Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
110s -
max time network
176s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 12:43
Static task
static1
Behavioral task
behavioral1
Sample
cf5daae5735476f3cf2d46d7a277f2d57e2d0fe284d7df14a2fe6b31e4adcdb1.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
cf5daae5735476f3cf2d46d7a277f2d57e2d0fe284d7df14a2fe6b31e4adcdb1.exe
Resource
win10v2004-20220812-en
General
-
Target
cf5daae5735476f3cf2d46d7a277f2d57e2d0fe284d7df14a2fe6b31e4adcdb1.exe
-
Size
784KB
-
MD5
37f9ac0e96468f74805962394b517848
-
SHA1
65a0a6e164c93ac9a9fbb37468f517a8a5b3bfd2
-
SHA256
cf5daae5735476f3cf2d46d7a277f2d57e2d0fe284d7df14a2fe6b31e4adcdb1
-
SHA512
8996d8c5eb85fbaefc9af493fd394c276bd39ee8ef1068ebd0afef5a2d6ed4f51329b490925f1baecad9023ab847c4d9df0e97b27f49543bdd134eaaecc83dd1
-
SSDEEP
24576:tzYXFB85pZxx9+WPAcsrYdeCEIOzI4+j4el6/IRBe6:yVB85prts+eCEIapY4el6/A
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 6 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0009000000012318-58.dat acprotect behavioral1/files/0x0009000000012318-68.dat acprotect behavioral1/files/0x0009000000012318-67.dat acprotect behavioral1/files/0x000800000001231e-66.dat acprotect behavioral1/files/0x000800000001231b-70.dat acprotect behavioral1/files/0x000800000001231b-65.dat acprotect -
Executes dropped EXE 2 IoCs
pid Process 972 upx.exe 1356 svchost.exe¤þ.exe -
resource yara_rule behavioral1/files/0x000b000000012302-56.dat upx behavioral1/files/0x000b000000012302-57.dat upx behavioral1/files/0x0009000000012318-58.dat upx behavioral1/files/0x0008000000012322-60.dat upx behavioral1/files/0x0008000000012322-63.dat upx behavioral1/files/0x0009000000012318-68.dat upx behavioral1/files/0x0009000000012318-67.dat upx behavioral1/files/0x000800000001231e-66.dat upx behavioral1/files/0x0008000000012322-64.dat upx behavioral1/files/0x0008000000012322-61.dat upx behavioral1/files/0x000800000001231b-70.dat upx behavioral1/files/0x000800000001231b-65.dat upx behavioral1/memory/972-71-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral1/memory/972-73-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral1/memory/1356-75-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral1/memory/1356-76-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral1/memory/1356-77-0x00000000002D0000-0x00000000002F4000-memory.dmp upx behavioral1/memory/972-79-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral1/memory/1356-81-0x0000000010000000-0x000000001012A000-memory.dmp upx behavioral1/memory/1356-82-0x0000000010000000-0x000000001012A000-memory.dmp upx -
Loads dropped DLL 5 IoCs
