Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
98s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 14:52
Static task
static1
Behavioral task
behavioral1
Sample
d6efcaa582cfcafdff6e26080dac8dd77adf826c26a37a7c4dfeeac875553ee9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d6efcaa582cfcafdff6e26080dac8dd77adf826c26a37a7c4dfeeac875553ee9.exe
Resource
win10v2004-20220812-en
General
-
Target
d6efcaa582cfcafdff6e26080dac8dd77adf826c26a37a7c4dfeeac875553ee9.exe
-
Size
91KB
-
MD5
ad9cb78d956e19aa435da393b082f792
-
SHA1
f34af8c9befa8a7bf6d29b6c7a20f7b421c799f4
-
SHA256
d6efcaa582cfcafdff6e26080dac8dd77adf826c26a37a7c4dfeeac875553ee9
-
SHA512
29e20edc05913be0f6a14f437eb121a6fe457a16fb8d00f14cbf9b00539e479c2e69b8b440c9021e6cdc491c6aa643a133f42175b73788363ec2152f75efaa35
-
SSDEEP
1536:rwbpmZEguoM0NzVXAG+7Dj3DDqL1HHTWS6px6HH84:0bpmZEzYVXAb3iTWjxSH84
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376404389" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d01cbc1f2703d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{45918171-6F1A-11ED-B2F2-7E6ADD856DC1} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000048ca5449a4d21846ba8a995ea0abd35a0000000002000000000010660000000100002000000015f569c03ab39eff0879cb4a61e092ab98807b075cadd349656e0cf622ed944d000000000e80000000020000200000006ed1d2fd5ccad8e2b951a2d67d1e6bcaf272927b06829fe7553a9a894bdbb0f520000000f240d4971370703f10021008eb0f97cd859d4f7fbd8bc86a782f0458f1f840c740000000bda34d2d5b8f11a5c419712c153d287e33e6bd509bcecb0c1ac2e13b5fe7919be8268e99d05699c18aceaa5a5baefca6241e66dcaeb64d086598ab5e69559340 iexplore.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1724 d6efcaa582cfcafdff6e26080dac8dd77adf826c26a37a7c4dfeeac875553ee9.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1724 d6efcaa582cfcafdff6e26080dac8dd77adf826c26a37a7c4dfeeac875553ee9.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2020 iexplore.exe 2020 iexplore.exe 1636 IEXPLORE.EXE 1636 IEXPLORE.EXE 1636 IEXPLORE.EXE 1636 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2020 1724 d6efcaa582cfcafdff6e26080dac8dd77adf826c26a37a7c4dfeeac875553ee9.exe 27 PID 1724 wrote to memory of 2020 1724 d6efcaa582cfcafdff6e26080dac8dd77adf826c26a37a7c4dfeeac875553ee9.exe 27 PID 1724 wrote to memory of 2020 1724 d6efcaa582cfcafdff6e26080dac8dd77adf826c26a37a7c4dfeeac875553ee9.exe 27 PID 1724 wrote to memory of 2020 1724 d6efcaa582cfcafdff6e26080dac8dd77adf826c26a37a7c4dfeeac875553ee9.exe 27 PID 2020 wrote to memory of 1636 2020 iexplore.exe 29 PID 2020 wrote to memory of 1636 2020 iexplore.exe 29 PID 2020 wrote to memory of 1636 2020 iexplore.exe 29 PID 2020 wrote to memory of 1636 2020 iexplore.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6efcaa582cfcafdff6e26080dac8dd77adf826c26a37a7c4dfeeac875553ee9.exe"C:\Users\Admin\AppData\Local\Temp\d6efcaa582cfcafdff6e26080dac8dd77adf826c26a37a7c4dfeeac875553ee9.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://cs606517.vk.me/v606517550/1de7/fLkWmWbc3AA.jpg2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1636
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5a2691458365084a91449db5d055670fb
SHA1aabab35f39c0ebafe75844f4850fad8b3b3d8627
SHA256e624170785a0dedde432697d4c2fff60e7fbbe96df91b3448912d3a80988378e
SHA512898cc0adaa48ed79536cdbb1f6412ada9419891793c5496a7dacb3a0aaa3d1c97fe03b79e37c3ffd2eb7e7625e3c5125caa850f08a1eaef820e917745a9103fc
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z4TAQ562\favicon[2].ico
Filesize1KB
MD5c30515639cdb85b1fb619e84233c0d5f
SHA161a7848bb12959b841105da1685888d48cbb072d
SHA25635f9c9dd568c8c49e9d1adc99dfae841abdccf6cae9344068f3c387465e5704a
SHA5124f8fafc0047fa10283cf7b47c7b2e8a87d8feadd21b22b7b3765e462f5b1deb795203582c2c0b76cba5749f47e2c4397a31fe0f6b4d5837f42b327e9a6bfcafd
-
Filesize
603B
MD55c4f4cd30648cb07b46649ff9ce9d24b
SHA1e76020b3689b4504a62ec1906801c11a28ec3cfa
SHA25632d4d6c0e36ff4b2542f370197dea1d4e9e50220b7e1649063a90a2060304d10
SHA512f1fb09b19f65de13ebd06fcccf98cdd0efa0467a49f906f2e76bb79a60bcd81d6a08d17bce270a940f8640997b5a3d1455d2bc4b081f158b295c87e9a17f0e36