Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    131s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    04/12/2022, 14:17

General

  • Target

    d83d1ec3f265f18e9b144cecc68657c2c5f667bd99ed1ec34f2a3b2989fb0587.exe

  • Size

    25KB

  • MD5

    ac7849de3120a3ddb72af08bd426a8bd

  • SHA1

    904eb51be8d1bf8e4b7df4bcb623676fe9fa113e

  • SHA256

    d83d1ec3f265f18e9b144cecc68657c2c5f667bd99ed1ec34f2a3b2989fb0587

  • SHA512

    301ffd3a4b2696df8ca9b43929438e5b74c73fcce52122046b5fe693c71ad8332d379f294a0075254ca68d144cd64bf4cffcd2ec2e26fd75345fa6ba6f70f291

  • SSDEEP

    384:tlT/W+52Y+nyDGJp7oFtwcp/mDpQjlp0huQSNyPVbkTtnJWAEJc3ziJ:tlTf8Y+yiJp7oQkK28VghJWAEC38

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • Modifies Control Panel 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 61 IoCs
  • Modifies registry class 49 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 19 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d83d1ec3f265f18e9b144cecc68657c2c5f667bd99ed1ec34f2a3b2989fb0587.exe
    "C:\Users\Admin\AppData\Local\Temp\d83d1ec3f265f18e9b144cecc68657c2c5f667bd99ed1ec34f2a3b2989fb0587.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:968
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://u.9lwan.com/cj/direct/628546.html
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1472
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://u.9lwan.com/cj/direct/628546.html
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:576
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:576 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:640
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:576 CREDAT:537603 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1960
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://u.9lwan.com/cj/direct/628546.html
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1360
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://u.9lwan.com/cj/direct/628546.html
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1476
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1476 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1872
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://u.9lwan.com/cj/direct/628635.html
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:568
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://u.9lwan.com/cj/direct/628635.html
        3⤵
          PID:1128
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe" http://u.9lwan.com/cj/direct/628635.html
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:540
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE" http://u.9lwan.com/cj/direct/628635.html
          3⤵
            PID:912
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c C:\Users\Admin\AppData\Local\Temp\_zh.bat
          2⤵
          • Deletes itself
          PID:1932

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{9C7A9241-76C9-11ED-96D2-EEBA1A0FFCD1}.dat

        Filesize

        6KB

        MD5

        1e08b676e9ab9ff02153fcaca78b18da

        SHA1

        94705ca0d26f2dc8618a5cb91f101e455f54f973

        SHA256

        fa32cc14a46141b1e1d3a83ef768b47714d934eaca068d1d7776e451e1c2c00a

        SHA512

        fc31a4c7488bee4075863bdb82ef339ebc159d971758777260001ea1d02ee345b69d8cd66427ae419734ffc036add8798ae09544d20976c9017ac68692b81b5f

      • C:\Users\Admin\AppData\Local\Temp\_zh.bat

        Filesize

        248B

        MD5

        f4550899a106e7b10b4365ac6231308f

        SHA1

        c6a1482896918945e43f11eb29fc7a26649dd3b5

        SHA256

        03c2e0514b45d4e7cb5d18b32e8e2e14072c37d2074e3d6f6dbd766c1ebffdf7

        SHA512

        622cdf7732b8288fecff0128669bc090a7b6695a4e2a18aa4b69a23c4c47a8675c29710c9fc6eb373140a86e131e6d77413deac887f3a3e8b390ee566ac121f2

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\VQBEVZB7.txt

        Filesize

        608B

        MD5

        bc3897b870433e299070576eeb120674

        SHA1

        147cb9e54512b506cdd7d4236107fec566d56719

        SHA256

        0586c300a9641c5a6f47a0afbb46dd617b34bdcafdfd7b3bcf3f3c81de0c9237

        SHA512

        63bc12f55e1a526ef2cb773885c644d402f54235f77ff6f2b0dcddaca77a99cc5dcfb1ad704605d94b39adb8356e396ca178e6c189416af699cd8d5cf0bee49e

      • \Windows\SysWOW64\tarpurd32.dll

        Filesize

        44KB

        MD5

        29781a89e8c108097f39a040b5ef982b

        SHA1

        60f4ebf39e90c9cc1476fe5b63ba5b2b7c13b81d

        SHA256

        50c6fd913b670d05bfe5a473ba6bd7413b5826506ad76c8bca739d73501cb77a

        SHA512

        a6a8256931b1abef63424085a65af349f946e75088c59ef163e3f3376b1579908f7ed3f1c42af2e342794f5d86c3447f8ac5422853718b58a8c38d430a7f524d

      • memory/968-56-0x0000000000400000-0x0000000000417000-memory.dmp

        Filesize

        92KB

      • memory/968-60-0x0000000000400000-0x0000000000417000-memory.dmp

        Filesize

        92KB