Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28/11/2022, 02:07

General

  • Target

    29ce06feb138c8a032cb103623affc4d2c55e78cbf07f32c035ef7ef1a35cd88.exe

  • Size

    693KB

  • MD5

    e4540200b9618a0e460c3ffc4373c6c2

  • SHA1

    07757e76942afbef15c6dcb05d1eb0b95f2ba659

  • SHA256

    29ce06feb138c8a032cb103623affc4d2c55e78cbf07f32c035ef7ef1a35cd88

  • SHA512

    a7a0f6c50bb1cbe21371cd397c78ec594f81261442cc8609d7290601a8b17e432f69762d5cbeb07313fd340b9b7ed466ca1df016583af107e5da7af5f942b8ed

  • SSDEEP

    1536:cd04boUzdIBsZUpUQSe1sjL/91IqmM4nouy8:cdJboUpEsueFssP11I5Mwout

Malware Config

Signatures

  • Modifies firewall policy service 2 TTPs 14 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 3 IoCs
  • Windows security bypass 2 TTPs 4 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Sets file execution options in registry 2 TTPs 64 IoCs
  • UPX packed file 13 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 15 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Control Panel 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies registry class 24 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\29ce06feb138c8a032cb103623affc4d2c55e78cbf07f32c035ef7ef1a35cd88.exe
    "C:\Users\Admin\AppData\Local\Temp\29ce06feb138c8a032cb103623affc4d2c55e78cbf07f32c035ef7ef1a35cd88.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1148
    • C:\Users\Admin\E696D64614\winlogon.exe
      "C:\Users\Admin\E696D64614\winlogon.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Modifies system certificate store
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1548
      • C:\Users\Admin\E696D64614\winlogon.exe
        "C:\Users\Admin\E696D64614\winlogon.exe"
        3⤵
        • Modifies firewall policy service
        • Modifies security service
        • Modifies visibility of file extensions in Explorer
        • Modifies visiblity of hidden/system files in Explorer
        • UAC bypass
        • Windows security bypass
        • Disables RegEdit via registry modification
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Sets file execution options in registry
        • Windows security modification
        • Checks whether UAC is enabled
        • Modifies Control Panel
        • Modifies Internet Explorer settings
        • Modifies Internet Explorer start page
        • Modifies registry class
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • System policy modification
        PID:1468
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:856
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:856 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1060

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

    Filesize

    2KB

    MD5

    76e7d5bf61b2e80d159f88aa9798ce91

    SHA1

    32a46de50c9c02b068e39cf49b78c7e2d5ace20d

    SHA256

    280fd6ae3ad21323199759814c4dd82329eb8f9847ed1fa2be145e83b4c88bf3

    SHA512

    5efd8c64ac40ae006d2ce4509eb9e5f1448fb1156e914d303e8bc4dcfe1d94c57c7eae216b362877e7b644876656cc9e5c4cebfc905bab3f8b09cb1a051d69c4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    61KB

    MD5

    3dcf580a93972319e82cafbc047d34d5

    SHA1

    8528d2a1363e5de77dc3b1142850e51ead0f4b6b

    SHA256

    40810e31f1b69075c727e6d557f9614d5880112895ff6f4df1767e87ae5640d1

    SHA512

    98384be7218340f95dae88d1cb865f23a0b4e12855beb6e74a3752274c9b4c601e493864db777bca677a370d0a9dbffd68d94898a82014537f3a801cce839c42

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

    Filesize

    1KB

    MD5

    916c512d221c683beeea9d5cb311b0b0

    SHA1

    bf0db4b1c4566275b629efb095b6ff8857b5748e

    SHA256

    64a36c1637d0a111152002a2c0385b0df9dd81b616b3f2073fbbe3f2975aa4d8

    SHA512

    af32cffea722438e9b17b08062dc2e209edc5417418964ead0b392bd502e1a647a8456b2ee2ea59faf69f93d0c6ea6f15949b6c30924db7da65b91cb18e8dc6c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C67047FE238D580B731A13BEA5F7481F

