Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 08:42
Static task
static1
Behavioral task
behavioral1
Sample
bd34a3e00570e70db111a08470a39772df00d441aea26509b47bc283eddace79.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
bd34a3e00570e70db111a08470a39772df00d441aea26509b47bc283eddace79.exe
Resource
win10v2004-20220812-en
General
-
Target
bd34a3e00570e70db111a08470a39772df00d441aea26509b47bc283eddace79.exe
-
Size
143KB
-
MD5
e42131e41fc933f6d581b129965f9ba2
-
SHA1
84adbc7661df1b1aabf1a04e290007fad93c6e22
-
SHA256
bd34a3e00570e70db111a08470a39772df00d441aea26509b47bc283eddace79
-
SHA512
8a0f22c0c35e72b39a0bc23a34c6e0392f65c4bd058bae1738cc98eba346529236c5de3b6b6c52f17c679ea78a12e469832a204c98c955c7c537f1c881100ec7
-
SSDEEP
3072:iN6ZekwVJIlgps5q9Eb648qwlS/+TfQO45DF5V:pe9IB83ID5jV
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000256ed27e8919d04f83812f84ee5c95da0000000002000000000010660000000100002000000021eafeedadeb8add3f02eddf3e51aace359a5ee589645bb6b53263dac71ae539000000000e80000000020000200000005dd7cfabd93cd2b06ab01cb1710ec0be7896b889e7c80a2c3ca1ab4ae0834edc20000000adca0424526d393ca83e1eb4646a6ad66e3baf301cbcb06b652850fbdd03359740000000c4ee9407d29e4774ac531d996d8089212b252f10862d10e8ddcd4f33600b22a3912f118f600d714aaa39963b6e745e054bc235bba121eb13c9f8774636ca732e iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 90b7dfa0e602d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376376667" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B9A8A7F1-6ED9-11ED-A843-F2E527DE56F1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1536 bd34a3e00570e70db111a08470a39772df00d441aea26509b47bc283eddace79.exe 1740 iexplore.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1536 bd34a3e00570e70db111a08470a39772df00d441aea26509b47bc283eddace79.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1740 iexplore.exe 1740 iexplore.exe 432 IEXPLORE.EXE 432 IEXPLORE.EXE 432 IEXPLORE.EXE 432 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1536 wrote to memory of 1100 1536 bd34a3e00570e70db111a08470a39772df00d441aea26509b47bc283eddace79.exe 30 PID 1536 wrote to memory of 1100 1536 bd34a3e00570e70db111a08470a39772df00d441aea26509b47bc283eddace79.exe 30 PID 1536 wrote to memory of 1100 1536 bd34a3e00570e70db111a08470a39772df00d441aea26509b47bc283eddace79.exe 30 PID 1536 wrote to memory of 1100 1536 bd34a3e00570e70db111a08470a39772df00d441aea26509b47bc283eddace79.exe 30 PID 1100 wrote to memory of 1740 1100 cmd.exe 32 PID 1100 wrote to memory of 1740 1100 cmd.exe 32 PID 1100 wrote to memory of 1740 1100 cmd.exe 32 PID 1100 wrote to memory of 1740 1100 cmd.exe 32 PID 1740 wrote to memory of 432 1740 iexplore.exe 33 PID 1740 wrote to memory of 432 1740 iexplore.exe 33 PID 1740 wrote to memory of 432 1740 iexplore.exe 33 PID 1740 wrote to memory of 432 1740 iexplore.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd34a3e00570e70db111a08470a39772df00d441aea26509b47bc283eddace79.exe"C:\Users\Admin\AppData\Local\Temp\bd34a3e00570e70db111a08470a39772df00d441aea26509b47bc283eddace79.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "start http://securedfileinfo.com/404.jsp?chid=4300109^&rsn=plde^&details=^|v6.1.7601x64sp1.0ws^|tt35^|dt0^|dc100^|fs-2^|dh0^|ec13^|se12007^|dr4^|ds0^|rs0^|p1"2⤵
