Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2022, 18:13
Static task
static1
Behavioral task
behavioral1
Sample
4af1f894b3735602812e010e429183034a2450d21f98c8a1d1a34910052ebc37.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4af1f894b3735602812e010e429183034a2450d21f98c8a1d1a34910052ebc37.exe
Resource
win10v2004-20220812-en
General
-
Target
4af1f894b3735602812e010e429183034a2450d21f98c8a1d1a34910052ebc37.exe
-
Size
349KB
-
MD5
349eec488fb1bac558c6df35a8b9f4f6
-
SHA1
c905d5735a43afbb3ca47e47e7627ed3878f7ce7
-
SHA256
4af1f894b3735602812e010e429183034a2450d21f98c8a1d1a34910052ebc37
-
SHA512
0dd96ed854a2fd4d4397dd59c9b595a1aca339883052dc8bb8c85b5fd86f25ae4074a26de1e951047119aa390373835daae038f3860b343a3ef7993b6f726b8c
-
SSDEEP
6144:ye34zV2nu/EJXAF8u1qBhGNy4909VezjiGF+nh9CUZLcb+FL79k:snEJXs1q2N1906jidGUZLcb+Fn9k
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1388 installstat.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation cscript.exe -
Loads dropped DLL 4 IoCs
pid Process 4772 4af1f894b3735602812e010e429183034a2450d21f98c8a1d1a34910052ebc37.exe 4772 4af1f894b3735602812e010e429183034a2450d21f98c8a1d1a34910052ebc37.exe 4772 4af1f894b3735602812e010e429183034a2450d21f98c8a1d1a34910052ebc37.exe 1388 installstat.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\EditPlus\kk53.icw 4af1f894b3735602812e010e429183034a2450d21f98c8a1d1a34910052ebc37.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90de109381ffd801 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10f9699a81ffd801 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2825955982" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000049f4763fc02d64382fdf4549352e02600000000020000000000106600000001000020000000e78f098bacca3a904f4bdded45d212d90abffa42f4b73d47976afb7db0c76a6b000000000e80000000020000200000005fc912dd53993721469c73c90d5a020bf91510d5b57fcb192900c77b42f97e6d2000000083fe7ff8578dc95e2e3ca16389bbddb8e67b34875c67ba9e613fa0874c435284400000000e5921c2007dfdc9d58c28d6b535f44385d40adde56a746bf88d041dbbee14848a8ec55e26a14a3606c3bab4f173d3a20439bf40f24c871e0809440836225625 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000049f4763fc02d64382fdf4549352e02600000000020000000000106600000001000020000000fecc85648f0a3c23094ac39203ddf9b09ae084acd52c3486cf410bbf04698109000000000e80000000020000200000000c6f47d15b86f00d8747475d1c5821f670bb8c42b67aeb2ab56d4c3129859af5200000007b306c16869b49accc4165af29436818fd0023b8469882e1f3370c3ed287001a400000001b059d768cd8377ebd19db3ef91b1a59fe8812919f1f84ca0957a7d23a2dbc21deaf73fcfb387cb734852c4d0c1b9cfe1aa3ee6c8d219884949b50b37bd34787 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376003433" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "30998401" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2825955982" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "30998401" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{B68AC801-6B74-11ED-89AC-DEF0885D2AEB} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe -
Modifies registry class 11 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\ScriptEngine\ = "VBScript" 4af1f894b3735602812e010e429183034a2450d21f98c8a1d1a34910052ebc37.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\Shell\Open 4af1f894b3735602812e010e429183034a2450d21f98c8a1d1a34910052ebc37.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\Shell 4af1f894b3735602812e010e429183034a2450d21f98c8a1d1a34910052ebc37.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\Shell\Open\ = "´ò¿ª(&O)" 4af1f894b3735602812e010e429183034a2450d21f98c8a1d1a34910052ebc37.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\Shell\Open\Command 4af1f894b3735602812e010e429183034a2450d21f98c8a1d1a34910052ebc37.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile 4af1f894b3735602812e010e429183034a2450d21f98c8a1d1a34910052ebc37.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.icw\ = "icwfile" 4af1f894b3735602812e010e429183034a2450d21f98c8a1d1a34910052ebc37.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\ScriptEngine 4af1f894b3735602812e010e429183034a2450d21f98c8a1d1a34910052ebc37.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\icwfile\Shell\Open\Command\ = "%SystemRoot%\\SysWow64\\WScript.exe \"%1\" %*" 4af1f894b3735602812e010e429183034a2450d21f98c8a1d1a34910052ebc37.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings cscript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.icw 4af1f894b3735602812e010e429183034a2450d21f98c8a1d1a34910052ebc37.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4196 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4196 iexplore.exe 4196 iexplore.exe 3464 IEXPLORE.EXE 3464 IEXPLORE.EXE 3464 IEXPLORE.EXE 3464 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4772 wrote to memory of 4744 4772 4af1f894b3735602812e010e429183034a2450d21f98c8a1d1a34910052ebc37.exe 79 PID 4772 wrote to memory of 4744 4772 4af1f894b3735602812e010e429183034a2450d21f98c8a1d1a34910052ebc37.exe 79 PID 4772 wrote to memory of 4744 4772 4af1f894b3735602812e010e429183034a2450d21f98c8a1d1a34910052ebc37.exe 79 PID 4744 wrote to memory of 1924 4744 cscript.exe 81 PID 4744 wrote to memory of 1924 4744 cscript.exe 81 PID 4744 wrote to memory of 1924 4744 cscript.exe 81 PID 4772 wrote to memory of 1388 4772 4af1f894b3735602812e010e429183034a2450d21f98c8a1d1a34910052ebc37.exe 83 PID 4772 wrote to memory of 1388 4772 4af1f894b3735602812e010e429183034a2450d21f98c8a1d1a34910052ebc37.exe 83 PID 4772 wrote to memory of 1388 4772 4af1f894b3735602812e010e429183034a2450d21f98c8a1d1a34910052ebc37.exe 83 PID 4196 wrote to memory of 3464 4196 iexplore.exe 85 PID 4196 wrote to memory of 3464 4196 iexplore.exe 85 PID 4196 wrote to memory of 3464 4196 iexplore.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\4af1f894b3735602812e010e429183034a2450d21f98c8a1d1a34910052ebc37.exe"C:\Users\Admin\AppData\Local\Temp\4af1f894b3735602812e010e429183034a2450d21f98c8a1d1a34910052ebc37.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\cscript.exe"C:\Windows\system32\cscript.exe" "C:\Program Files (x86)\EditPlus\kk53.icw"2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\SysWow64\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\kk53.icw"3⤵PID:1924
-
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\installstat.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\installstat.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1388
-
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:1804
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4196 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:3464
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132B
MD5da4c29b9c6ad4d8deeca78f6aa617e89
SHA146bbc86b6d7ad996a103679a9faa49a96fac30f5
SHA25640805eb8f47416f3bc600f54cddb73e1daa82b65c9a8abdf9626010b61e1463f
SHA512c61e9426f5ec789b371b5cf65de72f33b8e4aa057a29351c6f62c823aec69b23c9ea8397b931de0cfbd7c1f952c1d98bede36d65f5df7ef98a8a591e8fa31431
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
Filesize
44KB
MD57c30927884213f4fe91bbe90b591b762
SHA165693828963f6b6a5cbea4c9e595e06f85490f6f
SHA2569032757cabb19a10e97e158810f885a015f3dcd5ba3da44c795d999ea90f8994
SHA5128aadb5fd3750ab0c036c7b8d2c775e42688265b00fe75b43a6addaefc7ee20d9fa3f074dd7943570c8519943011eda08216e90551b6d6a782b9ed5ce20aa6bab
-
Filesize
44KB
MD57c30927884213f4fe91bbe90b591b762
SHA165693828963f6b6a5cbea4c9e595e06f85490f6f
SHA2569032757cabb19a10e97e158810f885a015f3dcd5ba3da44c795d999ea90f8994
SHA5128aadb5fd3750ab0c036c7b8d2c775e42688265b00fe75b43a6addaefc7ee20d9fa3f074dd7943570c8519943011eda08216e90551b6d6a782b9ed5ce20aa6bab
-
Filesize
843B
MD5187ee999528a5cd2449f56d525023e5d
SHA10fd376a3fed66818dc51ed9b90208a17fd53f240
SHA2561385d5e7026687516e4cd115146d110c2b0bd456ba349f697cb4d1d740657729
SHA512956a260f128dea87d20db444bcd168197c3cab15e942fba09994cd039ecde833cad5ce5ab0f1899de9f666bc869f6af30cf3f1e8fe5da0839ddd08a01d6bff82
-
Filesize
80KB
MD5271d838f235c3d77964909b79e05cc3d
SHA1e88316549fcbe9c4b4cec8001b63f439884974b9
SHA2561919f130b200be8591051f325137fe0a976295c73f325853ca8167c7da53717e
SHA5121a361ad7c4d9fe217a4fe9ae3056c09a2769941a1377cb91c414453c7cc0d54bc729fae3648c3369d619e86a2c2a2143894726fba657821dca482b8bf7a75419
-
Filesize
80KB
MD5271d838f235c3d77964909b79e05cc3d
SHA1e88316549fcbe9c4b4cec8001b63f439884974b9
SHA2561919f130b200be8591051f325137fe0a976295c73f325853ca8167c7da53717e
SHA5121a361ad7c4d9fe217a4fe9ae3056c09a2769941a1377cb91c414453c7cc0d54bc729fae3648c3369d619e86a2c2a2143894726fba657821dca482b8bf7a75419