Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
127s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 04:20
Static task
static1
Behavioral task
behavioral1
Sample
5732f0a72cc59a931f272acca8ec049f272d5bedcf0e20024d9a27193ba7dd13.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5732f0a72cc59a931f272acca8ec049f272d5bedcf0e20024d9a27193ba7dd13.exe
Resource
win10v2004-20221111-en
General
-
Target
5732f0a72cc59a931f272acca8ec049f272d5bedcf0e20024d9a27193ba7dd13.exe
-
Size
143KB
-
MD5
0dd718f2f753fc408593d935ac294994
-
SHA1
9472181cd4173a5ff861067e352095b4fd2f49cc
-
SHA256
5732f0a72cc59a931f272acca8ec049f272d5bedcf0e20024d9a27193ba7dd13
-
SHA512
ea92862794b2b77b862c0bb85733e0c827b35f1e4bcf0ea626152ee3b715a10468b9b05144fcdb876f6b92a0b6a0113e1fcd2413a33c51a41712966883624e65
-
SSDEEP
3072:iN6ZekwVJIlgps5q9Eb648qwlS/+TfQO45D5I:pe9IB83ID5a
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376361431" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000256ed27e8919d04f83812f84ee5c95da000000000200000000001066000000010000200000002698cc1880357f1cd50e7f34ff909b758356230b4b46e7472430bd8ec7341426000000000e8000000002000020000000a87c5e80773acaeecd3ec07725881179b27e46e7abf8a718c33c94bf80af25ae200000002712df334e57be704d8632f6ace6566c6ff94fd243c47bf1bce9c7e290331da24000000092f49943263e38ba73ae8cca7eb145ed173693af26e54c97ce6bf1814d65066a13b8bca10572326443d7ebfd55e9b2684366c33d3c12efdea017db03fd6450d0 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000256ed27e8919d04f83812f84ee5c95da000000000200000000001066000000010000200000004ad9a82a9f41af245e4b96013c2259cb7c56fd385f938a5b1b5d1dfe7ff897f9000000000e8000000002000020000000c84f0ea930f5c81791cfb557f148a080b0566b7ad7625a17b80a059dd7f370f090000000379ee7bf6a1a64f2c2838e3ddb2c93d6d11fb9ad0efb05eca0c30bdd5d8ca009126b12953eadf60308a555c907ce4a85c750e9589cdfe51256a7fff4c52a09f11e2b99613b83c3ccea8f86750c9fca48e057b2784a7eb8ac8e2b1959e1faeb9692bbb9c4bee710fc3792d520319e82b10c4b7b0a6194a14d1f5305d69ddf9f04e7d6a06712d2740b65257010e31406c04000000067d5fd5af1a798d0b4656222ee93c561c6a14a8f621c47f052c91dd08851519592b4ca63a19ac796228dcaef55a8abfce5d635f224b2f284b000dea3dbd7ec26 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10fee81cc302d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{40907E61-6EB6-11ED-B218-D60BF964997B} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1268 5732f0a72cc59a931f272acca8ec049f272d5bedcf0e20024d9a27193ba7dd13.exe 108 iexplore.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1268 5732f0a72cc59a931f272acca8ec049f272d5bedcf0e20024d9a27193ba7dd13.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 108 iexplore.exe 108 iexplore.exe 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1268 wrote to memory of 1824 1268 5732f0a72cc59a931f272acca8ec049f272d5bedcf0e20024d9a27193ba7dd13.exe 30 PID 1268 wrote to memory of 1824 1268 5732f0a72cc59a931f272acca8ec049f272d5bedcf0e20024d9a27193ba7dd13.exe 30 PID 1268 wrote to memory of 1824 1268 5732f0a72cc59a931f272acca8ec049f272d5bedcf0e20024d9a27193ba7dd13.exe 30 PID 1268 wrote to memory of 1824 1268 5732f0a72cc59a931f272acca8ec049f272d5bedcf0e20024d9a27193ba7dd13.exe 30 PID 1824 wrote to memory of 108 1824 cmd.exe 32 PID 1824 wrote to memory of 108 1824 cmd.exe 32 PID 1824 wrote to memory of 108 1824 cmd.exe 32 PID 1824 wrote to memory of 108 1824 cmd.exe 32 PID 108 wrote to memory of 2016 108 iexplore.exe 33 PID 108 wrote to memory of 2016 108 iexplore.exe 33 PID 108 wrote to memory of 2016 108 iexplore.exe 33 PID 108 wrote to memory of 2016 108 iexplore.