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://securedfileinfo.com/404.jsp?chid=4300109&rsn=plde&details=|v6.1.7601x64sp1.0ws|tt35|dt0|dc100|fs-2|dh0|ec13|se12007|dr4|ds0|rs0|p13⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1740 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:432
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD5f2080851a6780703a0f3764645202ce1
SHA16e16ec7fe0404b0fe43ebd271ca47ffba9fc9588
SHA256d3969401d4fc819669b9ce997251cc41d4883a31c4f43271b088944fadce3a83
SHA51250e5661d1b5c66073c34d164b49733d7c1c1d7b2782611596646b60dae81321c5c92f9e64dce980cea8306b29db6136e582dcc07f1a951580c1f9f4d69643121
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize472B
MD59f6cc8d3fe9092a6d3901e873a87fd87
SHA12e0aac117a4cc57596efb3d6f6624c269f94b031
SHA256e73982e62b92abac3d15b161f4525448cc2bc8b9bacefdcbfc6f87b74ec372e4
SHA5129736a099967d7ad595439768e45c633ff7d34de92f7cb0c19cd3d4590c4a6dd4fedfcd1b5617c81652e61f4ffe919057507f622f4c6d8d626cfc40234ad2c757
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5f569e1d183b84e8078dc456192127536
SHA130c537463eed902925300dd07a87d820a713753f
SHA256287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413
SHA51249553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD564c2919ca034cd11474186e0568f0e24
SHA1dbe1ed45daf97832c4523bf4b861e57703a8e36d
SHA25656b26e2be81514dfaf553e2cb6c789820c5dfe1ceb4bd7cf2fda5ab5633b510d
SHA512da5cec6a7b1609e3de38c19990d26d35bb91615d652d9718881261583ef8166676260fe4513b1a36aed5dd98a18e5bc669848eaa555079eff6e89bf7b2dd1c12
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize402B
MD56f7fb1e2aab8d7b3055f405cd1110472
SHA1b4eff64c70d4ceec6ed982049b9e39434da823cd
SHA2565b3ff3ab5c07866e9afed73b629c0c9351315274b886785c6009a83ccaa87491
SHA5125eb9dc2c4ed9c3d4f0f1ab0d023fe1fa58ca3843751b1a7a643c4b5c5329f8d2056cfc96e5e135826ac14176a10063752575fb0882e37cafde5007a41e72fa91
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b4189aebbc52fa880687f2cef7af800e
SHA1c845aeed46b0b84f6f73a25e10815533cd6f2f53
SHA256511c494386d30fa672d2c17d60c15083526e09ed4ac389410afe51f68fd207f6
SHA512efc60a0f85682d8befa97239b585953f0383e1aac5411991ff379f194a99649388a65b8c063f8b49f65270d078f44e816ed9c3e09aa2292a50b7f9d35cab2bd4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD51c953b87c0b241f9d950a15fa567534e
SHA1274a3b4b5af3698694e9b0a88adc3cd90f8365f0
SHA2568218e26c8b3022d01a2bf9c55f4e08d1795647fe3adcf9bf48013e9ee1c9eb86
SHA512c610146fa4102f83f71b80d9e7de6ccd08f3bdf75e56c8730d99ce750e537a206bc62b1d972fcd83a1904f834f5a2a163896a523e1ffb040c30f6194e9e79419
-
Filesize
608B
MD531d7ac9b5c8b944fa266b286b9962756
SHA19f99c934769d8f77899c161f3357745b08a11916
SHA25611fae79f146d94b023e14ee0b6c1e11a1ccd4915954ac8e5ed05123a133a62b8
SHA512d5f1e9726899eb2b7de251508217739f7bf06e118a60eb4335b5c4d97cf900311ba94aab71fcbf3ca323a53e65e6b60cf1035bc3087a1d56f9b51317ec099d20