Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    226s
  • max time network
    347s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    24/11/2022, 07:35 UTC

General

  • Target

    3GQQliaotian_veryhuo.com/QQ聊天.exe

  • Size

    2.1MB

  • MD5

    b551f92843dc3c728373cbd8c7957e00

  • SHA1

    682d8872150977331b6eaca37a0871c61cc3c0df

  • SHA256

    884f49ceee97fbbdc8d510fb5e3f114b2b3261a81f5117a01bdbd8c929149cb6

  • SHA512

    288adee2410202be0deca74675ade7d21892d1517c7a72dda6a26d7b5e95fec29b83226088f238006539bcf957de4f3ec2a0a43a3e896e41e067b1cacb8c8496

  • SSDEEP

    49152:LeER8Kozofm4d1T7kxiRGT4r0U+s8KuqGaX0ToIBAUZLYGOT4r0g:HR8KAQ7kxiMT4r0XJBAUZLyT4r0g

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3GQQliaotian_veryhuo.com\QQ聊天.exe
    "C:\Users\Admin\AppData\Local\Temp\3GQQliaotian_veryhuo.com\QQ聊天.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:560
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://veryhuo.com/?c
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:564
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:564 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:1748

Network

  • flag-unknown
    DNS
    veryhuo.com
    IEXPLORE.EXE
    Remote address:
    8.8.8.8:53
    Request
    veryhuo.com
    IN A
    Response
  • flag-unknown
    DNS
    veryhuo.com
    IEXPLORE.EXE
    Remote address:
    8.8.8.8:53
    Request
    veryhuo.com
    IN A
    Response
  • flag-unknown
    DNS
    veryhuo.com
    IEXPLORE.EXE
    Remote address:
    8.8.8.8:53
    Request
    veryhuo.com
    IN A
    Response
  • 204.79.197.200:443
    ieonline.microsoft.com
    iexplore.exe
    152 B
    3
  • 204.79.197.200:443
    ieonline.microsoft.com
    tls
    iexplore.exe
    739 B
    7.6kB
    8
    11
  • 8.8.8.8:53
    veryhuo.com
    dns
    IEXPLORE.EXE
    57 B
    57 B
    1
    1

    DNS Request

    veryhuo.com

  • 8.8.8.8:53
    veryhuo.com
    dns
    IEXPLORE.EXE
    57 B
    57 B
    1
    1

    DNS Request

    veryhuo.com

  • 8.8.8.8:53
    veryhuo.com
    dns
    IEXPLORE.EXE
    57 B
    57 B
    1
    1

    DNS Request

    veryhuo.com

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\3UM5WHDL.txt

    Filesize

    608B

    MD5

    6fced9ca1ea3d4e112dda8438d90018d

    SHA1

    88b6c3e21ad7f799f2c5de9b1029b106a999adad

    SHA256

    0e50fd0ad412fe0a4696451933f99d3e8dce77c807c9968d0cfc9dca976e3e19

    SHA512

    5f30a906231cc1f93b496fd6282461e93bcf2a9e7cdf5d81a86f2a9e04a1af64d8827dfb28d6d51a274733cada4c5992dd02531536b297bf61fa12a4b56bf4be

  • memory/560-54-0x0000000075551000-0x0000000075553000-memory.dmp

    Filesize

    8KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.