Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
160s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 10:50
Static task
static1
Behavioral task
behavioral1
Sample
f9230ed6f56e9698eaed425dab6a1252cd56e4cc769bea88eb627fa5d5b223bd.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f9230ed6f56e9698eaed425dab6a1252cd56e4cc769bea88eb627fa5d5b223bd.exe
Resource
win10v2004-20221111-en
General
-
Target
f9230ed6f56e9698eaed425dab6a1252cd56e4cc769bea88eb627fa5d5b223bd.exe
-
Size
1.5MB
-
MD5
cb2e44fceaa9a4e6daa43c7f3a35b1af
-
SHA1
b6b293334d0a40128c731fb9d8ec2137657ab6e5
-
SHA256
f9230ed6f56e9698eaed425dab6a1252cd56e4cc769bea88eb627fa5d5b223bd
-
SHA512
4724029b8c6459f6495800dcbc9459410d3cae5f855ca7cab70acdb7b86462016c58e1420dd84f995e18f2882dfa9441db05c183462a68e0636bd59100d6dbdb
-
SSDEEP
24576:caeMqk4eF59tKhCvF7dnjgjxpP19f83OXXWYnR8ivQltND2NkSkIkyjL:caAHesCvFWlc3OWYRElKNk5IkyjL
Malware Config
Signatures
-
resource yara_rule behavioral2/files/0x0007000000022e5a-134.dat aspack_v212_v242 behavioral2/files/0x0007000000022e5a-135.dat aspack_v212_v242 -
Executes dropped EXE 2 IoCs
pid Process 4348 2071.exe 636 ÄæÕ½ßäßä͸ÊÓ¼ÒÍ¥Íø°ÉͨÓðæ0126Sp1.exe -
Modifies AppInit DLL entries 2 TTPs
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation f9230ed6f56e9698eaed425dab6a1252cd56e4cc769bea88eb627fa5d5b223bd.exe Key value queried \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Control Panel\International\Geo\Nation 2071.exe -
Loads dropped DLL 1 IoCs
pid Process 4348 2071.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\sys.sys 2071.exe File created C:\Windows\SysWOW64\intel.dll 2071.exe File opened for modification C:\Windows\SysWOW64\history.log 2071.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 636 ÄæÕ½ßäßä͸ÊÓ¼ÒÍ¥Íø°ÉͨÓðæ0126Sp1.exe 636 ÄæÕ½ßäßä͸ÊÓ¼ÒÍ¥Íø°ÉͨÓðæ0126Sp1.exe 636 ÄæÕ½ßäßä͸ÊÓ¼ÒÍ¥Íø°ÉͨÓðæ0126Sp1.exe 636 ÄæÕ½ßäßä͸ÊÓ¼ÒÍ¥Íø°ÉͨÓðæ0126Sp1.exe 636 ÄæÕ½ßäßä͸ÊÓ¼ÒÍ¥Íø°ÉͨÓðæ0126Sp1.exe 636 ÄæÕ½ßäßä͸ÊÓ¼ÒÍ¥Íø°ÉͨÓðæ0126Sp1.exe 636 ÄæÕ½ßäßä͸ÊÓ¼ÒÍ¥Íø°ÉͨÓðæ0126Sp1.exe 636 ÄæÕ½ßäßä͸ÊÓ¼ÒÍ¥Íø°ÉͨÓðæ0126Sp1.exe 636 ÄæÕ½ßäßä͸ÊÓ¼ÒÍ¥Íø°ÉͨÓðæ0126Sp1.exe 636 ÄæÕ½ßäßä͸ÊÓ¼ÒÍ¥Íø°ÉͨÓðæ0126Sp1.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\iexplore.exe 2071.exe File created C:\Program Files\iexplore.exe 2071.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 2 IoCs
pid pid_target Process procid_target 4584 4348 WerFault.exe 83 1224 636 WerFault.exe 84 -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31000385" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "693365569" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{53FE5330-7334-11ED-BF5F-DE991C57DA8F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31000385" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "693365569" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e011fd294107d901 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "685865302" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31000385" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31000385" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "685865302" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000eef4ddb70fa9964f8bf69d510f57c1eb000000000200000000001066000000010000200000005f9821d0f37d50d2a1751f6ba984be62ce5efcd9fdec1e09866964ccdcaebc5a000000000e800000000200002000000013d6c62fdcdf8fc3ff6d6d58ee218e71b5159076b8d48efbf746b9efcc06493320000000767a97fef3ed9e39a74a94d928ee802ca2f01031bfe606756efbf9647fe6f8df400000008b7ea4e8fc4fb2b4107e878c56f496cf6c0cf17c46fb3afc8af35c821b33de90d0eac009bf58e3ca8d4bd382a0f60c8e48f3e0e73b0bea6462263ee12db16d43 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000eef4ddb70fa9964f8bf69d510f57c1eb00000000020000000000106600000001000020000000ed95e4559a3e3a3de9af337e4b77086720c30b1c77245c8ae9b4c70e0b0afb6d000000000e80000000020000200000002f32e2559527c262e04a56ad9e754afd018bed67e2ca3d1826bdc1bab71d9860200000000c7f5444d8557215c6e7c716d326318286c4eec6282e0ff98cd6aead38114d0740000000317a730449ad90f14330b23b7692b7d57586fc607fffb75341987c1f8b594ed55f078afa8f2a1aca1622e364396b947c9fd7d560e814e9ced65d346c70743378 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 40e1b0414107d901 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "376855392" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4348 2071.exe 4348 2071.exe 4348 2071.exe 4348 2071.exe 4348 2071.exe 4348 2071.exe 4348 2071.exe 4348 2071.exe 4348 2071.exe 4348 2071.exe 4348 2071.exe 4348 2071.