Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 10:46
Static task
static1
Behavioral task
behavioral1
Sample
1333b2ea3c76011c223163b88bc761969673cec393813d7a84f06b283281653d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1333b2ea3c76011c223163b88bc761969673cec393813d7a84f06b283281653d.exe
Resource
win10v2004-20220901-en
General
-
Target
1333b2ea3c76011c223163b88bc761969673cec393813d7a84f06b283281653d.exe
-
Size
164KB
-
MD5
1034f929741855e639d0090a768468a3
-
SHA1
8dc5cb38ed5c25615bffbf2e20f16493665e4986
-
SHA256
1333b2ea3c76011c223163b88bc761969673cec393813d7a84f06b283281653d
-
SHA512
64eb59fa9e40eef9dd6e80ddd44654b45f89de296fc6fcd77c5d3af8caff70ac9a824fde4a26732cfbd22b42bc7d66d45b2efb4e2cd5978937aba06383834eb7
-
SSDEEP
1536:qNtiyAHGX7PI5BzXjMDO/9XEThz4a7+hKMNq5qnDoMfeZmEo7fblnbONDSwW+lpw:utibsPIQDGx+MqmK6q0MsgEb0O+lQ2C
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 1333b2ea3c76011c223163b88bc761969673cec393813d7a84f06b283281653d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376854031" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "33838503" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006dc09e4cff6958489b1248186b80343a00000000020000000000106600000001000020000000e56149d9ac37c5d6c54b672d9dd446057156059c4d730025ec97b006aeef952e000000000e80000000020000200000007e4fd5b8d0e54289af8e77423c06f51ffc882e67e0180cb272b40c9d30672ce5200000001f373a4b3c5926389a42bb5aad848fac2ca70a1b62ad04329e145231123a8bdd40000000984d513e5e2daedefce978abdb135172376184aea1e7c2f65738a7f1e202a0b356b7cb68a51dfdb6b0110baf1b0d1dd609daf8bdc70233d4f6596b0ca090f8ba iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = a092eb023e07d901 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{2D2F7E70-7331-11ED-A0EE-DAAB7EF686E7} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000006dc09e4cff6958489b1248186b80343a0000000002000000000010660000000100002000000031524e7950f559a5775afdc40401929106895d4f52f7015178ac8d7fdf59883f000000000e8000000002000020000000aa8662ad3efcfd05b1917807e3f8cf1cbc30edfd3c0011ce2f7df2a23e26dc4b200000002a789c70c42e6d6c3a15adc445b2ade76578a7b77a42cf253b0847d27f057e464000000020705a6d8db053a728290e1d7d7925b23229642185607f46a5fb98a2dabd55428795ccecfdf16bdfc9034c1557449b57df5f4936c9de8cd1cb6c110462345aeb iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31000382" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "28995075" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000000000001000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31000382" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31000382" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e053d1023e07d901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "28995075" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3368 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3368 iexplore.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2620 1333b2ea3c76011c223163b88bc761969673cec393813d7a84f06b283281653d.exe 3368 iexplore.exe 3368 iexplore.exe 424 IEXPLORE.EXE 424 IEXPLORE.EXE 424 IEXPLORE.EXE 424 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2620 wrote to memory of 3368 2620 1333b2ea3c76011c223163b88bc761969673cec393813d7a84f06b283281653d.exe 83 PID 2620 wrote to memory of 3368 2620 1333b2ea3c76011c223163b88bc761969673cec393813d7a84f06b283281653d.exe 83 PID 3368 wrote to memory of 424 3368 iexplore.exe 84 PID 3368 wrote to memory of 424 3368 iexplore.exe 84 PID 3368 wrote to memory of 424 3368 iexplore.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\1333b2ea3c76011c223163b88bc761969673cec393813d7a84f06b283281653d.exe"C:\Users\Admin\AppData\Local\Temp\1333b2ea3c76011c223163b88bc761969673cec393813d7a84f06b283281653d.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://me2.do/G8yFKB42⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3368 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:424
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD50ff2da8bfc83bec6bce38ba6a3f7bf58
SHA184c37df7bed08d69f040c289676735c49a9564eb
SHA25691026f24711c435d99a44884c7239ed1265cd17c0259a6c5885f69e4309421ea
SHA51278afdc44d7557b2f14444182085252e8456c91289511d6f2abfd1d7273d05baba9a94206d370add716b9fc30dc326a1a2e1c78f642e926759d962cf216c3a489
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD5cfde4b4e5b33423a1c3a905766b3fe6e
SHA12bec0a89d45d12fbc2714f30d151e09c0a85d28b
SHA25682f1e3119e18a31706fb14e32eaafdb92a9740ba6dabfeba8e4daca37226e84e
SHA5128f6ece005ed4a5f8c9b931457fec72e99d9dc27add2ef0b7dbce5c8f756aea18e1f06e382928b6a330cd3db51318f7312f44a641ba992558ecc16c21cb3d590f