Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 19:05
Static task
static1
Behavioral task
behavioral1
Sample
b54559a9ec4458ac16b0a4714201a8b6c6968b68c62a38d28fba1c2b908f981d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b54559a9ec4458ac16b0a4714201a8b6c6968b68c62a38d28fba1c2b908f981d.exe
Resource
win10v2004-20220812-en
General
-
Target
b54559a9ec4458ac16b0a4714201a8b6c6968b68c62a38d28fba1c2b908f981d.exe
-
Size
146KB
-
MD5
ac91834a560f32091239091be536b1f5
-
SHA1
93be5f9e4765a52ae029460da608f474c4b2580e
-
SHA256
b54559a9ec4458ac16b0a4714201a8b6c6968b68c62a38d28fba1c2b908f981d
-
SHA512
f60a2c41025a9ea4d4dc89576c85d29bfa1c03978e4659d7223bad6018c0a7d292284b41292ee5bca52780113790ba06648faa04c345b37f9bf43ce09e82bbbb
-
SSDEEP
3072:6LeoO7ta1EzHOWdJBE673HCcO0/qjsSKutSwxk43z6NN:6LeoO7ta1ESWdv/3HCcOdjXSwT32N
Malware Config
Signatures
-
Loads dropped DLL 4 IoCs
pid Process 1420 rundll32.exe 1420 rundll32.exe 1420 rundll32.exe 1420 rundll32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{524F6591-737E-11ED-9F7B-6E705F4A26E5} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1276 iexplore.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1276 iexplore.exe 1276 iexplore.exe 1764 IEXPLORE.EXE 1764 IEXPLORE.EXE 1420 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1636 wrote to memory of 1420 1636 b54559a9ec4458ac16b0a4714201a8b6c6968b68c62a38d28fba1c2b908f981d.exe 28 PID 1636 wrote to memory of 1420 1636 b54559a9ec4458ac16b0a4714201a8b6c6968b68c62a38d28fba1c2b908f981d.exe 28 PID 1636 wrote to memory of 1420 1636 b54559a9ec4458ac16b0a4714201a8b6c6968b68c62a38d28fba1c2b908f981d.exe 28 PID 1636 wrote to memory of 1420 1636 b54559a9ec4458ac16b0a4714201a8b6c6968b68c62a38d28fba1c2b908f981d.exe 28 PID 1636 wrote to memory of 1420 1636 b54559a9ec4458ac16b0a4714201a8b6c6968b68c62a38d28fba1c2b908f981d.exe 28 PID 1636 wrote to memory of 1420 1636 b54559a9ec4458ac16b0a4714201a8b6c6968b68c62a38d28fba1c2b908f981d.exe 28 PID 1636 wrote to memory of 1420 1636 b54559a9ec4458ac16b0a4714201a8b6c6968b68c62a38d28fba1c2b908f981d.exe 28 PID 1276 wrote to memory of 1764 1276 iexplore.exe 31 PID 1276 wrote to memory of 1764 1276 iexplore.exe 31 PID 1276 wrote to memory of 1764 1276 iexplore.exe 31 PID 1276 wrote to memory of 1764 1276 iexplore.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b54559a9ec4458ac16b0a4714201a8b6c6968b68c62a38d28fba1c2b908f981d.exe"C:\Users\Admin\AppData\Local\Temp\b54559a9ec4458ac16b0a4714201a8b6c6968b68c62a38d28fba1c2b908f981d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Roaming\ocalet.dll",Restore2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1420
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1276 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1764
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
146KB
MD579b3a2a7683a5d0f36557d82201115f1
SHA1a4a5e1f3935e2195e5448b302ae842ad0619f807
SHA256a8761baccca6235d01a695851fbe647202c45e9a521e1e3435fe2b0d7f98f910
SHA512b4ac464288296a2e56db4d4e62d052c9f17593b6c8401c8890a9beaea20e14610887c26e27f924539c146bb2a1678b3fd52be3df1e7b49182ea10c2236c3f151
-
Filesize
146KB
MD579b3a2a7683a5d0f36557d82201115f1
SHA1a4a5e1f3935e2195e5448b302ae842ad0619f807
SHA256a8761baccca6235d01a695851fbe647202c45e9a521e1e3435fe2b0d7f98f910
SHA512b4ac464288296a2e56db4d4e62d052c9f17593b6c8401c8890a9beaea20e14610887c26e27f924539c146bb2a1678b3fd52be3df1e7b49182ea10c2236c3f151
-
Filesize
146KB
MD579b3a2a7683a5d0f36557d82201115f1
SHA1a4a5e1f3935e2195e5448b302ae842ad0619f807
SHA256a8761baccca6235d01a695851fbe647202c45e9a521e1e3435fe2b0d7f98f910
SHA512b4ac464288296a2e56db4d4e62d052c9f17593b6c8401c8890a9beaea20e14610887c26e27f924539c146bb2a1678b3fd52be3df1e7b49182ea10c2236c3f151
-
Filesize
146KB
MD579b3a2a7683a5d0f36557d82201115f1
SHA1a4a5e1f3935e2195e5448b302ae842ad0619f807
SHA256a8761baccca6235d01a695851fbe647202c45e9a521e1e3435fe2b0d7f98f910
SHA512b4ac464288296a2e56db4d4e62d052c9f17593b6c8401c8890a9beaea20e14610887c26e27f924539c146bb2a1678b3fd52be3df1e7b49182ea10c2236c3f151
-
Filesize
146KB
MD579b3a2a7683a5d0f36557d82201115f1
SHA1a4a5e1f3935e2195e5448b302ae842ad0619f807
SHA256a8761baccca6235d01a695851fbe647202c45e9a521e1e3435fe2b0d7f98f910
SHA512b4ac464288296a2e56db4d4e62d052c9f17593b6c8401c8890a9beaea20e14610887c26e27f924539c146bb2a1678b3fd52be3df1e7b49182ea10c2236c3f151