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 668 Process not Found -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4652 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4652 iexplore.exe 4652 iexplore.exe 1508 IEXPLORE.EXE 1508 IEXPLORE.EXE 1508 IEXPLORE.EXE 1508 IEXPLORE.EXE 636 ÄæÕ½ßäßä͸ÊÓ¼ÒÍ¥Íø°ÉͨÓðæ0126Sp1.exe 636 ÄæÕ½ßäßä͸ÊÓ¼ÒÍ¥Íø°ÉͨÓðæ0126Sp1.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4772 wrote to memory of 4348 4772 f9230ed6f56e9698eaed425dab6a1252cd56e4cc769bea88eb627fa5d5b223bd.exe 83 PID 4772 wrote to memory of 4348 4772 f9230ed6f56e9698eaed425dab6a1252cd56e4cc769bea88eb627fa5d5b223bd.exe 83 PID 4772 wrote to memory of 4348 4772 f9230ed6f56e9698eaed425dab6a1252cd56e4cc769bea88eb627fa5d5b223bd.exe 83 PID 4772 wrote to memory of 636 4772 f9230ed6f56e9698eaed425dab6a1252cd56e4cc769bea88eb627fa5d5b223bd.exe 84 PID 4772 wrote to memory of 636 4772 f9230ed6f56e9698eaed425dab6a1252cd56e4cc769bea88eb627fa5d5b223bd.exe 84 PID 4772 wrote to memory of 636 4772 f9230ed6f56e9698eaed425dab6a1252cd56e4cc769bea88eb627fa5d5b223bd.exe 84 PID 4348 wrote to memory of 4652 4348 2071.exe 87 PID 4348 wrote to memory of 4652 4348 2071.exe 87 PID 4652 wrote to memory of 1508 4652 iexplore.exe 88 PID 4652 wrote to memory of 1508 4652 iexplore.exe 88 PID 4652 wrote to memory of 1508 4652 iexplore.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9230ed6f56e9698eaed425dab6a1252cd56e4cc769bea88eb627fa5d5b223bd.exe"C:\Users\Admin\AppData\Local\Temp\f9230ed6f56e9698eaed425dab6a1252cd56e4cc769bea88eb627fa5d5b223bd.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\2071.exe"C:\Users\Admin\AppData\Local\Temp\2071.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://ad.tjchajian.com:82/ip.html?id=20713⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4652 CREDAT:17410 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1508
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 16243⤵
- Program crash
PID:4584
-
-
-
C:\Users\Admin\AppData\Local\Temp\ÄæÕ½ßäßä͸ÊÓ¼ÒÍ¥Íø°ÉͨÓðæ0126Sp1.exe"C:\Users\Admin\AppData\Local\Temp\ÄæÕ½ßäßä͸ÊÓ¼ÒÍ¥Íø°ÉͨÓðæ0126Sp1.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
PID:636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 636 -s 7283⤵
- Program crash
PID:1224
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4348 -ip 43481⤵PID:448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 636 -ip 6361⤵PID:3324
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114KB
MD56a3403a72b8efaecf87009a0cdf709c7
SHA14db26c3d0ef07c6107278b7583365fe47da6c03f
SHA2563f4b5cde4f217058f2914d18e52b5e744776079b161a6297518a87027076743d
SHA5124c114d63fc10dbccff5811b545924dd07f1690ffa581e68faf5609955ad02791a1d83313cc52bb5e6ae7a0e2c784d257c7256c3b9c78c5927ed0709e32f02a51
-
Filesize
114KB
MD56a3403a72b8efaecf87009a0cdf709c7
SHA14db26c3d0ef07c6107278b7583365fe47da6c03f
SHA2563f4b5cde4f217058f2914d18e52b5e744776079b161a6297518a87027076743d
SHA5124c114d63fc10dbccff5811b545924dd07f1690ffa581e68faf5609955ad02791a1d83313cc52bb5e6ae7a0e2c784d257c7256c3b9c78c5927ed0709e32f02a51
-
Filesize
1.7MB
MD508e308a1c4176d11a2d88f1bc94332a0
SHA17b7c6bd39ad1aae8deb4e322abc476a4715bd9f7
SHA256931270280aa42b9d7284b1be6019194e11ae8d972b373b4bd751cb253c9fcb5e
SHA512ebadcc322351e24bf725826ac9dfbdaf21454bfe1c2642195f822da28958143cbdab1ee4676eee7a1767fc14995f031c54c1253f27b2a186287a08942f990966
-
Filesize
1.7MB
MD508e308a1c4176d11a2d88f1bc94332a0
SHA17b7c6bd39ad1aae8deb4e322abc476a4715bd9f7
SHA256931270280aa42b9d7284b1be6019194e11ae8d972b373b4bd751cb253c9fcb5e
SHA512ebadcc322351e24bf725826ac9dfbdaf21454bfe1c2642195f822da28958143cbdab1ee4676eee7a1767fc14995f031c54c1253f27b2a186287a08942f990966
-
Filesize
142KB
MD55b6ae60afa76e99a591556ba5bdc0acb
SHA1e3f12b7fe4337a55c9e859a5ceec95f749cf457b
SHA2567a0cbe06ce186a11a3240015a9e7adc24db91a78f35170933efdc062aa1c4378
SHA5124394f5f198eaf5315e4dba3a03204b9ef3fd4340ef7a98fa865c7dab15fe28d9586ac8cfe738ec60c9961437586d5deba25c6622e1f8af3c4e806022c236c98a