Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
130s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 02:48
Static task
static1
Behavioral task
behavioral1
Sample
7d5d3d80f9fc4aeeb4080bc33c35b9f72e05b057e5f0e53a61e9df69946f95eb.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7d5d3d80f9fc4aeeb4080bc33c35b9f72e05b057e5f0e53a61e9df69946f95eb.exe
Resource
win10v2004-20221111-en
General
-
Target
7d5d3d80f9fc4aeeb4080bc33c35b9f72e05b057e5f0e53a61e9df69946f95eb.exe
-
Size
172KB
-
MD5
e7a67f9f1a240bbd31e85ac4bb20d1ea
-
SHA1
bd05704209226db8c1fe7bc04c552e80050c77a4
-
SHA256
7d5d3d80f9fc4aeeb4080bc33c35b9f72e05b057e5f0e53a61e9df69946f95eb
-
SHA512
2c023941fad949ed7b8f737deddd74a3035f74767b7cf22eb65d96b4af03a1791bff9d044c3b4d18a5d4be3ee5cb6272e3a7a3b7b404b04fd81a9ce9b44ddc0a
-
SSDEEP
1536:8+4G9Paz/Om80cQXTvJlQZfAgZdgx9opbzv1Nwn8yHCtJ1tOdAR5H/Qt8Upkd:oP/vJyNIXKbS8Z2dADfQt8Upkd
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\ya.ru\ = "21" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\ya.ru\ = "9" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "357" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376808898" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\ya.ru\Total = "389" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{17360FB1-72C8-11ED-AA9B-EE0F1DD48A27} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\ya.ru IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\ya.ru\Total = "21" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\ya.ru\Total = "63" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\ya.ru\NumberOfSubdomains = "1" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000009ea00c3552a9b4c90f80f88d4c20abc000000000200000000001066000000010000200000001831c61dfab20e64d7152bda629884979a4e8c43d016fea91cd3f15fc905897c000000000e800000000200002000000002159a274fd862f3ae2d94f7803de9c0614886ec6c3244bddc84505f7f77e1b62000000008375fec150bd9fbbdc1e03b5a140c4e4603eae4bf6c50060c5a1c65513b710440000000027c7e13ae989c316813ad96a9d4cd69b2167a0fc0307f4223b504236cf25cc052c16c3da1b6402c30cb50543d79179de5c79c110ce9c982288047d6ee88caf7 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\ya.ru\ = "63" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\ya.ru\ = "357" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "63" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "389" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "21" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "35" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\ya.ru\ = "389" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\ya.ru\Total = "9" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "9" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\ya.ru\Total = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\ya.ru\Total = "35" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\ya.ru\ = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\ya.ru\ = "35" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\ya.ru\Total = "357" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30ae22f3d406d901 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1992 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1992 IEXPLORE.EXE 1992 IEXPLORE.EXE 676 IEXPLORE.EXE 676 IEXPLORE.EXE 676 IEXPLORE.EXE 676 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1348 wrote to memory of 2036 1348 7d5d3d80f9fc4aeeb4080bc33c35b9f72e05b057e5f0e53a61e9df69946f95eb.exe 27 PID 1348 wrote to memory of 2036 1348 7d5d3d80f9fc4aeeb4080bc33c35b9f72e05b057e5f0e53a61e9df69946f95eb.exe 27 PID 1348 wrote to memory of 2036 1348 7d5d3d80f9fc4aeeb4080bc33c35b9f72e05b057e5f0e53a61e9df69946f95eb.exe 27 PID 1348 wrote to memory of 2036 1348 7d5d3d80f9fc4aeeb4080bc33c35b9f72e05b057e5f0e53a61e9df69946f95eb.exe 27 PID 2036 wrote to memory of 1772 2036 7d5d3d80f9fc4aeeb4080bc33c35b9f72e05b057e5f0e53a61e9df69946f95eb.exe 28 PID 2036 wrote to memory of 1772 2036 7d5d3d80f9fc4aeeb4080bc33c35b9f72e05b057e5f0e53a61e9df69946f95eb.exe 28 PID 2036 wrote to memory of 1772 2036 7d5d3d80f9fc4aeeb4080bc33c35b9f72e05b057e5f0e53a61e9df69946f95eb.exe 28 PID 2036 wrote to memory of 1772 2036 7d5d3d80f9fc4aeeb4080bc33c35b9f72e05b057e5f0e53a61e9df69946f95eb.exe 28 PID 1772 wrote to memory of 1992 1772 iexplore.exe 29 PID 1772 wrote to memory of 1992 1772 iexplore.exe 29 PID 1772 wrote to memory of 1992 1772 iexplore.exe 29 PID 1772 wrote to memory of 1992 1772 iexplore.exe 29 PID 1992 wrote to memory of 676 1992 IEXPLORE.EXE 31 PID 1992 wrote to memory of 676 1992 IEXPLORE.EXE 31 PID 1992 wrote to memory of 676 1992 IEXPLORE.EXE 31 PID 1992 wrote to memory of 676 1992 IEXPLORE.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d5d3d80f9fc4aeeb4080bc33c35b9f72e05b057e5f0e53a61e9df69946f95eb.exe"C:\Users\Admin\AppData\Local\Temp\7d5d3d80f9fc4aeeb4080bc33c35b9f72e05b057e5f0e53a61e9df69946f95eb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\7d5d3d80f9fc4aeeb4080bc33c35b9f72e05b057e5f0e53a61e9df69946f95eb.exeC:\Users\Admin\AppData\Local\Temp\7d5d3d80f9fc4aeeb4080bc33c35b9f72e05b057e5f0e53a61e9df69946f95eb.exe -rc2⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\program files (x86)\Internet Explorer\iexplore.exe"C:\program files (x86)\Internet Explorer\iexplore.exe" ya.ru3⤵
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" ya.ru4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1992 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:676
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5aa2f5aaffe124227d7f06e6ff575c50c
SHA19ebe266dc50ef9e73d1055c54b65876dc2e160fe
SHA256313446f29b07df765cb3875935111c3a7789b6c2ef1613955adf7ccdcb41e98c
SHA512d8f210430679d4e2d6214e8b5f1a131484b3a30764cdbff80c07b4c86528035271b9b3d19b3bd02c5c91b60fb9f8c548a51d5d588a8a3cc7633203c5b15a523a
-
Filesize
5KB
MD55d19b0e5938dabfdac2eda583392ee07
SHA16efd54f6fdc33c0665f47ea8a6bfbe4c5cde69e4
SHA256a0b1b6d425fe6b9fcf53a83dee7bdb2a76dad7814b19ca6c26d2bd1332706df4
SHA51297e3efefe2725dfd9bdcbce3977f4e1a07e2340a0c590d065733fc6f830fb460b9809ad576738fca0f7a45232953b7d4f55bb55a58ef17a678902b4b9e3602a1
-
Filesize
531B
MD5b0a7448bcdd74663a901fbb56f1adfb4
SHA12cbd2478f757630d6fca1d0b1fff2176266e85ab
SHA256b4feee41db5553fb4d8f569fc5dc8c234a79c69356431ab06ffeb6f5d0db6915
SHA512ef6d50412f871df9bb335873d79d185f3e91dc7fa2124f8c12bad6e25b205b8d724be22ff4877b544925754e12799f20260a175703018f668fcdb051250f531d