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\5732f0a72cc59a931f272acca8ec049f272d5bedcf0e20024d9a27193ba7dd13.exe"C:\Users\Admin\AppData\Local\Temp\5732f0a72cc59a931f272acca8ec049f272d5bedcf0e20024d9a27193ba7dd13.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "start http://securedfileinfo.com/404.jsp?chid=5300108^&rsn=plde^&details=^|v6.1.7601x64sp1.0ws^|tt35^|dt0^|dc100^|fs-2^|dh0^|ec13^|se12007^|dr4^|ds0^|rs0^|p1"2⤵
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://securedfileinfo.com/404.jsp?chid=5300108&rsn=plde&details=|v6.1.7601x64sp1.0ws|tt35|dt0|dc100|fs-2|dh0|ec13|se12007|dr4|ds0|rs0|p13⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:108 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:108 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2016
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize472B
MD59f6cc8d3fe9092a6d3901e873a87fd87
SHA12e0aac117a4cc57596efb3d6f6624c269f94b031
SHA256e73982e62b92abac3d15b161f4525448cc2bc8b9bacefdcbfc6f87b74ec372e4
SHA5129736a099967d7ad595439768e45c633ff7d34de92f7cb0c19cd3d4590c4a6dd4fedfcd1b5617c81652e61f4ffe919057507f622f4c6d8d626cfc40234ad2c757
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5f569e1d183b84e8078dc456192127536
SHA130c537463eed902925300dd07a87d820a713753f
SHA256287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413
SHA51249553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize402B
MD548321e58f47874817f54b5b9673b917e
SHA1b79f1e1d4ffdd0cc239099a9e768ad59a48788b9
SHA2564d447b8ddb2a1a66e997ebb9c9684a37056fe13e8c013f92b44621371759f6e9
SHA5121e0d1ffdebb3d391a51706a129279dc834ea103ec8ecdf79f2cf67ef8054a101e8ce89ce70dc0917008b352fb05e640a04eb389972e04e432fcd4764284476d0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575527166b38cdbd8bf7ca9e0589fdda6
SHA18149667dbf4d71950b752a9b282412131259ee75
SHA256300b4e8903c023838e69819efda130b3b4f98277f287104c449f2a21e73fcd8c
SHA512b90edb0c1e4fa702f941b30451c522dfd8827cbe99b5f6be2e4c14c6d0ed316274a2fca4d544c554cad65ead5302136ab2fe7172ba46d8352fd94fa2ceca03a2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD5712a53fe223b9c697a24028a5613a612
SHA147dac7b64bc1934d934e68bd50236b01ef551789
SHA256ae4741a688b1da2aa5d7eb3435f193973a0ebb1a2cfa76e5aa767a136d5b5d53
SHA5121f79506dea7e7f64042414eeffdc3f22786ea623c420c7e3bb82b6aa982c89dbab3b9faeb82c9b416c9eea9f4fe62e236f58e799154edef439ed2cdc03244c7c
-
Filesize
601B
MD5bd4219c51d2f0f6220b256ddd36510bc
SHA12bced698bcf3d0b49b41fa1fcb8d419fed73fb66
SHA256039f94356eaa2c6ccb2000d382a4b4b93347c3d716d859c9a3db19e4667fd3b6
SHA512248b0a94bbd5a291add77222dbdc58ebe79c9737bf3d36048c8a1f5eb49e1ccb73106e323a7287604d3d34c38087ca4ad38ebf6798f42ad4d78ff172929ee8de