.v2.sslsecure1.com
DNS Response
193.166.255.171
-
69 B 142 B 1 1
DNS Request
track.v2.sslsecure2.com
-
69 B 142 B 1 1
DNS Request
track.v2.sslsecure3.com
-
69 B 142 B 1 1
DNS Request
track.v2.sslsecure4.com
-
69 B 142 B 1 1
DNS Request
track.v2.sslsecure5.com
-
69 B 142 B 1 1
DNS Request
track.v2.sslsecure6.com
-
69 B 142 B 1 1
DNS Request
track.v2.sslsecure7.com
-
69 B 142 B 1 1
DNS Request
track.v2.sslsecure8.com
-
69 B 142 B 1 1
DNS Request
track.v2.sslsecure9.com
-
70 B 143 B 1 1
DNS Request
track.v2.sslsecure10.com
-
67 B 83 B 1 1
DNS Request
api.v2.sslsecure1.com
DNS Response
193.166.255.171
-
67 B 140 B 1 1
DNS Request
api.v2.sslsecure2.com
-
67 B 140 B 1 1
DNS Request
api.v2.sslsecure3.com
-
67 B 140 B 1 1
DNS Request
api.v2.sslsecure4.com
-
67 B 140 B 1 1
DNS Request
api.v2.sslsecure5.com
-
67 B 140 B 1 1
DNS Request
api.v2.sslsecure6.com
-
67 B 140 B 1 1
DNS Request
api.v2.sslsecure7.com
-
67 B 140 B 1 1
DNS Request
api.v2.sslsecure8.com
-
67 B 140 B 1 1
DNS Request
api.v2.sslsecure9.com
-
68 B 141 B 1 1
DNS Request
api.v2.sslsecure10.com
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD5bded699ccef883840badce58f804d7f8
SHA124af43a1d9718fe780b5d9ae6827217c0e642adf
SHA256882a8bc0d59d5a6b25dd92d301ab47427db727cce84d37b299bc18be14b1ba34
SHA5122a86aca1ae37bc2c90549112be52f962723d3a0d09257867efe47d3fc5afca418075d38ce30b2185afe2451eac774d2485fd4bd6563d28de11fed41a8f276bd8
-
Filesize
24KB
MD5bded699ccef883840badce58f804d7f8
SHA124af43a1d9718fe780b5d9ae6827217c0e642adf
SHA256882a8bc0d59d5a6b25dd92d301ab47427db727cce84d37b299bc18be14b1ba34
SHA5122a86aca1ae37bc2c90549112be52f962723d3a0d09257867efe47d3fc5afca418075d38ce30b2185afe2451eac774d2485fd4bd6563d28de11fed41a8f276bd8
-
Filesize
476KB
MD589c4bf7297f085059f17b0ba1aa9c28d
SHA1f745c646fdf028af68934ed508ea59196690c6d6
SHA256ab6fe618e09399709a8337cce0fcd8fa233144283681a10d7c7eac475d79c07f
SHA5123b4e5f9fb6440d8ca00d6c186cf8d8a541705d27b2e2e293c8742a54c531f73d23a6e1bd4a99d9a327b8f71aa95b8887df336c48844d8427946517ca6f3241e9
-
Filesize
24KB
MD5bded699ccef883840badce58f804d7f8
SHA124af43a1d9718fe780b5d9ae6827217c0e642adf
SHA256882a8bc0d59d5a6b25dd92d301ab47427db727cce84d37b299bc18be14b1ba34
SHA5122a86aca1ae37bc2c90549112be52f962723d3a0d09257867efe47d3fc5afca418075d38ce30b2185afe2451eac774d2485fd4bd6563d28de11fed41a8f276bd8
-
Filesize
24KB
MD5bded699ccef883840badce58f804d7f8
SHA124af43a1d9718fe780b5d9ae6827217c0e642adf
SHA256882a8bc0d59d5a6b25dd92d301ab47427db727cce84d37b299bc18be14b1ba34
SHA5122a86aca1ae37bc2c90549112be52f962723d3a0d09257867efe47d3fc5afca418075d38ce30b2185afe2451eac774d2485fd4bd6563d28de11fed41a8f276bd8