pid Process 972 upx.exe 972 upx.exe 972 upx.exe 1356 svchost.exe¤þ.exe 1356 svchost.exe¤þ.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\svchost.exe¤þ.exe upx.exe File opened for modification C:\Windows\SysWOW64\svchost.exe¤þ.exe upx.exe File created C:\Windows\SysWOW64\svchost.exe¤þ.dll svchost.exe¤þ.exe File opened for modification C:\Windows\SysWOW64\svchost.exe¤þ.dll svchost.exe¤þ.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files\Internet Explorer\Angel.DLL svchost.exe¤þ.exe File opened for modification C:\Program Files\Internet Explorer\Angel.DLL svchost.exe¤þ.exe File created C:\Program Files\Internet Explorer\dp1.fne svchost.exe¤þ.exe File opened for modification C:\Program Files\Internet Explorer\dp1.fne svchost.exe¤þ.exe File created C:\Program Files\Internet Explorer\Exmlrpc.fne svchost.exe¤þ.exe File opened for modification C:\Program Files\Internet Explorer\Exmlrpc.fne svchost.exe¤þ.exe File created C:\Program Files\Internet Explorer\krnln.fnr svchost.exe¤þ.exe File opened for modification C:\Program Files\Internet Explorer\krnln.fnr svchost.exe¤þ.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\upx.exe cf5daae5735476f3cf2d46d7a277f2d57e2d0fe284d7df14a2fe6b31e4adcdb1.exe File opened for modification C:\Windows\upx.exe cf5daae5735476f3cf2d46d7a277f2d57e2d0fe284d7df14a2fe6b31e4adcdb1.exe File created C:\Windows\Fonts\svchost.exe¤þ.jpg svchost.exe¤þ.exe File opened for modification C:\Windows\Fonts\svchost.exe¤þ.jpg svchost.exe¤þ.exe File opened for modification C:\Windows\upx.exe upx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{09E1C0B1-7576-11ED-A70D-7AAB9C3024C2} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377103519" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\Check_Associations = "NO" svchost.exe¤þ.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 972 upx.exe 1356 svchost.exe¤þ.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 1640 cf5daae5735476f3cf2d46d7a277f2d57e2d0fe284d7df14a2fe6b31e4adcdb1.exe Token: SeBackupPrivilege 1640 cf5daae5735476f3cf2d46d7a277f2d57e2d0fe284d7df14a2fe6b31e4adcdb1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 664 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 972 upx.exe 1356 svchost.exe¤þ.exe 664 IEXPLORE.EXE 664 IEXPLORE.EXE 1948 IEXPLORE.EXE 1948 IEXPLORE.EXE 1948 IEXPLORE.EXE 1948 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1640 wrote to memory of 972 1640 cf5daae5735476f3cf2d46d7a277f2d57e2d0fe284d7df14a2fe6b31e4adcdb1.exe 28 PID 1640 wrote to memory of 972 1640 cf5daae5735476f3cf2d46d7a277f2d57e2d0fe284d7df14a2fe6b31e4adcdb1.exe 28 PID 1640 wrote to memory of 972 1640 cf5daae5735476f3cf2d46d7a277f2d57e2d0fe284d7df14a2fe6b31e4adcdb1.exe 28 PID 1640 wrote to memory of 972 1640 cf5daae5735476f3cf2d46d7a277f2d57e2d0fe284d7df14a2fe6b31e4adcdb1.exe 28 PID 1640 wrote to memory of 972 1640 cf5daae5735476f3cf2d46d7a277f2d57e2d0fe284d7df14a2fe6b31e4adcdb1.exe 28 PID 1640 wrote to memory of 972 1640 cf5daae5735476f3cf2d46d7a277f2d57e2d0fe284d7df14a2fe6b31e4adcdb1.exe 28 PID 1640 wrote to memory of 972 1640 cf5daae5735476f3cf2d46d7a277f2d57e2d0fe284d7df14a2fe6b31e4adcdb1.exe 28 PID 972 wrote to memory of 1356 972 upx.exe 29 PID 972 wrote to memory of 1356 972 upx.exe 29 PID 972 wrote to memory of 1356 972 upx.exe 29 PID 972 wrote to memory of 1356 972 upx.exe 29 PID 1356 wrote to memory of 664 1356 svchost.exe¤þ.exe 30 PID 1356 wrote to memory of 664 1356 svchost.exe¤þ.exe 30 PID 1356 wrote to memory of 664 1356 svchost.exe¤þ.exe 30 PID 1356 wrote to memory of 664 1356 svchost.exe¤þ.exe 30 PID 664 wrote to memory of 1948 664 IEXPLORE.EXE 32 PID 664 wrote to memory of 1948 664 IEXPLORE.EXE 32 PID 664 wrote to memory of 1948 664 IEXPLORE.EXE 32 PID 664 wrote to memory of 1948 664 IEXPLORE.EXE 32 PID 972 wrote to memory of 796 972 upx.exe 33 PID 972 wrote to memory of 796 972 upx.exe 33 PID 972 wrote to memory of 796 972 upx.exe 33 PID 972 wrote to memory of 796 972 upx.exe 33 PID 1356 wrote to memory of 664 1356 svchost.exe¤þ.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf5daae5735476f3cf2d46d7a277f2d57e2d0fe284d7df14a2fe6b31e4adcdb1.exe"C:\Users\Admin\AppData\Local\Temp\cf5daae5735476f3cf2d46d7a277f2d57e2d0fe284d7df14a2fe6b31e4adcdb1.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\upx.exe"C:\Windows\upx.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\SysWOW64\svchost.exe¤þ.exeC:\Windows\system32\svchost.exe¤þ.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:664 CREDAT:275457 /prefetch:25⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1948
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c c:\delus.bat3⤵PID:796
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5387cf1d2f17aff6967f3107773764513
SHA1b971bcd44988bee744f8133acb032e07d9dcd1db
SHA25674c55aaee905be674763d679ca05a6baaf93f456b5d8935d6293e523766968c6
SHA51219a4fb39b2f9863c92d76016290e701fd6bb1aa5d889896666922fd862d5b72b95a97aa27d3d0b3218233ba9dbcb3db147efbf9e61e5be853d4d3672e87bfd5c
-
Filesize
56KB
MD56649262561fba5d19f8b99dd251b5d02
SHA1286e2ab6bc2220b3c9a83720c4c612623210e10f
SHA256824afe6bde1c2890077e9a40c4261a77a1d736429709a45d68ed508581e74771
SHA512688bd75b1e9661f425a21577063362e609ce496880a4780012317d56075095e5804fb7b849b32fbbea06fbbff5d47a5534113b6613f1a236b2a76cd043bba7ef
-
Filesize
406KB
MD5e79169d47394020f7c893abb840b61bb
SHA1c5b9c2cbef3d5458b52ebb67461e84432673fb1b
SHA25611c25cdeb02ac401d913dc48b935a087e32c2d9b7b7c4a5cfdf36e4947e959dc
SHA51221ca64559082a31e46e28513de762fa2239c521f60b3485bf99926f895f0bf6f63fe2162c3e2eb25705efad22d351e24b8283442f4954ac88bc8c56ef5dc529a
-
Filesize
607B
MD5b3add68c5445a07958eba6867fced743
SHA14fdea32129ca709fd8e64e9246b1bad74f50fb9c
SHA2565daa700e2db335c9f332f1128a14a004c75517d0a5601c74c8a6bfa28751b4eb
SHA5120e23dd38f87c3cf89cfaa59a569344869993f2ad9b4fcac8d9558b4c133f3c2b94ae91da8ccfa537ebcbee18fdabcff4fcdb1cca610574153bcdd569fd31d7a2
-
Filesize
600KB
MD50958d11749015e3ad51f4039a7da6433
SHA128e74cf511b30c64ea46dddee0a0ed9d3c0a29bf
SHA2568e2af41d038c621c95c9df9ab221bec0ea2acb0e7266029acee7ce95e1709f97