    Filesize

    472B

    MD5

    cfbcb12817712d4f8f816c208590444a

    SHA1

    9999caeedbb1a95ae4236a5b962c233633df6799

    SHA256

    b5a41ab77d5ff4ba1a17ff074eb91bc18824d56dfc4b6c3320e900bbd6f3a90a

    SHA512

    a70eb8c366dfa0226cd62dbffbf51bd2da25571a6ff6b1f2e44dd8d9193a72f79ab7d90367378edf808ff3152ca45bf2a6ba3d64882d0f6d4aa437b6881d13f2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

    Filesize

    488B

    MD5

    69bb9357a483a427469cc3aa65c14346

    SHA1

    6978d9194baaef19ef7c4caf26cec1af2c5a3ab8

    SHA256

    5a748b48202b44ef1c3ed08c14f8d2adf1a978d4beb66d2634b0d91f0c38db0d

    SHA512

    316d84f5083e802a0821bc95b896df0f08aa3aa7dfe459b7771bd5f4b662ee56ddc9747d59c298bfc3596e9eb94cfdc4e7224fcc78aa2e31839bdddf53f3f78f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    b936dc42eb353738198234a56758c716

    SHA1

    3078258ae8decbd0ede5f2958ce1a2768a56e30b

    SHA256

    c481731f060f904e8c690309bde973091954044c782e3e804862925717e6a1ef

    SHA512

    c948cd85116fc5ae44f797d69841cfe92db59837ca6ff1f2a18efbccde54874b4d43c9e60bfc14cff88892c855ca0d3fc3868780832046e044b6fc4abc80e329

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

    Filesize

    482B

    MD5

    333c75c46ce438c5c20c07fcbd88b057

    SHA1

    bf79990324f30fd4f18b7783d7d87111c7b7bbb1

    SHA256

    332bee0ee00f747adb195d97695965b75ca1860d73c80cdf82ad4809c8757239

    SHA512

    6a4f930673729b0f1774f857d6931d0f62e372c9d04fd4391e9c1b5d57a28a7b1e136b6af969d02bcddc9fb14c4d7da578697943eaabb7eb7849787dfea43cac

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C67047FE238D580B731A13BEA5F7481F

    Filesize

    480B

    MD5

    f8b054c4d3d3a34cc1fbd39c6d265f5a

    SHA1

    817e705c76d0096edbe688288978af02483458a7

    SHA256

    ee7b81dc9397357688a4c0dd0424fcc8018cb485186e7b7676c9af8157c255a4

    SHA512

    86d6f6cc631bdd019847ba6318a014fe7f31fd48ac5a7993dc0270991ac9045bee336fe801503b554f495ae9f08f3634481f97af66f6e0e65cf5c871a23640b1

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\7B383TCD.txt

    Filesize

    96B

    MD5

    f0c90d52c700e94c9df56d5ace8fad1c

    SHA1

    2198fd912ad56b826149e2932236a4c8cd78669f

    SHA256

    b8a629cd9a2b629414ed615a99ef3e69de4db96c801637ae1f88474732a57229

    SHA512

    ff33d9162bc2c39745fab83e4187fea04c954ff521f472ef69e98df41a409db407d87a75acfe075c12f8868411001591a3e9545bf8c96391a00d29d74c0f59fd

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\SELSIO4K.txt

    Filesize

    606B

    MD5

    6fe83b24cd7784336f05fb0d72e28f16

    SHA1

    d09edcfa175e682e985772e8ec28b2e9aa259b9e

    SHA256

    8eda0d6bc3082f7406e323c0e14ecaf26a39e4a77de117c1f76a9bfb7194d241

    SHA512

    0347f227a1abafa69a90974257384de434136c1681a83ab7eb4f4fb726bbf5d6571e6020156a2404efe53d67721f1f04b64e45cdd26ac639b4933d32e50f21c8

