Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    164s
  • max time network
    191s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23/11/2022, 20:59

General

  • Target

    434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe

  • Size

    212KB

  • MD5

    52d8c58d4c6e9581d4459b40b99c488c

  • SHA1

    e83a1724be4af196018ec1658f9cb85a1178a7ad

  • SHA256

    434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51

  • SHA512

    a58d6c135028d627d4f0edffcb422dffe9fba8000f601d6ce23c1e6810452bec1f4fc07fb5cee1b35f6db8dfc00681580d2ee3a8018e7e369f60e6a17af1a77c

  • SSDEEP

    6144:dcyyU/A5rZRLEhFTnRa26s+Wdz8V7Wdfwn1nbmuSDm+:dHp/urb4A1WdBfl

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 61 IoCs
  • Modifies registry class 60 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe
    "C:\Users\Admin\AppData\Local\Temp\434c5c33590544500f75307d3e9b6fd5a7aea00ec76fc47dd957d6c4dc067a51.exe"
    1⤵
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1332
    • \??\c:\Program Files6691SV.exe
      "c:\Program Files6691SV.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:568
      • C:\Program Files\Internet Explorer\IEXPLORE.exe
        "C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/vplay.php
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:664
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:664 CREDAT:275459 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1364
      • C:\Program Files\Internet Explorer\IEXPLORE.exe
        "C:\Program Files\Internet Explorer\IEXPLORE.exe" http://dl.kanlink.cn:1287/CPAdown/PPTV(pplive)_forjieku_977.html
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2032
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2032 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:904
    • C:\Windows\SysWOW64\WScript.Exe
      WScript.Exe jies.bak.vbs
      2⤵
      • Deletes itself
      PID:1716

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files6691SV.exe

    Filesize

    36KB

    MD5

    1c909dbec9fc7b3d5d616b83b8fdbc4e

    SHA1

    3145769f6824201ac8e096a13cfe22a38c3c9523

    SHA256

    aab7ab1dacafb16199456a400520eaa3520abd67a84610087bca1ecf8dafc8c3

    SHA512

    2d3122abfef2d00a420f1a063cd0b6712f84b6112250d3e8eb9a87c02ec807e40f9112cf7ea11e0bac5f9ed6886d8f42ae69df0691d4b3935cf0f6bacec9645d

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{FECA5C40-6B94-11ED-874D-7AEFAD47A2D2}.dat

    Filesize

    5KB

    MD5

    ca02f112db0c9acec7b8a1d36acdd027

    SHA1

    adf0dc403ebf7d69132318776c7dd7164959aa93

    SHA256

    8658f2df26c8810de89b4e72210fb9aca2fd49f1b0fba172c9f08e94bbe51a32

    SHA512

    07270f183b16061a7512bae5334c83666e3333d02dc0cd17148a3c5e78f9b6d394fb5eb2210b65fed669054493fae338dd6cbe39c5037f129e21112b4711d82e

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{FECA8350-6B94-11ED-874D-7AEFAD47A2D2}.dat

    Filesize

    3KB

    MD5

    5b1948bdb9b6613f4a013424669d1071

    SHA1

    78c0875cf6c0f22b6ffeac05ceff57732131caea

    SHA256

    8aa3352807d9af34991c0d1d1d78af12f1b465e11d3c75ddf570092ca6a06b58

    SHA512

    ee9b6aadce3429e6c61a2c60bab63522162e847ad799e0ea116390474ce0e97a9fb9e982d9757a95d4f54e8b8bc55ff501a1c1feee3a88fc59c2185314441bef

  • C:\Users\Admin\AppData\Local\Temp\jies.bak.vbs

    Filesize

    486B

    MD5

    9cc04eb9c773aac48de2cb3a8813c51b

    SHA1

    48910a6cbdae6a8e0d97887e123e92ce276e04d2

    SHA256

    5e4956b6c3a17ea2fee006e43f48d8f99441e31e42b3333930ac087ca4256434

    SHA512

    dcdbb164616993280e37028a58b782e0342cc55120fc92a3a509c3534989102779bd1628c81d0c6f8d5ef980835f544faf53de805411042fe67c4ae001d96bff

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\HODARN0P.txt

    Filesize

    601B

    MD5

    42e78a37d87ec88b164d3b216f3bdeca

    SHA1

    84e3dbd0c500c9b71f938671caf72a5ec0b1222b

    SHA256

    ed83f31c0d1d4cfb14ba12a2853c65c18c8171566f43070add538c579453bbf9

    SHA512

    8b8c3564c1753b0bb8549c93fe926f45e539b8a0b4baea0df40a2fb31e294688dcae20d38d77f46b7b72e6441a25e30e22cc7f749f46883239e21a0fe34126eb

  • memory/1332-56-0x0000000075351000-0x0000000075353000-memory.dmp

    Filesize

    8KB