SHA5129ca4c969e69ce635fb54db2cac47b85914615071b1d6f5aeb59788851046ef14cb397ef2aa5e521c2e0e35e54e81409a171da825c31178c45a30980fa2aaca67
-
Filesize
600KB
MD50958d11749015e3ad51f4039a7da6433
SHA128e74cf511b30c64ea46dddee0a0ed9d3c0a29bf
SHA2568e2af41d038c621c95c9df9ab221bec0ea2acb0e7266029acee7ce95e1709f97
SHA5129ca4c969e69ce635fb54db2cac47b85914615071b1d6f5aeb59788851046ef14cb397ef2aa5e521c2e0e35e54e81409a171da825c31178c45a30980fa2aaca67
-
Filesize
600KB
MD50958d11749015e3ad51f4039a7da6433
SHA128e74cf511b30c64ea46dddee0a0ed9d3c0a29bf
SHA2568e2af41d038c621c95c9df9ab221bec0ea2acb0e7266029acee7ce95e1709f97
SHA5129ca4c969e69ce635fb54db2cac47b85914615071b1d6f5aeb59788851046ef14cb397ef2aa5e521c2e0e35e54e81409a171da825c31178c45a30980fa2aaca67
-
Filesize
600KB
MD50958d11749015e3ad51f4039a7da6433
SHA128e74cf511b30c64ea46dddee0a0ed9d3c0a29bf
SHA2568e2af41d038c621c95c9df9ab221bec0ea2acb0e7266029acee7ce95e1709f97
SHA5129ca4c969e69ce635fb54db2cac47b85914615071b1d6f5aeb59788851046ef14cb397ef2aa5e521c2e0e35e54e81409a171da825c31178c45a30980fa2aaca67
-
Filesize
98B
MD5bb62f4a2ac894b3f45c155c08df01d25
SHA1d0f06cafa401a217fae0f65f85df4b4af05a5bbf
SHA2565a3a35d103d4d32a00fb9c1f0646b25a8ce1e997bd693985a8065446d1080fd3
SHA5122426afe80ce56e88d7b4df811d98b3aa0cc946d25970a484cc12b92a6bd2f121bbe3092a427d4f7935ccc6519a709fde0a7aa745086940170ebde9b63e6fb99c
-
Filesize
56KB
MD56649262561fba5d19f8b99dd251b5d02
SHA1286e2ab6bc2220b3c9a83720c4c612623210e10f
SHA256824afe6bde1c2890077e9a40c4261a77a1d736429709a45d68ed508581e74771
SHA512688bd75b1e9661f425a21577063362e609ce496880a4780012317d56075095e5804fb7b849b32fbbea06fbbff5d47a5534113b6613f1a236b2a76cd043bba7ef
-
Filesize
406KB
MD5e79169d47394020f7c893abb840b61bb
SHA1c5b9c2cbef3d5458b52ebb67461e84432673fb1b
SHA25611c25cdeb02ac401d913dc48b935a087e32c2d9b7b7c4a5cfdf36e4947e959dc
SHA51221ca64559082a31e46e28513de762fa2239c521f60b3485bf99926f895f0bf6f63fe2162c3e2eb25705efad22d351e24b8283442f4954ac88bc8c56ef5dc529a
-
Filesize
406KB
MD5e79169d47394020f7c893abb840b61bb
SHA1c5b9c2cbef3d5458b52ebb67461e84432673fb1b
SHA25611c25cdeb02ac401d913dc48b935a087e32c2d9b7b7c4a5cfdf36e4947e959dc
SHA51221ca64559082a31e46e28513de762fa2239c521f60b3485bf99926f895f0bf6f63fe2162c3e2eb25705efad22d351e24b8283442f4954ac88bc8c56ef5dc529a
-
Filesize
600KB
MD50958d11749015e3ad51f4039a7da6433
SHA128e74cf511b30c64ea46dddee0a0ed9d3c0a29bf
SHA2568e2af41d038c621c95c9df9ab221bec0ea2acb0e7266029acee7ce95e1709f97
SHA5129ca4c969e69ce635fb54db2cac47b85914615071b1d6f5aeb59788851046ef14cb397ef2aa5e521c2e0e35e54e81409a171da825c31178c45a30980fa2aaca67
-
Filesize
600KB
MD50958d11749015e3ad51f4039a7da6433
SHA128e74cf511b30c64ea46dddee0a0ed9d3c0a29bf
SHA2568e2af41d038c621c95c9df9ab221bec0ea2acb0e7266029acee7ce95e1709f97
SHA5129ca4c969e69ce635fb54db2cac47b85914615071b1d6f5aeb59788851046ef14cb397ef2aa5e521c2e0e35e54e81409a171da825c31178c45a30980fa2aaca67