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\WIAAQPT5.txt

    Filesize

    117B

    MD5

    9ff540d3112e4160a6f86792dc220eb0

    SHA1

    34f1fceb08ca8d5da84bb53ef4c5ad782fd76ba2

    SHA256

    96950d17ff46f530befe718b59d8afb47ff0ea4c1d1c62cdfa03a145c1fff29a

    SHA512

    0adb78aa9a9119b2288e4c415f695fade88b65cd2482fdcf16da8b462d316656f958251ae245a80380989a5369ff09604c40a8a832bda06e1b64a8a2571e3f67

  • C:\Users\Admin\E696D64614\winlogon.exe

    Filesize

    693KB

    MD5

    e4540200b9618a0e460c3ffc4373c6c2

    SHA1

    07757e76942afbef15c6dcb05d1eb0b95f2ba659

    SHA256

    29ce06feb138c8a032cb103623affc4d2c55e78cbf07f32c035ef7ef1a35cd88

    SHA512

    a7a0f6c50bb1cbe21371cd397c78ec594f81261442cc8609d7290601a8b17e432f69762d5cbeb07313fd340b9b7ed466ca1df016583af107e5da7af5f942b8ed

  • C:\Users\Admin\E696D64614\winlogon.exe

    Filesize

    693KB

    MD5

    e4540200b9618a0e460c3ffc4373c6c2

    SHA1

    07757e76942afbef15c6dcb05d1eb0b95f2ba659

    SHA256

    29ce06feb138c8a032cb103623affc4d2c55e78cbf07f32c035ef7ef1a35cd88

    SHA512

    a7a0f6c50bb1cbe21371cd397c78ec594f81261442cc8609d7290601a8b17e432f69762d5cbeb07313fd340b9b7ed466ca1df016583af107e5da7af5f942b8ed

  • C:\Users\Admin\E696D64614\winlogon.exe

    Filesize

    693KB

    MD5

    e4540200b9618a0e460c3ffc4373c6c2

    SHA1

    07757e76942afbef15c6dcb05d1eb0b95f2ba659

    SHA256

    29ce06feb138c8a032cb103623affc4d2c55e78cbf07f32c035ef7ef1a35cd88

    SHA512

    a7a0f6c50bb1cbe21371cd397c78ec594f81261442cc8609d7290601a8b17e432f69762d5cbeb07313fd340b9b7ed466ca1df016583af107e5da7af5f942b8ed

  • \Users\Admin\E696D64614\winlogon.exe

    Filesize

    693KB

    MD5

    e4540200b9618a0e460c3ffc4373c6c2

    SHA1

    07757e76942afbef15c6dcb05d1eb0b95f2ba659

    SHA256

    29ce06feb138c8a032cb103623affc4d2c55e78cbf07f32c035ef7ef1a35cd88

    SHA512

    a7a0f6c50bb1cbe21371cd397c78ec594f81261442cc8609d7290601a8b17e432f69762d5cbeb07313fd340b9b7ed466ca1df016583af107e5da7af5f942b8ed

  • \Users\Admin\E696D64614\winlogon.exe

    Filesize

    693KB

    MD5

    e4540200b9618a0e460c3ffc4373c6c2

    SHA1

    07757e76942afbef15c6dcb05d1eb0b95f2ba659

    SHA256

    29ce06feb138c8a032cb103623affc4d2c55e78cbf07f32c035ef7ef1a35cd88

    SHA512

    a7a0f6c50bb1cbe21371cd397c78ec594f81261442cc8609d7290601a8b17e432f69762d5cbeb07313fd340b9b7ed466ca1df016583af107e5da7af5f942b8ed

  • memory/1148-56-0x0000000075041000-0x0000000075043000-memory.dmp

    Filesize

    8KB

  • memory/1148-61-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/1468-72-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1468-73-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1468-68-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1468-86-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1468-87-0x0000000000400000-0x000000000043F000-memory.dmp

    Filesize

    252KB

  • memory/1548-66-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/1548-62-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB