Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04/12/2022, 08:06
Static task
static1
Behavioral task
behavioral1
Sample
ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe
Resource
win10v2004-20220812-en
General
-
Target
ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe
-
Size
168KB
-
MD5
1a3accafb3d975d55a6844be4bbfa634
-
SHA1
c406d6f0a52a7876bced084da5e6b11c0addaef7
-
SHA256
ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3
-
SHA512
313af44e2156f514029e1e802e694c115907ad3a0168836b8817dfa3f58cbe28e3637af4fb76670258a67d051bc2743f22390aac80cbe9084a7d616a1e484920
-
SSDEEP
3072:ByMI7V0SizShu3ARD9ikLhj0wQ7HXy79g3pD/Y3dmhQPS1GqSl:te0Sizuu3ARD9VLJTgC79QzqC9Sl
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1548 Kirrrb.exe 2536 Kirrrb.exe 476 Kirrrb.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\Run ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Kirrrb = "C:\\Users\\Admin\\AppData\\Roaming\\Kirrrb.exe" ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3300 set thread context of 3036 3300 ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe 78 PID 3036 set thread context of 1512 3036 ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe 79 PID 1548 set thread context of 2536 1548 Kirrrb.exe 85 PID 2536 set thread context of 476 2536 Kirrrb.exe 86 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "1557536568" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1600661661" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31001225" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "1557536568" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31001225" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{86AEBDEB-767C-11ED-AECB-FA09CB65A760} = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "377216253" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31001225" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1512 ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe 1512 ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1096 IEXPLORE.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 476 Kirrrb.exe Token: SeDebugPrivilege 4936 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1096 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3300 ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe 1548 Kirrrb.exe 1096 IEXPLORE.EXE 1096 IEXPLORE.EXE 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE 2896 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 3300 wrote to memory of 3036 3300 ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe 78 PID 3300 wrote to memory of 3036 3300 ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe 78 PID 3300 wrote to memory of 3036 3300 ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe 78 PID 3300 wrote to memory of 3036 3300 ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe 78 PID 3300 wrote to memory of 3036 3300 ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe 78 PID 3300 wrote to memory of 3036 3300 ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe 78 PID 3300 wrote to memory of 3036 3300 ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe 78 PID 3036 wrote to memory of 1512 3036 ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe 79 PID 3036 wrote to memory of 1512 3036 ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe 79 PID 3036 wrote to memory of 1512 3036 ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe 79 PID 3036 wrote to memory of 1512 3036 ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe 79 PID 3036 wrote to memory of 1512 3036 ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe 79 PID 3036 wrote to memory of 1512 3036 ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe 79 PID 3036 wrote to memory of 1512 3036 ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe 79 PID 3036 wrote to memory of 1512 3036 ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe 79 PID 1512 wrote to memory of 1548 1512 ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe 84 PID 1512 wrote to memory of 1548 1512 ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe 84 PID 1512 wrote to memory of 1548 1512 ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe 84 PID 1548 wrote to memory of 2536 1548 Kirrrb.exe 85 PID 1548 wrote to memory of 2536 1548 Kirrrb.exe 85 PID 1548 wrote to memory of 2536 1548 Kirrrb.exe 85 PID 1548 wrote to memory of 2536 1548 Kirrrb.exe 85 PID 1548 wrote to memory of 2536 1548 Kirrrb.exe 85 PID 1548 wrote to memory of 2536 1548 Kirrrb.exe 85 PID 1548 wrote to memory of 2536 1548 Kirrrb.exe 85 PID 2536 wrote to memory of 476 2536 Kirrrb.exe 86 PID 2536 wrote to memory of 476 2536 Kirrrb.exe 86 PID 2536 wrote to memory of 476 2536 Kirrrb.exe 86 PID 2536 wrote to memory of 476 2536 Kirrrb.exe 86 PID 2536 wrote to memory of 476 2536 Kirrrb.exe 86 PID 2536 wrote to memory of 476 2536 Kirrrb.exe 86 PID 2536 wrote to memory of 476 2536 Kirrrb.exe 86 PID 2536 wrote to memory of 476 2536 Kirrrb.exe 86 PID 476 wrote to memory of 4936 476 Kirrrb.exe 90 PID 476 wrote to memory of 4936 476 Kirrrb.exe 90 PID 476 wrote to memory of 4936 476 Kirrrb.exe 90 PID 4936 wrote to memory of 1096 4936 iexplore.exe 91 PID 4936 wrote to memory of 1096 4936 iexplore.exe 91 PID 476 wrote to memory of 4936 476 Kirrrb.exe 90 PID 476 wrote to memory of 4936 476 Kirrrb.exe 90 PID 1096 wrote to memory of 2896 1096 IEXPLORE.EXE 92 PID 1096 wrote to memory of 2896 1096 IEXPLORE.EXE 92 PID 1096 wrote to memory of 2896 1096 IEXPLORE.EXE 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe"C:\Users\Admin\AppData\Local\Temp\ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exeC:\Users\Admin\AppData\Local\Temp\ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe"C:\Users\Admin\AppData\Local\Temp\ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3.exe"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Roaming\Kirrrb.exe"C:\Users\Admin\AppData\Roaming\Kirrrb.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Roaming\Kirrrb.exeC:\Users\Admin\AppData\Roaming\Kirrrb.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Roaming\Kirrrb.exe"C:\Users\Admin\AppData\Roaming\Kirrrb.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:476 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"7⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"8⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1096 CREDAT:17410 /prefetch:29⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2896
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD5a62e66dbd157955d60808bf89987bcde
SHA1a97e8478902ac7db7fd904300304944a41afee8e
SHA256d34e72ae586b00a60e3526f1e75677dcffa83fd33860a771ae592e7d8320cf25
SHA5122c969c621bd5881acf47e85b3a2977b1c43dfa80887f0ab447327162d143795ff647b8ed1aec174a868c0faf1e09eb8baa6a67ea42764b65fe4416d2168e81fc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize434B
MD5cbb9d848e4ef1cab5a2e52bb00cf4c47
SHA10d08cd29106a973ae3e08fb6a08b0d5d8b6056e8
SHA256828174618a207d6005b978ca3a78e62be458023da86ee5a2be9f898011a53d7b
SHA512c25ab6899be3d6e8881cd81444a392c2f9508aefd348f9d08f5b2a66eca46cd578d3882aad7e65e8ff1932be6fbb156bc2d871af4939d1c3b90ef2250a0fbd11
-
Filesize
168KB
MD51a3accafb3d975d55a6844be4bbfa634
SHA1c406d6f0a52a7876bced084da5e6b11c0addaef7
SHA256ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3
SHA512313af44e2156f514029e1e802e694c115907ad3a0168836b8817dfa3f58cbe28e3637af4fb76670258a67d051bc2743f22390aac80cbe9084a7d616a1e484920
-
Filesize
168KB
MD51a3accafb3d975d55a6844be4bbfa634
SHA1c406d6f0a52a7876bced084da5e6b11c0addaef7
SHA256ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3
SHA512313af44e2156f514029e1e802e694c115907ad3a0168836b8817dfa3f58cbe28e3637af4fb76670258a67d051bc2743f22390aac80cbe9084a7d616a1e484920
-
Filesize
168KB
MD51a3accafb3d975d55a6844be4bbfa634
SHA1c406d6f0a52a7876bced084da5e6b11c0addaef7
SHA256ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3
SHA512313af44e2156f514029e1e802e694c115907ad3a0168836b8817dfa3f58cbe28e3637af4fb76670258a67d051bc2743f22390aac80cbe9084a7d616a1e484920
-
Filesize
168KB
MD51a3accafb3d975d55a6844be4bbfa634
SHA1c406d6f0a52a7876bced084da5e6b11c0addaef7
SHA256ac48861c4b673a71ad5a111d3b0d90a4ce2b78b8d2024440e9b89527d27c6ea3
SHA512313af44e2156f514029e1e802e694c115907ad3a0168836b8817dfa3f58cbe28e3637af4fb76670258a67d051bc2743f22390aac80cbe9084a7d616a1e484920